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", 0x1000}], 0x8}}, {{&(0x7f0000004440)={0xa, 0x4e24, 0x6, @remote, 0x8001}, 0x1c, &(0x7f0000004580)=[{&(0x7f0000004480)="b344b987e96e8a6a38175460223d7800f920ed83739b71d043b247e29dba78", 0x1f}, {&(0x7f00000044c0)="43d3ad47434f3cd47e11ada6257c800b904f6a23da80ce0440b777fe8be3af26709ba71263a35bbe4d8961ac5880a4fb6db1e09d96dcc7961496780be3fd22c369ce688ff7d1a4f48d9ea2af121c5e9aa095c260e79b9c6bbec9ec3601c1f692693accd86b16e9ce6eefb4225026cd34aeeaa542dfd6d74d46360d6f1fecd410192066aaaa7a66f212632e91ebdf2b26f3cc5a4377af389db5e0914e9fab24b8c530176a323a0cf245a0911af8682f840ac96e391d", 0xb5}], 0x2}}, {{&(0x7f00000045c0)={0xa, 0x4e21, 0xffffffff, @empty, 0x6}, 0x1c, &(0x7f00000046c0)=[{&(0x7f0000004600)="f35d0237aedc9aa8aca89070882b5d9daeba684a0939d5f1fd956486360afb850c0dc09320c3e85618bb0b40c6bd1b3e414e0ec4a6d324ead907a0ac1d7eb4684db9e9e98b200970856edc84c9a798c588f71ec67ebd37c8a091470fff1fe49b0e4b52d6803b24b8f20dd13630c7f54375aeaafb907235dd818264f14dc4df31a6a10cb649f93f4c5475499c32508296bc", 0x91}], 0x1}}], 0x6, 0x8000) socket$inet6(0xa, 0x3, 0x3) (async) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0xa2b}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="78000000000000002900000036000000670b0000000000000401010e7f22000200000000000000010000000900000000000000007f00000000000000f9fbfffffeffffffa00400000000000005000000000000df04020003040108050200fd05020009000000000014000000002e4e5ef5236adeae7e15ee947d000029000000430000000100010000000000"], 0x90}, 0x4008800) (async) socket(0x0, 0x3, 0x0) (async) socket(0x11, 0x800000003, 0x0) (async) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) (async) getsockname$packet(r2, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) (async) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000010010200ca000000b0"], 0x140}}, 0x0) (async) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) socket$netlink(0x10, 0x3, 0x0) (async) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async) setsockopt$sock_int(r4, 0x1, 0x2a, &(0x7f0000000140)=0x2, 0x4) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendmmsg$inet6(r5, &(0x7f0000004700)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3f}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000240)="3e9e41a0e39c4e9771f622c619081a7200e2d1efab8b20408cc666039739d4520250daa705a005c38b6f1e29e60b34741d0cb53ee9ea35c8504d1e938463292314c5469377b83edb2d7bd8fc458542cadb93a83b06f0b3b8adb60314aeee0470e1e681ed1a31dfdae9e52dec5d3e72cc2be99bd5a6b64192f9bebd264cb6135fbc557179f0a9d7b4df9b968ed14e273178318a7d44646cc9ec08d9b232afa240c8c8e567e62f90aa024ae38921c16c99d65408", 0xb3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000380)="f6594c87d09ac2a5b40ffdcc34c43f5a54f3db1972359235598862586e313f5df6d5870e1c4f1c418f53d526353a2bed58a30b3c6f50a65f41c9dcaa1b8e577e03438ffc130270a8ad78234c3d231fa78933232ecd28e4d63eb2599519d4198651538de9c59b4b50c29a6cd3a7a7e69faf0e9db058907ff2969f4b9adf6d2691357870b5ff3c0d6e2813b540782b7ea1b88028557b7355c5855b0b7ba63a6be8380a5d91233ad8e92e176047f9f6b5623e9dd595e25a12bc879495cbdc43ae4a85fef302b56ff09b1509ec302334c95c98b2ddefbf42734000956c57a3e68647dab122badaee2601d7659785ef229a1f5afaad1c8275ddbc976a5c9f1f0f1a86141307f0292dc1154af9094e32749a811319c1c4356553c097b93f420f10fcacbbe2d5f280350fa3b87e72fb911f60159bab0132af7911f9d5cb440b2c5f6ce6f7773f9d8974cf18c4556169ecee715e3b421bc61b50f9613336b73172e235248850822ef064fd293e35b50c079d8791e39cfddb36c3fdefe5a5999b68bd2d00c96ccc99746f8918cb5281a48b12c1dedc7375ab505bef446bb4f23bb6a56a936f86bfef09ba11976569f85a1318318daf51127803231caad9d9a3818786bd1c66d6d6aae7e5aaed648d359b8f68b3cc736c092776d27ca5dafff321f97482e7f01d160713d307b9d3784dab33d1615e441f376585b582cf3cdd564b3d9dd99d3309e8b18c635c5faab29c3b7909f54772715279bd55175cebf1b04ae02b3258a760d0d523f2bbc439876316f6eeab933b8c30fc23f9669a20fce2dec47e283ac7ce5ba4727742f661bbfbd4b62ea9506f1939ab365fc9d7acc99b0fe40fde67b788caec61def5ad713002ecf5b23c8917646af463839a56b2a18d243d47fb7d676baa192b52058d43bbccced593ab86a4d4a83cea1bcecae2a7fc9c33e291c4226b6f89adc0049dbd8e002f5fd64cf4c692b58d18ee905049bffe112e2d9e83e13c3bd8134f74de4545ad4a286e266d2a03862e3b67d8418caf271409b5f9e844e42209638341a4b8903f6c4d78153a681872917a68988d15dff3f4e69eb99968a1b15a9f5e9fb0e79d244f42f3ff173a089ecb0b9f20e4f4407e797f27537b45657307e9adf12c65d821d37faa88cb0b84508f179733bb5aa6de06fd7c3685455e470beb49fa3dffb882d2015f9d823474ebdd194f34d960be5b1be4d0b5bd63770a62d9f77514d1b517cd837e90f281784d0051b59e8c67b07212fcf25ef76ced56ea29732652d4249c1f439e5c9728689d59933c4cda5887c6f82d417aa3fee37232b1b933931f4310e98ba540cd073d328bd9a62237d375c0731195fad54448c1a5f21518cf85ffcb06afb5be821fdf18719c113e5983dee01508566fefd9f79cfa9ec47fa3930e54b227ca93d65cb990726453c8ac58abcbf611b70b84c127087c4b8c00fef60e39070c172c68eb7b1ab47dbc0878898a1eacd6ff0f65ed11b385b1b68c847129db0de132f3c7e74f8ce9d96552cb2b59fa1b47019279e8228c64631e510633a75112d75edb7aa57cc3ccc16e18361b5603bf6fdafcd18c1d26784075aedf8cfdfad424d918272fb5f1c7b7f05461058100f8f8b6d73752514d71f20d7ad814cac76801a8869a839dea7ae3900d464fb703619d6cd82465840c0fd1d632ae96545b7d27d791eabc378fa8917a91e05dba53f5f8690cf756d2299369cf549368d562b5254e1e1239af3c24298c6cca701323094eaa3225edcaf943c4a19e811550acb6a8b3dd13c4823386156c8f614b90ab8895b98fb541cc433e3369f0863b59da2bcc5eacd11776b5216bdcdc49bef5206734ab9b0ea526532d04f29a4dbd37d5471afc6d39697340eeed8af71934983ee4c2db1b38ab0958f06d1b0a0b5b6bc547935d3cfa925bb307cdfcac67e6279c38b191f8441c56d6632a601effd440a545b36ff237da2ae93117615aa21f0a767afc77545d8da2bcda74a81dba3927547fa38181e2bca3e1650825c9d47ef3d0c4e5372ecbf8caa8d5c4ddce0dfed18905c03aef0c995061265f06b0936cf16f404edc95f561c69a68a0078e62957488d773885c8e70a3d27b49085cbb44dbe85ea883458bff909966984fdf40ef0d3267a7ab415b8d8a248d7f117cf708db48daf82356dcf636b4e5404900afa55c79362dd58797f374571de555a1c3fcfcccecc0c633f119d81ca73683ac624889fccf1cf22dbbedbd98f03f424c1e2b9e4cdd9e89eb4730066edeb36c2d8a27884b66af56b177f23b7cbd4436c863b62761d7ff9fe2fd229ad7ff93cdfaa2751f2fa94fddf9e4c0360b541f32d8a88af3ec7c45c2d4df488db09be7a4e5cbccfa1758adf03e3cad198c9640c774481433429c8135fa6904490744845a2cfc7cd005a823c0b1d347bc966944dd14ea630291f9dfbd0c7b2abfc9a29b0de53c9066c693196603c4aa528e5259f56894e4966d818d4bc0aedfbe15c588c3e070850c43e9072e1ec828e90a7df7a5962ef8f36ed0d37fcfa6df9a9af563b2bf124b64596fb18a0d131485df4660d2295d6af95171a03accdd691c08c1ed39e909995eb1f13aded86ca056fd4534a34e1c766c924a794f181b85e6005c91dec4616ed855f5917c9db0ca648c844b43ce791ad211e01f3e0bf3433579af2635bc03bc91522d35ab71f974d7bb43dc7017b89795866354ebeb9f0b13640f47ba8096df5f3a0778b3fb3e53897c9e25dfbe19640adeda33c829ea46050afab14ad2cfb4d97bd6f9bd2f8cc4b850d44130c112241808b6391c05cd2a1e20c0ca62dde82a09474468d1f4e6a613f0e003f5b0044707e1c30b6ec49067662d02fb76b0a2bb391510020e2d7d52c1231eeb51975e6356d1292035f91793d1bfce5ac5b394ff82f82f0ac28c69f741c0f9fb13452b04bba4a74c467f6fd9afee804eef34bfd2f2d0c5fafcc83d813c9751ca49f52ee482bd5a75806ad7fc3abd959513e33e29a8d33af5baaaa6a6a973806e0dd5cd3db7b24d18e85893e67f4acdce4cf274d594093eb5a6d6fe679b535e05c7f8b9ff887e12f4689c8bd2907ff2c688d360429364a35682a6d95ca303a35293d8ac352b3dd99164fa2c44c168300b536ae5a2af718e30e5401b26c2c24f3079ad89f715b17a76dcbb51279cb8e4a23bd2363253c258943300c50435733ff3a30a67db17858d063db13c7357aed885e9c17cff5e608eb44aaa71aaf3fc6dca70bfc4d6fdd59645fd7832c65906a778184e142e69fef5ead20941d3293b03ac6faf1696907bd8ec173db628c0e35c07e14fd692cb4ebe0d4f0b29c267024776b783195540735d10baaba8fb96012014aab97b3a286bc488934893c107b7b43b2b42dc329878a6bac5618a40409fd7332d1f2132962764d726fb6c19c6c6aa9ff7aa5d6d2605aa798284401b6f5d4098efd09217b179b9f1ccd53de1d0d6b39515a549ccd5deddf26e9d2bc05d00958116f547858b21cf552e14c591d146b373d9cc84b8b38f91cd3cd88451a071e884ed7d6a1a4943e625e7d62f29e2df9454b9f46accb9b7164380d20cd96845bbf9743aeac7161ffd40027b04c6f0f5d3b843022587de399457dd34f177b5eeadb89d40749e51d4cf54758a3ceb162e47d7392a732d371f3711efa03360f4e905658957da1fded4e3aae0fde4ca19a1e752b7e596de738e5a2dd2e0728fef6afdbe265a3e526b50766c3e37fd691fb4ed72ac091dd10c518cfa82aadb6480d6127aeec0415e2bc78369472e59cb003a9bea795924dcd63d73ab5795d51c07471499d4b77d4f3decffa742c0057cb3c127898d1db514d40cee395ba4d1779e656bc77953cff29f10d3989d1444d534dd6ea257e332ff37d83ab7aec2fb44db9e1400654ea119c2f24537a33a3f20a4ff77b07da67df2985b374ec272a8c0a8d5a61d281937fe305c0d99e9592eafdd0b974ed2206f1605f0b0613b2fbfc62e2000272229a5d4f96c6a7998f85ab339041e276626378a4fcc4aac0fc7b1d9a3fad083aa705dc7ef8fb46b12b5a469d433dda870f133f2a46cdb215b1d713b79f227d01334e4f53e0142a4d8438b668c5d356e7eeb303c28019673e471fd576fc62d05c0c03886cf013b5f03c47e059f838281290457d2d903b49aa7fe5719ae5c417c3a4febef2b954bc3b680573c1e4fbdcc1ced0cbdc39bfcba53eabb9c7dd3d5d2430858de8099958282ee65d92e52a196095586676b46ca99f9275584750b109bc27915c8279cb060b31bdbc20b853e0caac3bbc81e6d6bc8bce356af7ee497668110bd2f6c514d0423ff5379965b6bbbc271e50ddc0e4f7c37151a8baf728dad431aa6fa37d445df7600c0900de293d9f3a7e259648a39a6511d49fa2522890ba4d04181cd36f131823ff094b8384f8a78143c167e06d2343d1e8e0cae8f2d51e25bb84a11a2acdd9c60e361304daa6ad338bcc22fd35920d8c9bb40543a15d2aef2898210f8560bfd215c1486b79e663034ed6fa607122bff362572efa5e90bd9042435a6bdae94988bc870bb96aef962d02e5f7d85c21ea4291047a71c0ee3265b40780d39073af25054db516a4682db60da642f0d94172c5d53e5af41cc8f564ab4b12fefb011c752f255bf10f58af4e656ec069b4707f58837e3091f1e12c32712f9b41e14ae88c15f0970a66e25843625923b5b8aa8a8f577f2de0222e40f9164851db0a6ec917beb4e691e15e4917619ddd3718cf4a171459b2f21e2f92894c0a54baac2dce1913dedf99cd206b122c3dadc0584b4a32aff98695f5577a3af126d728c9fbc8e6cce6c1845de00725271be3ac203e80c5b2711813074cc94780db62f994cf118337cf44573617bf9e57cd94e5aa465d2affa000f573a49d78dfbddfe5a7225e0a4a0f9a6cc4d5afc0cf6c9a282de0ab109c64163e266c22e47c66d61c02a9a612f8f9da4dc8a8cce5797687aa3adebabf0a8c4a17e70074213e7aa656b6c97dcab63f26932c2f694ae1c8eb5e38a57101f6ca1b2008d30d9e0d58182525efe884dc55533c6ec3b00d0e4d694b0d96798445edddd4678b12edc15a52cd0dd0c970ecfa64580992b3a95f9cfcce849a013e6ff605a7abad75da73e407a84d23f0f7d3350206d2d8cbce45cde12b7737ec03740bcd2910353166f512f2b2a09a8b4f7a496f4d41b18e989bdef7bc208d6d1a9f87edea5f3221a184da89280a17ae9cdec34f3150a677376d2724068409e0e622da117cf7e064b3a664a0f408c26a4c343b3395fe1b25e13a37ae3d18fb0446fb14e89d41e30b5b556076b4f5f7a6a956af68e0d4d39faeb0af540bae002631c70e4d7b9af387e58d9a860d0aeab0d08052f7b40e5a03b30838db178966cce011d5297523e9cfbb9e3c34b637822e2d88f273761faf000084053074570032799946c7141aa13974048f2109bebcbb8ed1faf4823c85412084144b2c0e80a6aeaf37fe71110f076ee4729be7cfa11f3063cbf715004afbeb39345dbc18cc7c746613d703f7ff0b4cfdd10fd2665fc402041b06241b7878a3b028d8bb6d2b29e2be9829817b92aaa4d0eda9f22ae9a51bdf7619cf489859834f6211a1f7442eb2e681b56d60e32fb331b1d1c0245212f4b50273eead630280e14434f94f52f51a45cad138ed6846171801606828d1d1c12dbc99468d49083267391c96f376cd692a7ec2602d9e1b208a1398f8dabf935e011b6573935a81dfb3128030536815a08091486b58abc2d360d82e7249e77116efbc41ee5ad3aa9f18286452a6d292ca81a", 0x1000}, {&(0x7f0000001380)="232937c775a11432e0d233b6363849fbce786a2ea8c295bd8797bc61b1c12eb82a0b68f9b2a6b01f58c5b5cedd5cb1aa08a59e937cfc0d49d30a3060a8eec0ff80de8f943516973abf14158c9c94035c7b7fc099a572c1d68dfe409efd1ef7dbf2e5649fe12e5d68c36ac06dd12e033143f3c0a41ddbc2e8c3c280511d52dc56cbe72cd77570a5ec5e83c01f7e88888362cb1658122dd58f810559700822", 0x9e}, {&(0x7f0000001440)="ec9f7a3e406d583ca927f53a50822ea7c00d1f60fcd80f595fc61490ba6e878aefa8d1cf06116be92039c3c69a01316a4d58847ae2a2cf2bb95b63822986", 0x3e}, {&(0x7f0000001480)="e2844541688f2bda449dbc42736767e8d0d0b1f05376d5e2e6c2bd85983d1662f000f9edd5a5a5d8bf969ea90057d71e1442bdb65cf43444efa39a0df2f8334cd144d70992446894a0c1902c021358653beb86641f478c26c7d32074afef46035e8256c860856bb5e2c088e04fbaef81e6d0e73d5b073de6aea9f90dd5ad6f12c0", 0x81}, {&(0x7f0000001540)="0eaca245ec604e4642bf3005eea5e494ef46732e54b3ecb8401321bae208cddc57bcfab6c9bc108fa2e0058a9ac01c513231b425ca215defc80874179af4680f543b8bc2259a216b6370c9c828a207c9f7400bdbd41078d2683b59510d1cf9ff1e87a9aa1dbe762caef70c23239ff2ea2585aed54fa2de1c701063658174a296e5e7f15b05ab8ac0135c066890f7c894d55dbf7d7ea04bcfd14aecc95950e7b873e194f1f5c18b51ed6ccd9a896491c35c0c127c6a", 0xb5}], 0x5, &(0x7f0000001680)=[@flowinfo={{0x14, 0x29, 0xb, 0x10001}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', r3}}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}, @tclass={{0x14, 0x29, 0x43, 0x3ff}}], 0x70}}, {{&(0x7f0000001700)={0xa, 0x4e23, 0x481, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1de3}, 0x1c, &(0x7f0000002c00)=[{&(0x7f0000001740)="485c72fb6f3bd9719de4e24209a426da4168cb217395445ea69d227cfe6cca98ffa14c95b4470b29fc31109e6349b8bf4d5f04db252bc72a1672abd08e22bf951ed0d6b48bf246c9b266b5604b438835b03f662ae6e13acc6023b9184656552e680ad06532bbabcb49a63f7b03ab2f19f52af7bce8e1492afb3b10528379de39fb980f97d783096ef4cd2a67a0d3db7abd93a2772666ed4bcb0ece43025149a6e2ce3835ed1207e672b9f1cdfd780afae8b94cc0c7cc415b06857bf9d8785b766b596aa22e462d4c3f300184f61627910ea0981e1c6fc249cda629e0c886a983d68d44d5693aa30b6059eb497d4a74a0564e39c1e45ea0a45f52482f7c71bf1bf0eecedd4198a56e2efda6b3ea5691f8690612cef0a47fc91438f2d43b3df0f71e18725e65dc2ae42037ca259057d2068485066bdc406ed2fd1da6c08da94c1741a428656191e0a9eb9f52fb8b7da4a566060e32bbc9d9f573ab748b0ebb56483e3cf574d78827262daf69fbd7775b44d34d9fbfaba5e9ff7e355e7f8f25661221c3064f79e29813e70ccab332890479f917e942c98ba9d48f51bdf37014eb766f26a3f6b3b22812e6ed7932b4cc1a7148e9972f76f8eddbf7ea8b5a0856ca1816e2b86b4771775e197cb229f1e59c7f155d448f28dc1b7cee1e4d71955a7ba906b0377d060ecbc7f458673d3cceee397b9e22193328b722abab28bc946a13cef13e06ada279509566eba3369c490b497f81b12be9531510d5b2c2528d23e1b7aee55256d7de0fa3ca6f2a39fcdc8e39fa8bf281272c9fc78df54dadb161dd6f4ff2f38f299add0395945c011db89941f84a401b3210293fa79e31d26e6fa4ec02d8027d6d953a76d955ee7d2f349597b10a5d680a1be7cec44f2c6868a20f5ae51fe35307b7cfe6318fd4c2c948e5b371269f2c7a400daf8592dc58d6f11e224ad0cc753410555b3b45b20836f9499cb6d55189d8ee7e89369f05c08809fa837c184ecaeb21c3378136668f063870c0430e9ea14d919c72992ace35a3d01e971825f51b13324b0f4a1985ed4570d5393da8285ee4f35997d6c39c6a8e8574d007b3d4102c3a0e2adb9d7925359e64fc873efece79e4d4561ae1e57caff7c077a3e924e071179f5441d636b968b5b5ef5847036fc69927dd4af34ff2bfa55f65c63f605cbccb37ff20793fcbf7260234bd89b4d8eeca3f3d56ddc4d872ddd38930c72781b4d87f583c4d511b2900670ef215a7f222ed5f4fafcc2929ba202cb4b02469c344350007058f75bcc03aa894e0eb8bbf937589cc03d850626b165f27579a8b00bd5beaf84ed88e67d67a9784295802873f0e05c807afd1c0c48d4188d8ab4a28120014ac38a09bdd37e44eced01bd8fa70d421426de0b6f5b46c4a92844a5d1883e5a4837f63de01bea74a18af0268bfa6bc07db61070cf60231e64460e09fdc100c0640844ff55037a8f7bcba9fe34b091a16061567f7817cffb77bde40a9453ff042eed3cd0bd6614b77d5d5e7794cbd8c938d728e48cb14e45fbba090c5097e91611c35b2318cc0aededb03e958938473eee3ab4936d3350bf5f373c33656513e5fa528f91460227e26520be1f310d5c9e9540aff9fdf3e0ab816f3456b7ed1319129bed90525054959263fa2a690efe3fc8efd533c261e9ea9f787d47bb55a71791f6160d96d1a0558577197b5be10e69a91967faafdd77b679a5d2bd6701d7a85de1df52d01f55a24f39336145544faced9fb6409037f473f33eeb46ee0b13fbb53d241a37f3e9a1fbcb92376d758919529165cbcb4f3ddca94e87b779ccffc184221141043ef4ccd9c1ab16a77ca8f963ce08a0f7d5a322b74d50969ce6ccc51983c7bf6fdbaecbffa897de1f6d7dc63dc18a102aea780e38ffaca028c7f089cdda6f87c8e3cea1d9c64c9eea9fdd82837e0d21cbf12357fe58fd8f985ce939dca80246e6b7299077c327192b03b25957a870d76c358e2f5ca3c2fc16527751e2a2a41b80895f4f9115df7b53217f90edb1d0eccc5cb65ae2065a0fe625c26e31d083c1e334d20d267813bad698099aecffc25394c4aee8f881f98196a97903fd6dee89bd3fd3e895aaf041ef85d7dc934ab461ee821210ed518fcf9598a4501d4687121c93d28db201e7a7302553a0cbf2b22a30f959dc17756442333324389e301a4c4932f8a62f3edea03b7abd4c41ff2f2d4d4d031d5a64865da7d78df3bcedd7b674662a800fc8fae03daa38e0fbe79f271ab6a057f4345e79665dc7b5fe340f6a3c156f29892916389a94986e4fee5b3ee7fbf232e7e7c04a5feb60318ad86d523536809f13a857323029fe499b23178a6eb6b2915e6bddbb7d2a17d14684792e4d70fcfb8cab1b57c7ff2bb0390b9720dcdecf5b09aa1230133c37916448d4e9b8d73a940b20abe3383d64a0a8f663e10533e4214462bb792ffa8df3fd7c911865bca71419a6a12a9ee3380e449d67ec8daddb5557da01b83ef2aeea6880eb06c23317b484d78be8de93d87d3fe27a5973f68e71f62f49a30cd73cf596d1f0590be14edf5330f0c03341acdd42063aca19b0e9624bf1fc35a213130b3e1141ff3c92ef52468dc5cba1e7747b83733e67fe78da2dcefb0fe8eb51a5fe2e2ff1c72af458ac23866bbbeeef671a4753ffdab969f2187810e09ff59a561c90513f5f6ddcb8dbf4930e77c6f8e4c40f83796537e86937dc743ef4290cff17cd62e277661d82a249e649fd28eae05592c0a4a418c58f25fb395b441fb878f99aa88360049b70a9114638fccfe0becb0f617aa0dadc2f38fd08a0444021774148ab4d5aa82ed46bf46b7bd68cd243d5ac6e53fd4de3ec03b7dc92c77d16451ab0f8a8e865eced7c6b374554d9ae938c9c397da763888e09caeee7721e91020a4db3b45d8e5603b4ea19ea203b067229e56935852daada47515cb28769bc459a3b308fe7f9fd998f1d4c43dbcb89efa655e28330715eb3dca3d64d5b54464781b20a855b0bd0f69c2fb692400e4f0261e0e04a32b074d0701197d8aeff1318054a61a0390da210115746b11c0ab2e6a81bbf8e7cac70ea03307ae0a64f44ec91b1d749fdcb62786900d7547c9e51fdfaff5c8a0d3e066576e6986fa05ae090de89a23ad0c977ef085f0161f5e8b826b8d7e5d76b5c06ce6880e19098e8202249a37cb3afe75b6b42d1443ae07e3e6b12746035bc115ac022d7d226f8f094b38a6a258ca17e3aef68aed3246ab6a8c67e26482975c72537e7268d676891113ff7c57113268e9e1c993a66d22faf7341ab00b1a4b9917287481795830a1ac8fa6fa686819b41c4cee3edf277517aa1ba9a37932d1d85d552f1591ef472de6a64483730f95573991338b42fcf1bef2cb377743c5409418a42fccb79599f274b34a933e1395623ff5423a102580be09be06a0b852bb9e9f7146c13438c633f1dbe14b96daecb1f9bc33080f646929db3b07014f03f3866a580375410b04fce34501c2af113b50186a288fd42544e9fc20ae832797ce43abb8057193fa167804ec4b71a0735354804d2c2fb8f595781cce421cd1cd1fb98409347b7003853ed7d46387556d79bc993fd1a1911df4fd3d0ea565b0ed995670d50da920a2744132f926116b9a83e1137ce493d5f8a27494fdc4f594021fdf2adc71991eabb124126b49a565e0c4ce865ee8ba3837c1fdc6eaea6ddfa83cf7f3dd886b080c9f467bfcc7b92d08b830a7351be289e63ce2161e70081a4e85cddf1a2de179b91ddbcf137013b3899e26f554f3d06a5999495a9652a02697666f0fe46a5706399c1b836362baa9b7d25a7837621a8672f47ed1ec404074c9e2019c3687706de51aad8d545728a9a4b4b095d41bfedf650be8ec09630fc6533c429d206c410c5f14361a7c74559d2b27a964adce7adda4bac1a66e6e0669883d1a62218034dec25989c7e6e95f9170aad5e00b9a41f0b7cc6b5db6845850f6405a23f0ad3b278b22a3074af73f895dfa31d5615afec03f01ffc49e86a46ee250434df905f2acde862476b997fbc1ce009496de0a85ddccb2940bc3928fa8c0a1d97b898b66dca8c6ca48ff908cc5aac020a6e967769e4eb709d3e3df2b3bc5642b8325a784b8ff704df6169bc7194db66fafa9add44e9bb4140fe9c47b2eff22b64f69d56d289afb45d90091bb09404b83bcfd224a7f7b5147372d07dcec7b8f2fafa74cf309cda0da251670b44f0a201c92d0c2ca6c5ea40d79c5cc9aeeea39cc55c4a0d29378587f9b369da2235cb57c37e05a7d678d1e1ef4211d2da859cac61aaa6f02b2a4d7ac9d88ba05e1553a36d7952a8f9847ec35c5cfe7396284f6142de381db4df4b3b0b05f78336a8b4659c54c8082606c751ec3b6ce1fd658a1a6eadbd3eef8d6b805ec0f102717c236d1907928bde84157a3f3b8d569c8e087859ecb597a89630b89696e4be8fd217d3b194d2a1d83d1a503d9ed64417a5f0130f6b49388181290e902f9f44ac6bea778a868b87c7c5b74054bba0b2fca382de04c2043cb7fffbfc77f598e295cf2cda91437240ea4e998c130c36e716345383e6044692b561fc2cd44fee635e4a5ab3764cb8ad5da46b0b7f9951e8b02d5d70036c0b23b848a3a7320e9d87f238c102e2049940b2c2dc1b216eed7c43989ccc460a23860b604a9a28256dbc7e47ab342fd7cc5f575a723a999dec82fcfc457d76d5f069774b2f4798a1cf791dd16358ce948e1604158dda0b9146e3f86a7cde379318e8ce275a2909b380b6b4afe010653b856b092b3975f745b1679b055dd98f211ae078042cb1f8add1767da72b56790380d4a3256ce6840edc79bde3d7ca12cc78852a9a574ad4ed02dee9f7490d69151b253c819125488899e622c1602f471ae5b645b037febbee3b6cdfecbcdc3bf56a621983294cb8a12e836eafecc4932a09d00b66ab4e1c0c150331b2466de28c8bb07790e2996b0232a22fa49d02e5c0b5042d54a94a6cd955d38d8b94487aae39500d7399e4a5ce565067e46435f97f6b7bda627739ab3a7a9e004850c88c283edb7dc084ce1cf8932c74274aa63ea4a6fcfc3158149bf0a921839f0e0eaa72f2973f618bf6e3e56b7e57b16e38b50891b75d89ad878d657b6919c3c2405c3d4aef51a009496b1b965b3c415c41cb0c3bb08556a6035e72f60f7cfea8cb52e1ca0464e6c7790ee72167aecd087e34b12145a3fe6067ec8b9213126249741edac4ae9be1ec437631cf00346401a7ab2643fab2a801ffe6398b1b52562e7936e9a6b43a6b3a773a3944c7ead86506b8f19d02f84a3bcfe39d5fae5586839e6965dbd20d15c6e8ecf2502ca931c545c92bc50d31a09f82c90a46df1e1a1c279971488cc9d494fe061d9c42770059990a7edaf140097001ea3eb0ec2f94cef5897bc045ba73ee9a35e21180c253cc46ccd2bae44d79ed590e0b6be176cedab0f2f741f4a1673cc7bdede9695ee11f017aa596badfd308ce05717d5da728c4504d4e59447a29a4cee66ad1bef1b680085a8fb3565fac3a316ed8c804a2d7858c29876b830b07914fa13b05e2fbc27c2fa1435b415f943e601ade603f391225c702c2d7256b31c86c09336f9a8d9f40711727b392c5f60ae606f6f883b0148466e320815d25ec2e093597a12620b02fbdaa41ca1ec8671d33150bbfb26f163eee1a49c630286520cfdeb0071d823d40966ad1eaf66c64609bc5ffc14a13e23f3e6ad441018ed2c5e80b52e079a08e3963327f279e4cf1d340dc317a6c3f23ec959e74d0f474795628b308b21f9c0c59521f835bcbbc6", 0x1000}, {&(0x7f0000002740)="64ae5533308b1aec3488332852003585b30bd9b9613d1c071b7fb7f594aa1a9a103b166e4e33989bfb3f5a43e69c7ae8c5bd1e5320b5ebddfa8ba23b6f1534ff96108e1f7427f0c30895b3116d46a573a02054c2bed8dc420c08457c4632c2d405a5c9981f9c116a2a3da8aa2eb9b1245864cb7f0a75adadfa47a24af08c955d1849c895e4fdfacbe52171532df3f75f19d5224d50c664f731ee116b3dbff7c8c3b972e24d98b729f745", 0xaa}, {&(0x7f0000002800)="fe02c2a46636e7f7784739f3b8f7a3e98cd1d4b60d3298fcba15f612f8086e858a7d6dd94f005ae2599ea64aecf03a990c2bc21967e42cfcef7605ce93361f987790d8a11096534943aa5872b77d93ea03939b602a707a61fa", 0x59}, {&(0x7f0000002880)="b6558e1735eaefcf6778e85085e8ada9855c4e324a2cc52a21fcbb5b23b7b31ca34c543fe48a7b73d5638774e8c33f89aa545bdae7ba1dd4d47f179f0f0e8299ffe74a7a59b99321ae1cb45c3894beefb7d98ab043d685295f37c1b069e70cb72c525bef13ada1b29b3bb8a910b4bbc495eba6dbbb99093c2d3f3d0b4f7982", 0x7f}, {&(0x7f0000002900)="45e43c7bfc0a3339e3fde583a2c71b866b17d00ae4ec991f50c6a889fd6dea1ec1e451ba0a7922e82e090f92cb5fab5b5c333fffafa8a85ac70954e97366660faabf6f4d650ab0b50b8c04cb88724c2567ce33ebeddc628a02a328c7d0ae60bf4ffc79a0843c2cc9f02ff8ca1b227080bc916ca8e0949d3787b737254ef4d5ba03e6f6007f9cd102944f6b60594a2e", 0x8f}, {&(0x7f00000029c0)="21f249ece309b70b446b95f2ba9d497b90cbe2f431bb049ff257dfa595881c7274f14e93199856c53e41aa8d98f19bf03c72eaa9f5cd40dd353107b756baaea69a031d4176e24d3f7625c84622e02c8be6c98990031899ffcc71028c6e21e70609adbddcc90989eb41abaffb1ed8d24256a45fc65a805ff3f72c740d35caff5b193c110c9853ad0aeea88c387b2df4b1bc43aa04415cdd28a2eb9605b26665f3a726bfb043ba08cb1a79bc0907568a15e46457147427653cb702e3ba09b0ff3654cc65aed2469a0987d0b1a9e39f525ac69304c2fe", 0xd5}, {&(0x7f0000002ac0)}, {&(0x7f0000002b00)="bebfcbfc0ef441643eae0e1688e621c1608560d9ba932e4c47ca852e00fe711907ec78a390b8cbb78dce6aff4e65627352539da2a7528ecb98ed3eeb10a9eab682e2f43656a653e449d85eb8f416f72573dbb52193024d935e296de2996f96b3620a2bdc9f84d8d2141a702f3a8960b1bd0de5d2e3908ad285ba5e33d22823cf4ea3711276b7acf4ab8cbe74bcb67f8ea6d8c361cb918520933f507e71af8134595079b3b9fc7378344671206f017ac673f57f445814ac5ec0284dafe69eac97431106de3787426d093c020c470fafa2c3580e5578a048d85aebfb64187fd63d52f4ae3145afeda08553b233b5b63994724a4e953cb150d799", 0xf9}], 0x8, &(0x7f0000002c80)=[@tclass={{0x14, 0x29, 0x43, 0x3}}, @dstopts_2292={{0x140, 0x29, 0x4, {0x2e, 0x24, '\x00', [@hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x20, {0x1, 0x6, 0x6, 0x1f00, [0x6, 0x36d0c970, 0x0]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x1, 0xd5, "6742daf6041aedd4bf77ba6bd5923f6a2e23efe114d87a98174131f1b0f72b8f1113c88db0be311995f398468d3ce3e13095b1241abfbe8b891d0d12d3a00375a417aebf9a9be3abe0db2abaf3d5d976b68e726a773ebd1689ebececa34199a02666915d66149524242ef435d5bcdf19392b9515bcb25a0ecc4bec6af02be61d6d02864f55a109321c2ea325de5b32edd4a3768c260c67f3ba243e91c40111d27122d601d8b9113b10e43f145f255e25a16474e6a6c32ed25c2bc6f087e90fb4fb06b3a52be12a47c93c49a9ae79c35d70ed95c032"}, @enc_lim={0x4, 0x1, 0x2}, @jumbo={0xc2, 0x4, 0x9}, @enc_lim={0x4, 0x1, 0x7f}, @pad1]}}}, @rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x8, 0x0, [@mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xf7b6}}, @flowinfo={{0x14, 0x29, 0xb, 0x40}}, @dstopts={{0x48, 0x29, 0x37, {0x9d, 0x5, '\x00', [@enc_lim={0x4, 0x1, 0x6}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x5b}, @ra={0x5, 0x2, 0x7}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x1, 0x2, 0x6, 0x4, [0x0]}}, @pad1]}}}], 0x208}}, {{0x0, 0x0, &(0x7f00000043c0)=[{&(0x7f0000002ec0)="1461f540f87e224393f626e378841e85735e390900d950883822503e43a70e2f855365bc19f8288beec9fefb37de31c0d8b652c63f010087b5682eb7a833d649b54adbb5962b36b44970f5bd5f2f9793b85847b713d4460aa5e545f165f2e2e69527f88822d6de80edfb6143fa6c2622a7a5a89e3d4881a2be5bd78385bd9c7b5fdfbe", 0x83}, {&(0x7f0000002f80)="d85c88b6d519ecc4070687c711ac624fa0ba15a04de29af9a548", 0x1a}, {&(0x7f0000002fc0)="2ab036f48aa7651f97abfd50bc857f1a40772fc5527fdeb7dcb35ef25c71a86d99c70716ed79dce935e3b853820ceec2b517da938c09e4ace1921c374f6b2753eb4d8188e70c1d937dce3f44489c946458db0e3ad57be774bfd31e061b1712d1cdacb9e953644cebcf9653d68d5b8ffa0c822a6fd23abe8637f64112ce43a478cffc981fddc41c0381d3f4cb28ee43dfefda270afb2bf23ea313e59ecc5bbc6232a26abbf35c8fdfe5451a9e4e88736064a18318daf6e3101b23f08dfea74e7c6be6080a1bc785fe7f1dfb089f98f036c5d30e40cfabd319cf4581bc7c", 0xdd}, {&(0x7f00000030c0)="c4cde06e5ffef048ab27fc4ac388c7d37981b2ab9d5d9a89463bc2c6e0bf99032291a263ffe074c6ef460fdf4b0c57db395577277c74b6191a9d5ea37b9eb0c7e47dc1d973cc423b28c9481e24838b0a8094eb078b55898caa30a2306cf1f5f902ff5a4fec019193aa22c2c56aef43e3dbae937900651f75df9ad60e8bcd6ac14588f1dbc8b5beb31c6db00384f0e4a9892c77ce1bbdfb4e55ad950cc0c22dc953efc16a55c49529c557209287a0c23617c5caebf9994d47b03798a7eeb4c70957f19bc5d59a828481b22ae2c2c86af260af203bc874fd", 0xd7}, {&(0x7f00000031c0)="bf9db2af7db359e2c3c6abd01dc6899f4276015ce1577d453690423d17c341262c2a8df3feac50bdfc9a2f98aacf50ad77419533167717c5cd6724c82ca7f1dffd45ff0d637d69a4b867f50e5257e976d3557e38075117f6d7ac09e526662be129f5757304dffd0f34f81478d5fa1487c4814b20464f042cfe6397cea3c6c1e566c47e0442e87e9b6c488f422aa2786f38a8b73402a25c529f14648d4e732ea3c80aee73cc6d9412a31e216584b621ddea92940ae8aa38754d445ba66d9b667a5f0c742c5d7d7090436448f7a631310d001818ae84e2e02d834d", 0xda}, {&(0x7f00000032c0)="77bbe18f6ffdaef3ae84994eb1f8162dcb15ef7ce04383181fe4652c7140bc0e4257a0b846f9d59a379e199873a01460cd9997b04cf942aa8936835296016a5654bdcab210b9a6d5b053166414555e41989736f25519d1d2ee8777c8f7c522d64ee2354b439d519549198181c1c4b4a811", 0x71}, {&(0x7f0000003340)="4ccd726ec81eedbc925dd81e6e7ada04d1fccdb573371f00f3738fe3a68426e9c98e65aac9b30c5003a4e891a43f95434146fbf80b1ce59b5e6188174feebd30294c45d7bb6931460aa529cc70de3b35196851372533feb69ff5d9533dba3d831416454f06c20c3a1f92d87f9e548080663145d2cc27f94ec1109ee295", 0x7d}, {&(0x7f00000033c0)="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", 0x1000}], 0x8}}, {{&(0x7f0000004440)={0xa, 0x4e24, 0x6, @remote, 0x8001}, 0x1c, &(0x7f0000004580)=[{&(0x7f0000004480)="b344b987e96e8a6a38175460223d7800f920ed83739b71d043b247e29dba78", 0x1f}, {&(0x7f00000044c0)="43d3ad47434f3cd47e11ada6257c800b904f6a23da80ce0440b777fe8be3af26709ba71263a35bbe4d8961ac5880a4fb6db1e09d96dcc7961496780be3fd22c369ce688ff7d1a4f48d9ea2af121c5e9aa095c260e79b9c6bbec9ec3601c1f692693accd86b16e9ce6eefb4225026cd34aeeaa542dfd6d74d46360d6f1fecd410192066aaaa7a66f212632e91ebdf2b26f3cc5a4377af389db5e0914e9fab24b8c530176a323a0cf245a0911af8682f840ac96e391d", 0xb5}], 0x2}}, {{&(0x7f00000045c0)={0xa, 0x4e21, 0xffffffff, @empty, 0x6}, 0x1c, &(0x7f00000046c0)=[{&(0x7f0000004600)="f35d0237aedc9aa8aca89070882b5d9daeba684a0939d5f1fd956486360afb850c0dc09320c3e85618bb0b40c6bd1b3e414e0ec4a6d324ead907a0ac1d7eb4684db9e9e98b200970856edc84c9a798c588f71ec67ebd37c8a091470fff1fe49b0e4b52d6803b24b8f20dd13630c7f54375aeaafb907235dd818264f14dc4df31a6a10cb649f93f4c5475499c32508296bc", 0x91}], 0x1}}], 0x6, 0x8000) (async) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1) 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000010000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1) socket$inet6(0xa, 0x3, 0x3) (async) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1) (async) 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 454.375879][T27340] loop5: detected capacity change from 0 to 264192 [ 454.406672][T27349] loop4: detected capacity change from 0 to 264192 18:38:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1) 18:38:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000005bb00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 1: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xffffffff) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18}}], 0x30}, 0x0) 18:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000010000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xffffffff) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18}}], 0x30}, 0x0) [ 454.608046][T27363] loop5: detected capacity change from 0 to 264192 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xffffffff) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18}}], 0x30}, 0x0) 18:38:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 454.697928][T27378] loop4: detected capacity change from 0 to 264192 [ 454.780148][T27383] loop5: detected capacity change from 0 to 264192 18:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x1, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@dstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x8001}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x9, 0x1, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x48}, 0x40000) 18:38:18 executing program 1: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x1, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@dstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x8001}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x9, 0x1, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x48}, 0x40000) 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x1, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@dstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x8001}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x9, 0x1, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x48}, 0x40000) [ 454.960844][T27395] loop5: detected capacity change from 0 to 264192 18:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18) socket$inet6(0xa, 0x6, 0x3257) sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88) 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 455.037773][T27404] loop4: detected capacity change from 0 to 264192 18:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 455.080206][T27409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=27409 comm=syz-executor.0 18:38:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18) socket$inet6(0xa, 0x6, 0x3257) sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88) socket$netlink(0x10, 0x3, 0x0) (async) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0) (async) socket$inet6(0xa, 0x3, 0x3) (async) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18) (async) socket$inet6(0xa, 0x6, 0x3257) (async) sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c) (async) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) (async) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0) (async) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88) (async) 18:38:18 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000080000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 455.182026][T27419] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=27419 comm=syz-executor.0 [ 455.206002][T27420] loop1: detected capacity change from 0 to 264192 [ 455.216668][T27422] loop5: detected capacity change from 0 to 264192 18:38:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18) socket$inet6(0xa, 0x6, 0x3257) sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88) socket$netlink(0x10, 0x3, 0x0) (async) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0) (async) socket$inet6(0xa, 0x3, 0x3) (async) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18) (async) socket$inet6(0xa, 0x6, 0x3257) (async) sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c) (async) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) (async) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0) (async) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88) (async) 18:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 455.274706][T27435] loop4: detected capacity change from 0 to 264192 18:38:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 455.328723][T27443] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=27443 comm=syz-executor.0 18:38:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000) recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c) 18:38:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000080000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 455.504523][T27468] loop5: detected capacity change from 0 to 264192 18:38:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 455.568886][T27474] loop1: detected capacity change from 0 to 264192 18:38:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 455.614118][T27478] loop4: detected capacity change from 0 to 264192 18:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 455.774445][T27491] loop5: detected capacity change from 0 to 264192 18:38:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000) (async) recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c) 18:38:20 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000100000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 456.311940][T27494] loop4: detected capacity change from 0 to 264192 [ 456.318582][T27500] loop1: detected capacity change from 0 to 264192 [ 456.318734][T27498] loop5: detected capacity change from 0 to 264192 18:38:20 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 456.465897][T27513] loop4: detected capacity change from 0 to 264192 [ 456.466718][T27514] loop1: detected capacity change from 0 to 264192 [ 456.500876][ T1913] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 456.584897][T27518] loop5: detected capacity change from 0 to 264192 18:38:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000) recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c) socket$inet6(0xa, 0x3, 0x3) (async) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0) (async) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000) (async) recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c) (async) 18:38:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:20 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 457.186758][T27527] loop1: detected capacity change from 0 to 264192 [ 457.187128][T27528] loop4: detected capacity change from 0 to 264192 [ 457.204884][T27532] loop5: detected capacity change from 0 to 264192 18:38:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000100000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:21 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 457.349407][T27550] FAT-fs (loop1): bogus number of reserved sectors [ 457.356058][T27550] FAT-fs (loop1): Can't find a valid FAT filesystem [ 457.365330][T27545] loop4: detected capacity change from 0 to 264192 18:38:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:21 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:21 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:21 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 458.044468][T27561] loop4: detected capacity change from 0 to 264192 [ 458.055941][T27558] FAT-fs (loop1): bogus number of reserved sectors [ 458.062489][T27558] FAT-fs (loop1): Can't find a valid FAT filesystem [ 458.071309][T27564] loop5: detected capacity change from 0 to 264192 18:38:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 458.186001][T27573] loop4: detected capacity change from 0 to 264192 18:38:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006490000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 458.423023][T27587] loop4: detected capacity change from 0 to 264192 [ 458.429774][T27586] FAT-fs (loop1): bogus number of reserved sectors [ 458.436299][T27586] FAT-fs (loop1): Can't find a valid FAT filesystem [ 458.441503][T27589] loop5: detected capacity change from 0 to 264192 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 458.605249][T27607] loop4: detected capacity change from 0 to 264192 18:38:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 458.813108][T27615] loop4: detected capacity change from 0 to 264192 [ 458.820023][T27618] loop5: detected capacity change from 0 to 264192 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffff9e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffffef0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 4: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff00000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 4: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff50000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 459.196252][T27641] loop5: detected capacity change from 0 to 264192 18:38:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffff9e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffffe0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 4: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005bb0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 459.389049][T27666] loop1: detected capacity change from 0 to 264192 [ 459.419512][T27666] FAT-fs (loop1): bogus number of reserved sectors [ 459.426067][T27666] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100007fffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffffef0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100009effffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 459.582592][T27676] loop4: detected capacity change from 0 to 264192 [ 459.590022][T27674] loop1: detected capacity change from 0 to 264192 [ 459.596795][T27675] loop5: detected capacity change from 0 to 264192 [ 459.611868][T27674] FAT-fs (loop1): bogus number of reserved sectors [ 459.618454][T27674] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff00000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000efffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff50000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 0: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 459.770112][T27692] loop1: detected capacity change from 0 to 264192 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f0ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 459.828060][T27692] FAT-fs (loop1): bogus number of reserved sectors [ 459.830886][T27698] loop4: detected capacity change from 0 to 264192 [ 459.834658][T27692] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffffe0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f5ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100007fffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000feffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 459.980978][T27713] loop5: detected capacity change from 0 to 264192 18:38:23 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100009effffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000010000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 460.073438][T27721] loop1: detected capacity change from 0 to 264192 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000efffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 460.130210][T27721] FAT-fs (loop1): bogus number of reserved sectors [ 460.136803][T27721] FAT-fs (loop1): Can't find a valid FAT filesystem [ 460.137792][T27725] loop4: detected capacity change from 0 to 264192 18:38:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f0ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f5ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 460.316172][T27739] loop1: detected capacity change from 0 to 264192 [ 460.347650][T27739] FAT-fs (loop1): bogus number of reserved sectors [ 460.354249][T27739] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 460.377587][T27742] loop5: detected capacity change from 0 to 264192 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000feffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000010000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 460.482639][T27752] loop4: detected capacity change from 0 to 264192 18:38:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 460.648485][T27763] loop1: detected capacity change from 0 to 264192 [ 460.662840][T27763] FAT-fs (loop1): bogus number of reserved sectors [ 460.669348][T27763] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 460.714958][T27772] loop4: detected capacity change from 0 to 264192 [ 460.737598][T27774] loop5: detected capacity change from 0 to 264192 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 460.932935][T27787] loop1: detected capacity change from 0 to 264192 [ 460.947927][T27787] FAT-fs (loop1): bogus number of reserved sectors [ 460.954564][T27787] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000b00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.027562][T27794] loop4: detected capacity change from 0 to 264192 18:38:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.101336][T27803] loop5: detected capacity change from 0 to 264192 18:38:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000d00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.214380][T27808] FAT-fs (loop4): bogus number of reserved sectors [ 461.220948][T27808] FAT-fs (loop4): Can't find a valid FAT filesystem [ 461.232776][T27815] loop1: detected capacity change from 0 to 264192 [ 461.272036][T27815] FAT-fs (loop1): bogus number of reserved sectors [ 461.278746][T27815] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000f00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.420999][T27825] loop5: detected capacity change from 0 to 264192 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.493992][T27834] loop1: detected capacity change from 0 to 264192 [ 461.517712][T27837] FAT-fs (loop4): bogus number of reserved sectors [ 461.524315][T27837] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.547223][T27834] FAT-fs (loop1): bogus number of reserved sectors [ 461.553875][T27834] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000b00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.708619][T27854] FAT-fs (loop4): bogus number of reserved sectors [ 461.715180][T27854] FAT-fs (loop4): Can't find a valid FAT filesystem [ 461.720784][T27856] loop1: detected capacity change from 0 to 264192 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000d00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.767802][T27856] FAT-fs (loop1): bogus number of reserved sectors [ 461.774413][T27856] FAT-fs (loop1): Can't find a valid FAT filesystem [ 461.782725][T27863] loop5: detected capacity change from 0 to 264192 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 461.815420][ T2193] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000f00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$inet6(0xa, 0x3, 0x3) 18:38:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.012782][T27884] loop1: detected capacity change from 0 to 264192 18:38:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000002500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000004000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.057674][T27889] loop5: detected capacity change from 0 to 264192 [ 462.076701][T27884] FAT-fs (loop1): bogus number of reserved sectors [ 462.083320][T27884] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000064900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 462.296536][T27908] loop1: detected capacity change from 0 to 264192 [ 462.310046][T27908] FAT-fs (loop1): bogus number of reserved sectors [ 462.316620][T27908] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000005c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.347370][T27913] loop5: detected capacity change from 0 to 264192 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000006000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000007c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000008000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.606347][T27936] loop1: detected capacity change from 0 to 264192 [ 462.608223][T27939] loop4: detected capacity change from 0 to 264192 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000002500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.647645][T27939] FAT-fs (loop4): bogus number of reserved sectors [ 462.649388][T27936] FAT-fs (loop1): invalid media value (0x00) [ 462.654209][T27939] FAT-fs (loop4): Can't find a valid FAT filesystem [ 462.666825][T27936] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000004000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffff9e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.716276][T27947] loop5: detected capacity change from 0 to 264192 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000005c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.789427][T27953] loop4: detected capacity change from 0 to 264192 [ 462.798146][T27953] FAT-fs (loop4): bogus number of reserved sectors [ 462.804727][T27953] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffef00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd=r2, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)="8037ea1d83ecfff664c9c625e388e67156ea3021693421f7eaf10f681ffc0769af92e722b272af72ecb87de7716b7d83fe4bcee6251b8addfbb3871cbf135b27d8ea96cfb63e1449d938c21147fb9bf4ab39b4886273bbea0af395d4ea168b1b", 0x60}, {&(0x7f0000000480)="0c2b8933724984213ab323932520803d48db6a8eb34ceef3bd808b4085c8743e9ff72b8f3188b648a64c8cfe5d56e4725fc74f45db92aa1b13d817c1fbc54052a1d6c430a80426f3f5af9a00609b8b98a018866a5955fddbe4480a4c004b83953e16e177fd6bff708e4142b4e545420db7c040e08f99900323b223f9e8d3090be22d383c1f06543b33a393c9af53", 0x8e}, {&(0x7f0000000380)="4c21679626c2d1fd68c9b8b2a4634a4de13d86f554643751dd693c0351e27011a7effd6ee57c2df3149626749a3f5c85cba130780906a1400a5de8eefc65ee99e8e347f469a135ff9075f546027ac4056b2e", 0x52}, {&(0x7f0000000540)="70d201eff1171fb67bace0d0e66fe3d0f54416a222f896587e917c1e048b49e95ae39864453dd29c9bb16018042fd8d9eda13508519a2c3b20b20d6cc4357497bb7b3d1468bfba97c53dd683ddf057f678c35962f5a0b026734a6ef492df3981906cc7bade00f4f47f310d6333a8a3e63e4792f964274564f2d715026eb77fb63582096328e20d0827ead83d44156857a92b002c9d0a012755b9cfa2a9663a1208984b7ca436f3f63fc49d2da4f7166bf654858168a488a2138f21eb51672f1409add63497a03e173bcd78f90b29f95ee8558d47fff0a4fe", 0xd8}, {&(0x7f0000000180)="87f4", 0x2}, {&(0x7f0000000640)="08b8a026ddd2ccc72392435945e79510031c043ede5ab19d1f8c7c5ff69562e6b8ddde51d872102e6768f08ff5038b73fe8b5cdfeaa49e3b768e0707a9d106b3873359607b5abba8a0792c70ca3e40d24bce9f826e38d3a787b13c7bedd0ede50576d5a851d6bc67ee4345338d4573bc72260af16157b27818", 0x79}, {0x0}], 0x7, 0x10, 0x0, {0x2, r3}}, 0x401) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x80}, 0x1, {0x0, r3}}, 0x8000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000006000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 462.914836][T27966] loop1: detected capacity change from 0 to 264192 [ 462.947299][T27966] FAT-fs (loop1): invalid media value (0x00) [ 462.953399][T27966] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 462.983789][T27970] loop5: detected capacity change from 0 to 264192 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffffe00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000007c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.053252][T27977] loop4: detected capacity change from 0 to 264192 [ 463.091105][T27977] FAT-fs (loop4): bogus number of reserved sectors 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007fffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000008000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.097766][T27977] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 18:38:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffff9e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 463.227474][T27993] loop1: detected capacity change from 0 to 264192 [ 463.256063][T27993] FAT-fs (loop1): invalid media value (0x00) [ 463.262122][T27993] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000005bb00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000300000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.278945][T27998] loop5: detected capacity change from 0 to 264192 [ 463.306718][T28001] loop4: detected capacity change from 0 to 264192 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffef00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.390971][T28001] FAT-fs (loop4): bogus number of reserved sectors [ 463.397516][T28001] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.492163][T28018] loop1: detected capacity change from 0 to 264192 [ 463.529204][T28018] FAT-fs (loop1): invalid media value (0x00) [ 463.535260][T28018] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffffe00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.586922][T28027] loop5: detected capacity change from 0 to 264192 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000700000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007fffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.640575][T28034] loop4: detected capacity change from 0 to 264192 [ 463.657444][T28034] FAT-fs (loop4): bogus number of reserved sectors [ 463.664029][T28034] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) [ 463.759597][T28042] loop1: detected capacity change from 0 to 264192 [ 463.788344][T28042] FAT-fs (loop1): invalid media value (0x00) [ 463.794385][T28042] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.855761][T28053] loop4: detected capacity change from 0 to 264192 [ 463.876006][T28053] FAT-fs (loop4): bogus number of reserved sectors [ 463.882575][T28053] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000a00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000300000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 463.908679][T28057] loop5: detected capacity change from 0 to 264192 18:38:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000b00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.020475][T28066] loop4: detected capacity change from 0 to 264192 [ 464.055896][T28066] FAT-fs (loop4): bogus number of reserved sectors [ 464.062479][T28066] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd=r2, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)="8037ea1d83ecfff664c9c625e388e67156ea3021693421f7eaf10f681ffc0769af92e722b272af72ecb87de7716b7d83fe4bcee6251b8addfbb3871cbf135b27d8ea96cfb63e1449d938c21147fb9bf4ab39b4886273bbea0af395d4ea168b1b", 0x60}, {&(0x7f0000000480)="0c2b8933724984213ab323932520803d48db6a8eb34ceef3bd808b4085c8743e9ff72b8f3188b648a64c8cfe5d56e4725fc74f45db92aa1b13d817c1fbc54052a1d6c430a80426f3f5af9a00609b8b98a018866a5955fddbe4480a4c004b83953e16e177fd6bff708e4142b4e545420db7c040e08f99900323b223f9e8d3090be22d383c1f06543b33a393c9af53", 0x8e}, {&(0x7f0000000380)="4c21679626c2d1fd68c9b8b2a4634a4de13d86f554643751dd693c0351e27011a7effd6ee57c2df3149626749a3f5c85cba130780906a1400a5de8eefc65ee99e8e347f469a135ff9075f546027ac4056b2e", 0x52}, {&(0x7f0000000540)="70d201eff1171fb67bace0d0e66fe3d0f54416a222f896587e917c1e048b49e95ae39864453dd29c9bb16018042fd8d9eda13508519a2c3b20b20d6cc4357497bb7b3d1468bfba97c53dd683ddf057f678c35962f5a0b026734a6ef492df3981906cc7bade00f4f47f310d6333a8a3e63e4792f964274564f2d715026eb77fb63582096328e20d0827ead83d44156857a92b002c9d0a012755b9cfa2a9663a1208984b7ca436f3f63fc49d2da4f7166bf654858168a488a2138f21eb51672f1409add63497a03e173bcd78f90b29f95ee8558d47fff0a4fe", 0xd8}, {&(0x7f0000000180)="87f4", 0x2}, {&(0x7f0000000640)="08b8a026ddd2ccc72392435945e79510031c043ede5ab19d1f8c7c5ff69562e6b8ddde51d872102e6768f08ff5038b73fe8b5cdfeaa49e3b768e0707a9d106b3873359607b5abba8a0792c70ca3e40d24bce9f826e38d3a787b13c7bedd0ede50576d5a851d6bc67ee4345338d4573bc72260af16157b27818", 0x79}, {0x0}], 0x7, 0x10, 0x0, {0x2, r3}}, 0x401) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x80}, 0x1, {0x0, r3}}, 0x8000) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.103405][T28073] loop1: detected capacity change from 0 to 264192 [ 464.159151][T28073] FAT-fs (loop1): invalid media value (0x00) [ 464.165327][T28073] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0) 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000d00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd=r2, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)="8037ea1d83ecfff664c9c625e388e67156ea3021693421f7eaf10f681ffc0769af92e722b272af72ecb87de7716b7d83fe4bcee6251b8addfbb3871cbf135b27d8ea96cfb63e1449d938c21147fb9bf4ab39b4886273bbea0af395d4ea168b1b", 0x60}, {&(0x7f0000000480)="0c2b8933724984213ab323932520803d48db6a8eb34ceef3bd808b4085c8743e9ff72b8f3188b648a64c8cfe5d56e4725fc74f45db92aa1b13d817c1fbc54052a1d6c430a80426f3f5af9a00609b8b98a018866a5955fddbe4480a4c004b83953e16e177fd6bff708e4142b4e545420db7c040e08f99900323b223f9e8d3090be22d383c1f06543b33a393c9af53", 0x8e}, {&(0x7f0000000380)="4c21679626c2d1fd68c9b8b2a4634a4de13d86f554643751dd693c0351e27011a7effd6ee57c2df3149626749a3f5c85cba130780906a1400a5de8eefc65ee99e8e347f469a135ff9075f546027ac4056b2e", 0x52}, {&(0x7f0000000540)="70d201eff1171fb67bace0d0e66fe3d0f54416a222f896587e917c1e048b49e95ae39864453dd29c9bb16018042fd8d9eda13508519a2c3b20b20d6cc4357497bb7b3d1468bfba97c53dd683ddf057f678c35962f5a0b026734a6ef492df3981906cc7bade00f4f47f310d6333a8a3e63e4792f964274564f2d715026eb77fb63582096328e20d0827ead83d44156857a92b002c9d0a012755b9cfa2a9663a1208984b7ca436f3f63fc49d2da4f7166bf654858168a488a2138f21eb51672f1409add63497a03e173bcd78f90b29f95ee8558d47fff0a4fe", 0xd8}, {&(0x7f0000000180)="87f4", 0x2}, {&(0x7f0000000640)="08b8a026ddd2ccc72392435945e79510031c043ede5ab19d1f8c7c5ff69562e6b8ddde51d872102e6768f08ff5038b73fe8b5cdfeaa49e3b768e0707a9d106b3873359607b5abba8a0792c70ca3e40d24bce9f826e38d3a787b13c7bedd0ede50576d5a851d6bc67ee4345338d4573bc72260af16157b27818", 0x79}, {0x0}], 0x7, 0x10, 0x0, {0x2, r3}}, 0x401) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x80}, 0x1, {0x0, r3}}, 0x8000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 464.309963][T28088] loop4: detected capacity change from 0 to 264192 [ 464.324115][T28088] FAT-fs (loop4): bogus number of reserved sectors [ 464.327768][T28090] loop1: detected capacity change from 0 to 264192 [ 464.330687][T28088] FAT-fs (loop4): Can't find a valid FAT filesystem [ 464.347466][T28090] FAT-fs (loop1): bogus number of FAT sectors [ 464.353598][T28090] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000700000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000e00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.406731][T28097] loop5: detected capacity change from 0 to 264192 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000f00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0) 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 1) [ 464.569907][T28112] loop1: detected capacity change from 0 to 264192 [ 464.598667][T28112] FAT-fs (loop1): bogus number of FAT sectors [ 464.604955][T28112] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:28 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000a00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001100000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.614941][T28114] loop5: detected capacity change from 0 to 264192 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000b00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.652325][T28121] loop4: detected capacity change from 0 to 264192 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.709599][T28121] FAT-fs (loop4): bogus number of reserved sectors [ 464.716133][T28121] FAT-fs (loop4): Can't find a valid FAT filesystem [ 464.743000][T28117] FAULT_INJECTION: forcing a failure. [ 464.743000][T28117] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 464.756259][T28117] CPU: 1 PID: 28117 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 464.767279][T28117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.777333][T28117] Call Trace: [ 464.780610][T28117] [ 464.783537][T28117] dump_stack_lvl+0xd6/0x122 [ 464.788173][T28117] dump_stack+0x11/0x1b [ 464.792383][T28117] should_fail+0x23c/0x250 [ 464.796810][T28117] __alloc_pages+0x102/0x330 [ 464.801403][T28117] alloc_pages_vma+0x67e/0x810 [ 464.806230][T28117] new_page+0x121/0x170 [ 464.810386][T28117] migrate_pages+0x465/0x1810 [ 464.815147][T28117] ? mbind_range+0x846/0x8d0 [ 464.819772][T28117] ? do_mbind+0x760/0x760 [ 464.824151][T28117] do_mbind+0x5b7/0x760 [ 464.828343][T28117] __se_sys_mbind+0x151/0x410 [ 464.833021][T28117] __x64_sys_mbind+0x74/0x80 [ 464.837675][T28117] do_syscall_64+0x44/0xd0 [ 464.842128][T28117] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 464.848024][T28117] RIP: 0033:0x7fb80e59e059 [ 464.852433][T28117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 464.872069][T28117] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 464.880485][T28117] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 464.888452][T28117] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 464.896469][T28117] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 18:38:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0) 18:38:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 464.904435][T28117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.912406][T28117] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 464.920421][T28117] [ 464.937245][T28135] loop1: detected capacity change from 0 to 264192 [ 464.948478][T28135] FAT-fs (loop1): bogus number of FAT sectors 18:38:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 2) 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000d00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.954600][T28135] FAT-fs (loop1): Can't find a valid FAT filesystem 18:38:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 464.992279][T28138] loop5: detected capacity change from 0 to 264192 [ 465.104490][T28148] FAULT_INJECTION: forcing a failure. [ 465.104490][T28148] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 465.117896][T28148] CPU: 0 PID: 28148 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 465.129015][T28148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.139072][T28148] Call Trace: [ 465.142349][T28148] [ 465.145279][T28148] dump_stack_lvl+0xd6/0x122 [ 465.149882][T28148] dump_stack+0x11/0x1b 18:38:28 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000e00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 1) [ 465.154054][T28148] should_fail+0x23c/0x250 [ 465.158480][T28148] __alloc_pages+0x102/0x330 [ 465.163071][T28148] alloc_pages_vma+0x67e/0x810 [ 465.167923][T28148] new_page+0x121/0x170 [ 465.172157][T28148] migrate_pages+0x465/0x1810 [ 465.176955][T28148] ? do_mbind+0x760/0x760 [ 465.181351][T28148] ? remove_migration_ptes+0x90/0x90 [ 465.186644][T28148] do_mbind+0x5b7/0x760 [ 465.190806][T28148] __se_sys_mbind+0x151/0x410 [ 465.195504][T28148] __x64_sys_mbind+0x74/0x80 [ 465.200105][T28148] do_syscall_64+0x44/0xd0 [ 465.204664][T28148] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 465.210569][T28148] RIP: 0033:0x7fb80e59e059 [ 465.214990][T28148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 465.234735][T28148] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 465.241349][T28151] loop4: detected capacity change from 0 to 264192 [ 465.243206][T28148] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 465.243222][T28148] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 465.243235][T28148] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 465.271126][T28151] FAT-fs (loop4): bogus number of reserved sectors [ 465.273591][T28148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.280154][T28151] FAT-fs (loop4): Can't find a valid FAT filesystem [ 465.288085][T28148] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 465.302625][T28148] 18:38:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 3) 18:38:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000f00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 465.311057][T28153] loop1: detected capacity change from 0 to 264192 [ 465.333089][T28156] loop5: detected capacity change from 0 to 264192 18:38:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:29 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 465.436168][T28167] FAULT_INJECTION: forcing a failure. [ 465.436168][T28167] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 465.449438][T28167] CPU: 0 PID: 28167 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 465.460529][T28167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.470638][T28167] Call Trace: [ 465.473917][T28167] [ 465.476853][T28167] dump_stack_lvl+0xd6/0x122 [ 465.481528][T28167] dump_stack+0x11/0x1b [ 465.485694][T28167] should_fail+0x23c/0x250 [ 465.486438][T28170] loop4: detected capacity change from 0 to 264192 [ 465.490195][T28167] __alloc_pages+0x102/0x330 [ 465.490220][T28167] alloc_pages_vma+0x67e/0x810 [ 465.490242][T28167] new_page+0x121/0x170 [ 465.510411][T28167] migrate_pages+0x465/0x1810 [ 465.515104][T28167] ? do_mbind+0x760/0x760 [ 465.519604][T28167] ? remove_migration_ptes+0x90/0x90 [ 465.520784][T28170] FAT-fs (loop4): bogus number of reserved sectors [ 465.524966][T28167] do_mbind+0x5b7/0x760 [ 465.531519][T28170] FAT-fs (loop4): Can't find a valid FAT filesystem [ 465.542283][T28167] __se_sys_mbind+0x151/0x410 [ 465.547074][T28167] __x64_sys_mbind+0x74/0x80 [ 465.551683][T28167] do_syscall_64+0x44/0xd0 [ 465.556157][T28167] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 465.562090][T28167] RIP: 0033:0x7fb80e59e059 [ 465.566498][T28167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 465.586140][T28167] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 465.595078][T28167] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 465.603109][T28167] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 465.611083][T28167] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 465.619339][T28167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.627308][T28167] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 465.635283][T28167] [ 465.641386][T28168] FAULT_INJECTION: forcing a failure. [ 465.641386][T28168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 465.654640][T28168] CPU: 1 PID: 28168 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 465.665701][T28168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.675761][T28168] Call Trace: [ 465.679037][T28168] [ 465.681968][T28168] dump_stack_lvl+0xd6/0x122 [ 465.686606][T28168] dump_stack+0x11/0x1b [ 465.690840][T28168] should_fail+0x23c/0x250 [ 465.695266][T28168] __alloc_pages+0x102/0x330 [ 465.700823][T28168] alloc_pages_vma+0x67e/0x810 [ 465.705598][T28168] new_page+0x121/0x170 [ 465.709803][T28168] migrate_pages+0x465/0x1810 [ 465.714558][T28168] ? mbind_range+0x846/0x8d0 [ 465.719314][T28168] ? do_mbind+0x760/0x760 [ 465.723652][T28168] do_mbind+0x5b7/0x760 [ 465.727834][T28168] __se_sys_mbind+0x151/0x410 [ 465.732555][T28168] __x64_sys_mbind+0x74/0x80 18:38:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 4) [ 465.737171][T28168] do_syscall_64+0x44/0xd0 [ 465.742653][T28168] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 465.748664][T28168] RIP: 0033:0x7f0d68981059 [ 465.753079][T28168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 465.772848][T28168] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 2) [ 465.781359][T28168] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059 [ 465.792949][T28168] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 465.802423][T28168] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002 [ 465.810584][T28168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.818585][T28168] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000 [ 465.826593][T28168] [ 465.862553][T28175] FAULT_INJECTION: forcing a failure. [ 465.862553][T28175] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 465.876329][T28175] CPU: 1 PID: 28175 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 465.887472][T28175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.897702][T28175] Call Trace: [ 465.901531][T28175] [ 465.904573][T28175] dump_stack_lvl+0xd6/0x122 18:38:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000002500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:29 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 465.909243][T28175] dump_stack+0x11/0x1b [ 465.913409][T28175] should_fail+0x23c/0x250 [ 465.917834][T28175] __alloc_pages+0x102/0x330 [ 465.922432][T28175] alloc_pages_vma+0x67e/0x810 [ 465.927248][T28175] new_page+0x121/0x170 [ 465.931483][T28175] migrate_pages+0x465/0x1810 [ 465.936321][T28175] ? do_mbind+0x760/0x760 [ 465.940682][T28175] ? remove_migration_ptes+0x90/0x90 [ 465.946028][T28175] do_mbind+0x5b7/0x760 [ 465.950325][T28175] __se_sys_mbind+0x151/0x410 [ 465.954245][T28181] loop4: detected capacity change from 0 to 264192 [ 465.955009][T28175] __x64_sys_mbind+0x74/0x80 [ 465.955033][T28175] do_syscall_64+0x44/0xd0 [ 465.955093][T28175] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 465.976527][T28175] RIP: 0033:0x7fb80e59e059 [ 465.980894][T28181] FAT-fs (loop4): bogus number of reserved sectors [ 465.980949][T28175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 465.980970][T28175] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 [ 465.987470][T28181] FAT-fs (loop4): Can't find a valid FAT filesystem [ 466.007380][T28175] ORIG_RAX: 00000000000000ed [ 466.007390][T28175] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 466.007403][T28175] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 466.040761][T28175] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 466.048797][T28175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:38:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001100000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 466.056778][T28175] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 466.064754][T28175] 18:38:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 5) 18:38:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000005c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 466.104220][T28185] loop5: detected capacity change from 0 to 264192 18:38:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 466.152743][T28190] loop1: detected capacity change from 0 to 264192 [ 466.216641][T28194] FAULT_INJECTION: forcing a failure. [ 466.216641][T28194] name failslab, interval 1, probability 0, space 0, times 0 [ 466.229617][T28194] CPU: 1 PID: 28194 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 466.240737][T28194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.250834][T28194] Call Trace: [ 466.254112][T28194] [ 466.257035][T28194] dump_stack_lvl+0xd6/0x122 [ 466.261632][T28194] dump_stack+0x11/0x1b [ 466.266148][T28194] should_fail+0x23c/0x250 [ 466.270675][T28194] ? mempool_alloc_slab+0x16/0x20 [ 466.275880][T28194] __should_failslab+0x81/0x90 [ 466.280785][T28194] should_failslab+0x5/0x20 [ 466.285353][T28194] kmem_cache_alloc+0x4f/0x320 [ 466.290131][T28194] mempool_alloc_slab+0x16/0x20 [ 466.294989][T28194] ? mempool_free+0x130/0x130 [ 466.299696][T28194] mempool_alloc+0x9d/0x310 [ 466.304202][T28194] ? __rcu_read_unlock+0x45/0x290 [ 466.309351][T28194] ? __this_cpu_preempt_check+0x18/0x20 [ 466.314999][T28194] bio_alloc_bioset+0xcc/0x560 [ 466.319853][T28194] submit_bh_wbc+0x133/0x320 [ 466.324512][T28194] __block_write_full_page+0x648/0xa10 [ 466.329984][T28194] ? mark_buffer_write_io_error+0x180/0x180 [ 466.336304][T28194] ? fat_block_truncate_page+0x30/0x30 [ 466.341811][T28194] ? fat_block_truncate_page+0x30/0x30 [ 466.347356][T28194] block_write_full_page+0x1f0/0x210 [ 466.352657][T28194] fat_writepage+0x20/0x30 [ 466.357261][T28194] move_to_new_page+0x2f6/0x520 [ 466.362215][T28194] ? remove_migration_ptes+0x90/0x90 [ 466.367917][T28194] migrate_pages+0xdec/0x1810 [ 466.372774][T28194] ? do_mbind+0x760/0x760 [ 466.377112][T28194] do_mbind+0x5b7/0x760 [ 466.381311][T28194] __se_sys_mbind+0x151/0x410 [ 466.385989][T28194] __x64_sys_mbind+0x74/0x80 [ 466.390653][T28194] do_syscall_64+0x44/0xd0 [ 466.395206][T28194] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 466.401176][T28194] RIP: 0033:0x7f0d68981059 [ 466.406022][T28194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 466.425633][T28194] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 466.434424][T28194] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059 [ 466.442668][T28194] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 466.450677][T28194] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002 [ 466.458795][T28194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.467028][T28194] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000 [ 466.474991][T28194] [ 466.481421][T28197] FAULT_INJECTION: forcing a failure. [ 466.481421][T28197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 466.495174][T28197] CPU: 0 PID: 28197 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 466.506298][T28197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.516352][T28197] Call Trace: [ 466.519639][T28197] [ 466.522588][T28197] dump_stack_lvl+0xd6/0x122 [ 466.527260][T28197] dump_stack+0x11/0x1b [ 466.531445][T28197] should_fail+0x23c/0x250 [ 466.535988][T28197] __alloc_pages+0x102/0x330 [ 466.540588][T28197] alloc_pages_vma+0x67e/0x810 [ 466.545414][T28197] new_page+0x121/0x170 [ 466.549608][T28197] migrate_pages+0x465/0x1810 [ 466.554292][T28197] ? do_mbind+0x760/0x760 [ 466.558638][T28197] ? remove_migration_ptes+0x90/0x90 [ 466.563931][T28197] do_mbind+0x5b7/0x760 18:38:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000006000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 3) [ 466.568256][T28197] __se_sys_mbind+0x151/0x410 [ 466.572975][T28197] __x64_sys_mbind+0x74/0x80 [ 466.577692][T28197] do_syscall_64+0x44/0xd0 [ 466.582193][T28197] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 466.588452][T28197] RIP: 0033:0x7fb80e59e059 [ 466.592885][T28197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 466.602078][T28202] loop4: detected capacity change from 0 to 264192 [ 466.612700][T28197] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 466.612745][T28197] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 466.612760][T28197] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 466.642504][T28202] FAT-fs (loop4): invalid media value (0x00) [ 466.643860][T28197] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 466.643877][T28197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:38:30 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 6) 18:38:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 466.643897][T28197] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 466.649895][T28202] FAT-fs (loop4): Can't find a valid FAT filesystem [ 466.657815][T28197] 18:38:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 466.764341][T28211] loop5: detected capacity change from 0 to 264192 [ 466.796282][T28205] FAULT_INJECTION: forcing a failure. [ 466.796282][T28205] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 466.809675][T28205] CPU: 1 PID: 28205 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 466.820828][T28205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.830900][T28205] Call Trace: [ 466.834236][T28205] [ 466.837159][T28205] dump_stack_lvl+0xd6/0x122 [ 466.841756][T28205] dump_stack+0x11/0x1b [ 466.845936][T28205] should_fail+0x23c/0x250 [ 466.850444][T28205] __alloc_pages+0x102/0x330 [ 466.855045][T28205] alloc_pages_vma+0x67e/0x810 [ 466.859888][T28205] new_page+0x121/0x170 [ 466.864148][T28205] migrate_pages+0x465/0x1810 [ 466.868834][T28205] ? do_mbind+0x760/0x760 [ 466.873162][T28205] ? remove_migration_ptes+0x90/0x90 [ 466.878456][T28205] do_mbind+0x5b7/0x760 [ 466.882614][T28205] __se_sys_mbind+0x151/0x410 [ 466.887308][T28205] __x64_sys_mbind+0x74/0x80 [ 466.892202][T28205] do_syscall_64+0x44/0xd0 [ 466.896621][T28205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 466.902528][T28205] RIP: 0033:0x7fb80e59e059 [ 466.906944][T28205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 466.926609][T28205] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 466.935138][T28205] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 466.943120][T28205] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 466.951106][T28205] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 466.959078][T28205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.967049][T28205] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 466.975036][T28205] [ 466.985024][T28211] FAULT_INJECTION: forcing a failure. [ 466.985024][T28211] name failslab, interval 1, probability 0, space 0, times 0 [ 466.997683][T28211] CPU: 0 PID: 28211 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 467.008849][T28211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.018924][T28211] Call Trace: [ 467.022188][T28211] [ 467.025103][T28211] dump_stack_lvl+0xd6/0x122 [ 467.029730][T28211] dump_stack+0x11/0x1b [ 467.033948][T28211] should_fail+0x23c/0x250 [ 467.038514][T28211] ? mempool_alloc_slab+0x16/0x20 [ 467.043542][T28211] __should_failslab+0x81/0x90 [ 467.048320][T28211] should_failslab+0x5/0x20 [ 467.053518][T28211] kmem_cache_alloc+0x4f/0x320 [ 467.058272][T28211] mempool_alloc_slab+0x16/0x20 [ 467.063217][T28211] ? mempool_free+0x130/0x130 [ 467.067895][T28211] mempool_alloc+0x9d/0x310 [ 467.072381][T28211] ? submit_bio_noacct+0x49f/0x4e0 [ 467.077475][T28211] bio_alloc_bioset+0xcc/0x560 [ 467.082299][T28211] submit_bh_wbc+0x133/0x320 [ 467.086950][T28211] __block_write_full_page+0x648/0xa10 [ 467.092467][T28211] ? mark_buffer_write_io_error+0x180/0x180 [ 467.098437][T28211] ? fat_block_truncate_page+0x30/0x30 [ 467.104625][T28211] ? fat_block_truncate_page+0x30/0x30 [ 467.110224][T28211] block_write_full_page+0x1f0/0x210 [ 467.115541][T28211] fat_writepage+0x20/0x30 [ 467.119961][T28211] move_to_new_page+0x2f6/0x520 [ 467.124828][T28211] ? remove_migration_ptes+0x90/0x90 [ 467.130134][T28211] migrate_pages+0xdec/0x1810 [ 467.134861][T28211] ? do_mbind+0x760/0x760 [ 467.139205][T28211] do_mbind+0x5b7/0x760 [ 467.143378][T28211] __se_sys_mbind+0x151/0x410 [ 467.148118][T28211] __x64_sys_mbind+0x74/0x80 [ 467.152714][T28211] do_syscall_64+0x44/0xd0 [ 467.157158][T28211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 467.163097][T28211] RIP: 0033:0x7f0d68981059 [ 467.167507][T28211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 467.187219][T28211] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 467.195613][T28211] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 467.203595][T28211] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 18:38:30 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:30 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 7) 18:38:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 467.211671][T28211] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 [ 467.219898][T28211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.228147][T28211] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 467.236105][T28211] 18:38:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 467.351207][T28219] FAULT_INJECTION: forcing a failure. [ 467.351207][T28219] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 467.364539][T28219] CPU: 1 PID: 28219 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 467.375567][T28219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.385629][T28219] Call Trace: [ 467.388932][T28219] [ 467.391906][T28219] dump_stack_lvl+0xd6/0x122 [ 467.396513][T28219] dump_stack+0x11/0x1b [ 467.400677][T28219] should_fail+0x23c/0x250 [ 467.405178][T28219] __alloc_pages+0x102/0x330 [ 467.409776][T28219] alloc_pages_vma+0x67e/0x810 [ 467.414554][T28219] new_page+0x121/0x170 [ 467.418793][T28219] migrate_pages+0x465/0x1810 [ 467.423508][T28219] ? do_mbind+0x760/0x760 [ 467.427857][T28219] ? remove_migration_ptes+0x90/0x90 [ 467.433315][T28219] do_mbind+0x5b7/0x760 [ 467.437497][T28219] __se_sys_mbind+0x151/0x410 [ 467.442180][T28219] __x64_sys_mbind+0x74/0x80 [ 467.445275][T28227] loop4: detected capacity change from 0 to 264192 [ 467.446772][T28219] do_syscall_64+0x44/0xd0 [ 467.446795][T28219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 467.463561][T28219] RIP: 0033:0x7fb80e59e059 [ 467.467979][T28219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 467.472617][T28227] FAT-fs (loop4): invalid media value (0x00) [ 467.487740][T28219] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 4) 18:38:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 467.487764][T28219] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 467.487776][T28219] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 467.487790][T28219] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 467.493776][T28227] FAT-fs (loop4): Can't find a valid FAT filesystem [ 467.502142][T28219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.502157][T28219] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 467.548628][T28219] 18:38:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 467.588479][T28230] loop1: detected capacity change from 0 to 264192 18:38:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000002500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 467.631540][T28235] loop5: detected capacity change from 0 to 264192 18:38:31 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 8) 18:38:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000004906000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 467.733068][T28242] FAULT_INJECTION: forcing a failure. [ 467.733068][T28242] name failslab, interval 1, probability 0, space 0, times 0 [ 467.745928][T28242] CPU: 1 PID: 28242 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 467.756958][T28242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.767006][T28242] Call Trace: [ 467.770280][T28242] [ 467.773200][T28242] dump_stack_lvl+0xd6/0x122 [ 467.777800][T28242] dump_stack+0x11/0x1b [ 467.781954][T28242] should_fail+0x23c/0x250 [ 467.786515][T28242] ? mempool_alloc_slab+0x16/0x20 [ 467.791541][T28242] __should_failslab+0x81/0x90 [ 467.796303][T28242] should_failslab+0x5/0x20 [ 467.800813][T28242] kmem_cache_alloc+0x4f/0x320 [ 467.805627][T28242] mempool_alloc_slab+0x16/0x20 [ 467.810474][T28242] ? mempool_free+0x130/0x130 [ 467.815163][T28242] mempool_alloc+0x9d/0x310 [ 467.819714][T28242] ? submit_bio_noacct+0x49f/0x4e0 [ 467.824832][T28242] bio_alloc_bioset+0xcc/0x560 [ 467.829654][T28242] submit_bh_wbc+0x133/0x320 [ 467.835899][T28242] __block_write_full_page+0x648/0xa10 [ 467.841458][T28242] ? mark_buffer_write_io_error+0x180/0x180 [ 467.847467][T28242] ? fat_block_truncate_page+0x30/0x30 [ 467.852971][T28242] ? fat_block_truncate_page+0x30/0x30 [ 467.858444][T28242] block_write_full_page+0x1f0/0x210 [ 467.863771][T28242] fat_writepage+0x20/0x30 [ 467.868253][T28242] move_to_new_page+0x2f6/0x520 [ 467.873180][T28242] ? remove_migration_ptes+0x90/0x90 [ 467.878468][T28242] migrate_pages+0xdec/0x1810 [ 467.883154][T28242] ? do_mbind+0x760/0x760 [ 467.887573][T28242] do_mbind+0x5b7/0x760 [ 467.891730][T28242] __se_sys_mbind+0x151/0x410 [ 467.896446][T28242] __x64_sys_mbind+0x74/0x80 [ 467.901035][T28242] do_syscall_64+0x44/0xd0 [ 467.905483][T28242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 467.911377][T28242] RIP: 0033:0x7f0d68981059 [ 467.915825][T28242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 467.935614][T28242] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 467.944028][T28242] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059 [ 467.952040][T28242] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 467.960022][T28242] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002 [ 467.968070][T28242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.976020][T28242] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000 [ 467.984060][T28242] [ 468.005410][T28249] FAULT_INJECTION: forcing a failure. [ 468.005410][T28249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 468.018845][T28249] CPU: 0 PID: 28249 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 468.029958][T28249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.040007][T28249] Call Trace: [ 468.043283][T28249] [ 468.046206][T28249] dump_stack_lvl+0xd6/0x122 [ 468.050801][T28249] dump_stack+0x11/0x1b [ 468.055035][T28249] should_fail+0x23c/0x250 [ 468.059456][T28249] __alloc_pages+0x102/0x330 [ 468.064122][T28249] alloc_pages_vma+0x67e/0x810 [ 468.068961][T28249] new_page+0x121/0x170 [ 468.073131][T28249] migrate_pages+0x465/0x1810 [ 468.077822][T28249] ? do_mbind+0x760/0x760 [ 468.082189][T28249] ? remove_migration_ptes+0x90/0x90 [ 468.087492][T28249] do_mbind+0x5b7/0x760 [ 468.091650][T28249] __se_sys_mbind+0x151/0x410 [ 468.096330][T28249] __x64_sys_mbind+0x74/0x80 [ 468.100923][T28249] do_syscall_64+0x44/0xd0 [ 468.105348][T28249] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 468.111261][T28249] RIP: 0033:0x7fb80e59e059 [ 468.115732][T28249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 468.135317][T28249] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 468.143736][T28249] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 18:38:31 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000005c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 5) [ 468.151708][T28249] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 468.159755][T28249] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 468.167726][T28249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 468.175678][T28249] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 468.183634][T28249] 18:38:31 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 9) [ 468.218858][T28255] loop4: detected capacity change from 0 to 264192 [ 468.239017][T28257] loop5: detected capacity change from 0 to 264192 [ 468.239103][T28255] FAT-fs (loop4): invalid media value (0x00) [ 468.251614][T28255] FAT-fs (loop4): Can't find a valid FAT filesystem 18:38:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000006000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 468.280983][ T2093] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 468.304391][T28259] loop1: detected capacity change from 0 to 264192 [ 468.313775][ T2093] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 18:38:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 468.323831][ T2093] Buffer I/O error on dev loop1, logical block 33008, async page read [ 468.384436][T28269] FAULT_INJECTION: forcing a failure. [ 468.384436][T28269] name failslab, interval 1, probability 0, space 0, times 0 [ 468.397245][T28269] CPU: 1 PID: 28269 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 468.408275][T28269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.418327][T28269] Call Trace: [ 468.421775][T28269] [ 468.424723][T28269] dump_stack_lvl+0xd6/0x122 [ 468.429317][T28269] dump_stack+0x11/0x1b [ 468.433523][T28269] should_fail+0x23c/0x250 [ 468.437935][T28269] ? mempool_alloc_slab+0x16/0x20 [ 468.442959][T28269] __should_failslab+0x81/0x90 [ 468.447779][T28269] should_failslab+0x5/0x20 [ 468.452281][T28269] kmem_cache_alloc+0x4f/0x320 [ 468.457075][T28269] mempool_alloc_slab+0x16/0x20 [ 468.461951][T28269] ? mempool_free+0x130/0x130 [ 468.466704][T28269] mempool_alloc+0x9d/0x310 [ 468.471264][T28269] ? submit_bio_noacct+0x49f/0x4e0 [ 468.476372][T28269] bio_alloc_bioset+0xcc/0x560 [ 468.481138][T28269] submit_bh_wbc+0x133/0x320 [ 468.485793][T28269] __block_write_full_page+0x648/0xa10 [ 468.491260][T28269] ? mark_buffer_write_io_error+0x180/0x180 [ 468.497155][T28269] ? fat_block_truncate_page+0x30/0x30 [ 468.502684][T28269] ? fat_block_truncate_page+0x30/0x30 [ 468.508194][T28269] block_write_full_page+0x1f0/0x210 [ 468.513606][T28269] fat_writepage+0x20/0x30 [ 468.518037][T28269] move_to_new_page+0x2f6/0x520 [ 468.522954][T28269] ? remove_migration_ptes+0x90/0x90 [ 468.528246][T28269] migrate_pages+0xdec/0x1810 [ 468.532991][T28269] ? do_mbind+0x760/0x760 [ 468.537320][T28269] do_mbind+0x5b7/0x760 [ 468.541474][T28269] __se_sys_mbind+0x151/0x410 [ 468.546151][T28269] __x64_sys_mbind+0x74/0x80 [ 468.550741][T28269] do_syscall_64+0x44/0xd0 [ 468.555243][T28269] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 468.561200][T28269] RIP: 0033:0x7f0d68981059 [ 468.565648][T28269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 468.585279][T28269] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 468.593695][T28269] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059 [ 468.601656][T28269] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 468.609619][T28269] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002 [ 468.617721][T28269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 468.625866][T28269] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000 [ 468.634036][T28269] [ 468.649120][T28266] FAULT_INJECTION: forcing a failure. [ 468.649120][T28266] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 468.662439][T28266] CPU: 0 PID: 28266 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 468.673506][T28266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:38:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 6) 18:38:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 468.683804][T28266] Call Trace: [ 468.687282][T28266] [ 468.690203][T28266] dump_stack_lvl+0xd6/0x122 [ 468.694805][T28266] dump_stack+0x11/0x1b [ 468.699030][T28266] should_fail+0x23c/0x250 [ 468.703454][T28266] __alloc_pages+0x102/0x330 [ 468.708100][T28266] alloc_pages_vma+0x67e/0x810 [ 468.712880][T28266] new_page+0x121/0x170 [ 468.717132][T28266] migrate_pages+0x465/0x1810 [ 468.721821][T28266] ? do_mbind+0x760/0x760 [ 468.724172][T28273] loop4: detected capacity change from 0 to 264192 [ 468.726172][T28266] ? remove_migration_ptes+0x90/0x90 [ 468.726203][T28266] do_mbind+0x5b7/0x760 [ 468.733729][T28273] FAT-fs (loop4): invalid media value (0x00) [ 468.738054][T28266] __se_sys_mbind+0x151/0x410 [ 468.738080][T28266] __x64_sys_mbind+0x74/0x80 [ 468.742314][T28273] FAT-fs (loop4): Can't find a valid FAT filesystem [ 468.748228][T28266] do_syscall_64+0x44/0xd0 [ 468.768409][T28266] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 468.774474][T28266] RIP: 0033:0x7fb80e59e059 [ 468.778972][T28266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 468.798654][T28266] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 468.807047][T28266] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 468.815180][T28266] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 468.823233][T28266] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 468.831196][T28266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 468.839231][T28266] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 468.847262][T28266] [ 468.880134][ T1913] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 468.919732][T28278] loop5: detected capacity change from 0 to 264192 18:38:32 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 10) 18:38:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 469.026457][T28278] FAULT_INJECTION: forcing a failure. [ 469.026457][T28278] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 469.039972][T28278] CPU: 0 PID: 28278 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 469.051099][T28278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.061287][T28278] Call Trace: [ 469.064566][T28278] [ 469.067492][T28278] dump_stack_lvl+0xd6/0x122 [ 469.070765][T28284] loop4: detected capacity change from 0 to 264192 [ 469.072093][T28278] dump_stack+0x11/0x1b [ 469.072122][T28278] should_fail+0x23c/0x250 [ 469.072142][T28278] __alloc_pages+0x102/0x330 [ 469.091886][T28278] alloc_pages_vma+0x67e/0x810 [ 469.096661][T28278] new_page+0x121/0x170 [ 469.098760][T28284] FAT-fs (loop4): invalid media value (0x00) [ 469.100843][T28278] migrate_pages+0x465/0x1810 [ 469.106852][T28284] FAT-fs (loop4): Can't find a valid FAT filesystem [ 469.111604][T28278] ? do_mbind+0x760/0x760 [ 469.122521][T28278] ? remove_migration_ptes+0x90/0x90 [ 469.127973][T28278] do_mbind+0x5b7/0x760 [ 469.132135][T28278] __se_sys_mbind+0x151/0x410 [ 469.136827][T28278] __x64_sys_mbind+0x74/0x80 [ 469.141421][T28278] do_syscall_64+0x44/0xd0 [ 469.145845][T28278] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 469.151834][T28278] RIP: 0033:0x7f0d68981059 [ 469.156473][T28278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 469.176205][T28278] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 469.184618][T28278] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 469.192974][T28278] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 469.201031][T28278] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 [ 469.209330][T28278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 469.217306][T28278] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 469.225463][T28278] [ 469.235115][T28281] FAULT_INJECTION: forcing a failure. [ 469.235115][T28281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 469.248708][T28281] CPU: 1 PID: 28281 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 469.260082][T28281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.270587][T28281] Call Trace: [ 469.274023][T28281] [ 469.277033][T28281] dump_stack_lvl+0xd6/0x122 [ 469.281992][T28281] dump_stack+0x11/0x1b [ 469.286816][T28281] should_fail+0x23c/0x250 [ 469.291250][T28281] __alloc_pages+0x102/0x330 [ 469.296168][T28281] alloc_pages_vma+0x67e/0x810 [ 469.300941][T28281] new_page+0x121/0x170 [ 469.305669][T28281] migrate_pages+0x465/0x1810 [ 469.310435][T28281] ? do_mbind+0x760/0x760 [ 469.314775][T28281] ? remove_migration_ptes+0x90/0x90 [ 469.320087][T28281] do_mbind+0x5b7/0x760 [ 469.324433][T28281] __se_sys_mbind+0x151/0x410 [ 469.329106][T28281] __x64_sys_mbind+0x74/0x80 [ 469.333697][T28281] do_syscall_64+0x44/0xd0 [ 469.338384][T28281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 469.344427][T28281] RIP: 0033:0x7fb80e59e059 [ 469.348844][T28281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 469.368932][T28281] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:33 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 7) 18:38:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 469.377871][T28281] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 469.386230][T28281] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 469.395089][T28281] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 469.403147][T28281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 469.411125][T28281] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 469.419524][T28281] 18:38:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 11) 18:38:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000bb05000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 469.523962][T28301] loop1: detected capacity change from 0 to 264192 [ 469.555759][T28303] loop5: detected capacity change from 0 to 264192 [ 469.616190][T28300] FAULT_INJECTION: forcing a failure. [ 469.616190][T28300] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 469.629565][T28300] CPU: 1 PID: 28300 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 469.640585][T28300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.650694][T28300] Call Trace: [ 469.653983][T28300] [ 469.656899][T28300] dump_stack_lvl+0xd6/0x122 [ 469.661516][T28300] dump_stack+0x11/0x1b [ 469.665725][T28300] should_fail+0x23c/0x250 [ 469.670171][T28300] __alloc_pages+0x102/0x330 [ 469.674749][T28300] alloc_pages_vma+0x67e/0x810 [ 469.679515][T28300] new_page+0x121/0x170 [ 469.683699][T28300] migrate_pages+0x465/0x1810 [ 469.688520][T28300] ? do_mbind+0x760/0x760 [ 469.692843][T28300] ? remove_migration_ptes+0x90/0x90 [ 469.698130][T28300] do_mbind+0x5b7/0x760 [ 469.702457][T28300] __se_sys_mbind+0x151/0x410 [ 469.707137][T28300] __x64_sys_mbind+0x74/0x80 [ 469.711900][T28300] do_syscall_64+0x44/0xd0 [ 469.716337][T28300] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 469.722401][T28300] RIP: 0033:0x7fb80e59e059 [ 469.726943][T28300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 469.746764][T28300] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 469.755242][T28300] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:33 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 12) [ 469.763285][T28300] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 469.771328][T28300] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 469.779370][T28300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 469.787415][T28300] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 469.795466][T28300] [ 469.837469][T28303] FAULT_INJECTION: forcing a failure. [ 469.837469][T28303] name failslab, interval 1, probability 0, space 0, times 0 [ 469.850116][T28303] CPU: 1 PID: 28303 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 469.861139][T28303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.871197][T28303] Call Trace: [ 469.874474][T28303] [ 469.877411][T28303] dump_stack_lvl+0xd6/0x122 [ 469.882182][T28303] dump_stack+0x11/0x1b 18:38:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 469.886345][T28303] should_fail+0x23c/0x250 [ 469.890955][T28303] ? mempool_alloc_slab+0x16/0x20 [ 469.895987][T28303] __should_failslab+0x81/0x90 [ 469.900760][T28303] should_failslab+0x5/0x20 [ 469.905331][T28303] kmem_cache_alloc+0x4f/0x320 [ 469.910225][T28303] mempool_alloc_slab+0x16/0x20 [ 469.915151][T28303] ? mempool_free+0x130/0x130 [ 469.919829][T28303] mempool_alloc+0x9d/0x310 [ 469.924406][T28303] ? __rcu_read_unlock+0x45/0x290 [ 469.929431][T28303] ? __this_cpu_preempt_check+0x18/0x20 [ 469.935072][T28303] bio_alloc_bioset+0xcc/0x560 [ 469.939925][T28303] submit_bh_wbc+0x133/0x320 [ 469.944545][T28303] __block_write_full_page+0x648/0xa10 [ 469.950098][T28303] ? mark_buffer_write_io_error+0x180/0x180 [ 469.955998][T28303] ? fat_block_truncate_page+0x30/0x30 [ 469.961710][T28303] ? fat_block_truncate_page+0x30/0x30 [ 469.967158][T28318] loop4: detected capacity change from 0 to 264192 [ 469.967172][T28303] block_write_full_page+0x1f0/0x210 [ 469.974465][T28318] FAT-fs (loop4): invalid media value (0x00) [ 469.979029][T28303] fat_writepage+0x20/0x30 [ 469.979058][T28303] move_to_new_page+0x2f6/0x520 [ 469.985032][T28318] FAT-fs (loop4): Can't find a valid FAT filesystem [ 469.989399][T28303] ? remove_migration_ptes+0x90/0x90 [ 470.006089][T28303] migrate_pages+0xdec/0x1810 [ 470.010849][T28303] ? do_mbind+0x760/0x760 [ 470.015159][T28303] ? remove_migration_ptes+0x90/0x90 [ 470.020431][T28303] do_mbind+0x5b7/0x760 [ 470.024651][T28303] __se_sys_mbind+0x151/0x410 [ 470.029465][T28303] __x64_sys_mbind+0x74/0x80 [ 470.034054][T28303] do_syscall_64+0x44/0xd0 [ 470.038463][T28303] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.044442][T28303] RIP: 0033:0x7f0d68981059 [ 470.048844][T28303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 470.068432][T28303] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 470.076853][T28303] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 470.084890][T28303] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 470.092968][T28303] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 [ 470.101011][T28303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 470.109005][T28303] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 470.117005][T28303] [ 470.127045][T28314] FAULT_INJECTION: forcing a failure. [ 470.127045][T28314] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 470.140670][T28314] CPU: 0 PID: 28314 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 470.151774][T28314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.161827][T28314] Call Trace: [ 470.165103][T28314] [ 470.168289][T28314] dump_stack_lvl+0xd6/0x122 [ 470.172947][T28314] dump_stack+0x11/0x1b [ 470.177110][T28314] should_fail+0x23c/0x250 [ 470.181529][T28314] __alloc_pages+0x102/0x330 [ 470.186135][T28314] alloc_pages_vma+0x67e/0x810 [ 470.190995][T28314] new_page+0x121/0x170 [ 470.195222][T28314] migrate_pages+0x465/0x1810 [ 470.196937][T28323] loop1: detected capacity change from 0 to 264192 [ 470.199939][T28314] ? do_mbind+0x760/0x760 [ 470.199975][T28314] ? remove_migration_ptes+0x90/0x90 [ 470.200003][T28314] do_mbind+0x5b7/0x760 [ 470.220202][T28314] __se_sys_mbind+0x151/0x410 [ 470.224892][T28314] __x64_sys_mbind+0x74/0x80 [ 470.229517][T28314] do_syscall_64+0x44/0xd0 [ 470.233936][T28314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.239891][T28314] RIP: 0033:0x7fb80e59e059 [ 470.244351][T28314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 470.263955][T28314] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 470.272475][T28314] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 470.280519][T28314] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 18:38:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 8) 18:38:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 470.288486][T28314] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 470.296558][T28314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 470.304524][T28314] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 470.312617][T28314] 18:38:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 13) [ 470.339896][ T1913] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 18:38:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 470.427215][T28332] loop5: detected capacity change from 0 to 264192 [ 470.480005][T28336] loop4: detected capacity change from 0 to 264192 [ 470.490014][T28336] FAT-fs (loop4): bogus number of FAT sectors [ 470.496198][T28336] FAT-fs (loop4): Can't find a valid FAT filesystem [ 470.524295][T28330] FAULT_INJECTION: forcing a failure. [ 470.524295][T28330] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 470.537570][T28330] CPU: 1 PID: 28330 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 470.548595][T28330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.558788][T28330] Call Trace: [ 470.562129][T28330] [ 470.565057][T28330] dump_stack_lvl+0xd6/0x122 [ 470.569660][T28330] dump_stack+0x11/0x1b [ 470.573868][T28330] should_fail+0x23c/0x250 [ 470.578861][T28330] __alloc_pages+0x102/0x330 [ 470.583452][T28330] alloc_pages_vma+0x67e/0x810 [ 470.588323][T28330] new_page+0x121/0x170 [ 470.592553][T28330] migrate_pages+0x465/0x1810 [ 470.597239][T28330] ? do_mbind+0x760/0x760 [ 470.601736][T28330] ? remove_migration_ptes+0x90/0x90 [ 470.607065][T28330] do_mbind+0x5b7/0x760 [ 470.611242][T28330] __se_sys_mbind+0x151/0x410 [ 470.615947][T28330] __x64_sys_mbind+0x74/0x80 18:38:34 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 470.620693][T28330] do_syscall_64+0x44/0xd0 [ 470.625126][T28330] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.631022][T28330] RIP: 0033:0x7fb80e59e059 [ 470.635492][T28330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 470.655097][T28330] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 470.663514][T28330] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 470.671556][T28330] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 470.679516][T28330] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 470.687484][T28330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 470.695437][T28330] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 470.703414][T28330] [ 470.725900][T28341] FAULT_INJECTION: forcing a failure. [ 470.725900][T28341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 470.739219][T28341] CPU: 0 PID: 28341 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 470.750284][T28341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.760434][T28341] Call Trace: [ 470.763784][T28341] [ 470.766829][T28341] dump_stack_lvl+0xd6/0x122 [ 470.771466][T28341] dump_stack+0x11/0x1b 18:38:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 14) 18:38:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 470.775628][T28341] should_fail+0x23c/0x250 [ 470.780055][T28341] __alloc_pages+0x102/0x330 [ 470.784733][T28341] alloc_pages_vma+0x67e/0x810 [ 470.789505][T28341] new_page+0x121/0x170 [ 470.793687][T28341] migrate_pages+0x465/0x1810 [ 470.798419][T28341] ? do_mbind+0x760/0x760 [ 470.802770][T28341] ? remove_migration_ptes+0x90/0x90 [ 470.808136][T28341] do_mbind+0x5b7/0x760 [ 470.812328][T28341] __se_sys_mbind+0x151/0x410 [ 470.817012][T28341] __x64_sys_mbind+0x74/0x80 [ 470.821643][T28341] do_syscall_64+0x44/0xd0 18:38:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 470.826095][T28341] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.831999][T28341] RIP: 0033:0x7f0d68981059 [ 470.836495][T28341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 470.856104][T28341] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 470.864668][T28341] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059 [ 470.872645][T28341] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 470.880709][T28341] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002 [ 470.883572][T28350] loop4: detected capacity change from 0 to 264192 [ 470.888722][T28341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 470.903198][T28341] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000 [ 470.911889][T28341] 18:38:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 470.924195][T28350] FAT-fs (loop4): bogus number of FAT sectors [ 470.930326][T28350] FAT-fs (loop4): Can't find a valid FAT filesystem [ 470.942480][T28354] loop1: detected capacity change from 0 to 264192 [ 470.957573][T28352] FAULT_INJECTION: forcing a failure. [ 470.957573][T28352] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 470.970933][T28352] CPU: 0 PID: 28352 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 470.982054][T28352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.992122][T28352] Call Trace: [ 470.995401][T28352] [ 470.998392][T28352] dump_stack_lvl+0xd6/0x122 [ 471.003026][T28352] dump_stack+0x11/0x1b [ 471.007231][T28352] should_fail+0x23c/0x250 [ 471.011756][T28352] __alloc_pages+0x102/0x330 [ 471.016565][T28352] alloc_pages_vma+0x67e/0x810 [ 471.021355][T28352] new_page+0x121/0x170 18:38:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 9) 18:38:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 471.025647][T28352] migrate_pages+0x465/0x1810 [ 471.030416][T28352] ? do_mbind+0x760/0x760 [ 471.034851][T28352] ? remove_migration_ptes+0x90/0x90 [ 471.040143][T28352] do_mbind+0x5b7/0x760 [ 471.044337][T28352] __se_sys_mbind+0x151/0x410 [ 471.049012][T28352] __x64_sys_mbind+0x74/0x80 [ 471.053605][T28352] do_syscall_64+0x44/0xd0 [ 471.058073][T28352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.064073][T28352] RIP: 0033:0x7fb80e59e059 [ 471.068483][T28352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 471.088956][T28352] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 471.097436][T28352] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 471.105588][T28352] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 471.113552][T28352] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 18:38:34 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 15) [ 471.122261][T28352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 471.130307][T28352] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 471.138375][T28352] 18:38:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 471.222982][T28366] loop1: detected capacity change from 0 to 264192 [ 471.224568][T28367] loop5: detected capacity change from 0 to 264192 [ 471.307401][T28377] loop4: detected capacity change from 0 to 264192 [ 471.309222][T28369] FAULT_INJECTION: forcing a failure. [ 471.309222][T28369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 471.327293][T28369] CPU: 1 PID: 28369 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 471.332142][T28377] FAT-fs (loop4): bogus number of FAT sectors [ 471.338508][T28369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.338522][T28369] Call Trace: [ 471.338534][T28369] [ 471.338540][T28369] dump_stack_lvl+0xd6/0x122 [ 471.344608][T28377] FAT-fs (loop4): Can't find a valid FAT filesystem [ 471.354723][T28369] dump_stack+0x11/0x1b [ 471.354753][T28369] should_fail+0x23c/0x250 [ 471.381071][T28369] __alloc_pages+0x102/0x330 [ 471.385707][T28369] alloc_pages_vma+0x67e/0x810 [ 471.390477][T28369] new_page+0x121/0x170 [ 471.394659][T28369] migrate_pages+0x465/0x1810 [ 471.399380][T28369] ? do_mbind+0x760/0x760 [ 471.403694][T28369] ? remove_migration_ptes+0x90/0x90 [ 471.409009][T28369] do_mbind+0x5b7/0x760 [ 471.413167][T28369] __se_sys_mbind+0x151/0x410 [ 471.417843][T28369] __x64_sys_mbind+0x74/0x80 [ 471.422465][T28369] do_syscall_64+0x44/0xd0 [ 471.426883][T28369] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.432850][T28369] RIP: 0033:0x7fb80e59e059 [ 471.437258][T28369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 471.456862][T28369] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 471.465286][T28369] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 471.473255][T28369] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 471.481245][T28369] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 471.489275][T28369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 471.497244][T28369] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 471.505230][T28369] [ 471.510679][T28367] FAULT_INJECTION: forcing a failure. [ 471.510679][T28367] name failslab, interval 1, probability 0, space 0, times 0 [ 471.523486][T28367] CPU: 0 PID: 28367 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 471.534504][T28367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.545068][T28367] Call Trace: [ 471.548364][T28367] [ 471.551279][T28367] dump_stack_lvl+0xd6/0x122 [ 471.556030][T28367] dump_stack+0x11/0x1b [ 471.560220][T28367] should_fail+0x23c/0x250 [ 471.564719][T28367] ? mempool_alloc_slab+0x16/0x20 [ 471.569767][T28367] __should_failslab+0x81/0x90 [ 471.574611][T28367] should_failslab+0x5/0x20 [ 471.579155][T28367] kmem_cache_alloc+0x4f/0x320 [ 471.584209][T28367] mempool_alloc_slab+0x16/0x20 [ 471.589279][T28367] ? mempool_free+0x130/0x130 [ 471.593973][T28367] mempool_alloc+0x9d/0x310 [ 471.598559][T28367] ? submit_bio_noacct+0x49f/0x4e0 [ 471.603671][T28367] bio_alloc_bioset+0xcc/0x560 [ 471.608496][T28367] submit_bh_wbc+0x133/0x320 [ 471.613137][T28367] __block_write_full_page+0x648/0xa10 [ 471.618590][T28367] ? mark_buffer_write_io_error+0x180/0x180 [ 471.624557][T28367] ? fat_block_truncate_page+0x30/0x30 [ 471.630016][T28367] ? fat_block_truncate_page+0x30/0x30 [ 471.635501][T28367] block_write_full_page+0x1f0/0x210 [ 471.641266][T28367] fat_writepage+0x20/0x30 [ 471.645704][T28367] move_to_new_page+0x2f6/0x520 [ 471.650562][T28367] ? remove_migration_ptes+0x90/0x90 [ 471.655989][T28367] migrate_pages+0xdec/0x1810 [ 471.660665][T28367] ? do_mbind+0x760/0x760 [ 471.665059][T28367] ? remove_migration_ptes+0x90/0x90 [ 471.670334][T28367] do_mbind+0x5b7/0x760 [ 471.674476][T28367] __se_sys_mbind+0x151/0x410 [ 471.679140][T28367] __x64_sys_mbind+0x74/0x80 [ 471.683852][T28367] do_syscall_64+0x44/0xd0 [ 471.688343][T28367] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.694431][T28367] RIP: 0033:0x7f0d68981059 [ 471.698830][T28367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 471.718667][T28367] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 471.727470][T28367] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 471.736057][T28367] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 471.744019][T28367] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 [ 471.752158][T28367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:38:35 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 16) 18:38:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 471.760113][T28367] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 471.768150][T28367] [ 471.881692][T28390] loop1: detected capacity change from 0 to 264192 [ 471.889653][T28383] FAULT_INJECTION: forcing a failure. [ 471.889653][T28383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 471.902901][T28383] CPU: 1 PID: 28383 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 471.914159][T28383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.924252][T28383] Call Trace: [ 471.927531][T28383] [ 471.930457][T28383] dump_stack_lvl+0xd6/0x122 [ 471.935065][T28383] dump_stack+0x11/0x1b [ 471.939306][T28383] should_fail+0x23c/0x250 [ 471.943784][T28383] __alloc_pages+0x102/0x330 [ 471.948377][T28383] alloc_pages_vma+0x67e/0x810 [ 471.953142][T28383] new_page+0x121/0x170 [ 471.957352][T28383] migrate_pages+0x465/0x1810 [ 471.962046][T28383] ? do_mbind+0x760/0x760 [ 471.966385][T28383] ? remove_migration_ptes+0x90/0x90 [ 471.971685][T28383] do_mbind+0x5b7/0x760 [ 471.975910][T28383] __se_sys_mbind+0x151/0x410 [ 471.980626][T28383] __x64_sys_mbind+0x74/0x80 [ 471.985238][T28383] do_syscall_64+0x44/0xd0 [ 471.989658][T28383] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.995656][T28383] RIP: 0033:0x7fb80e59e059 [ 472.000074][T28383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 472.019777][T28383] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 10) 18:38:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 472.028235][T28383] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 472.036300][T28383] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 472.044278][T28383] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 472.052245][T28383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 472.060303][T28383] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 472.068363][T28383] 18:38:35 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 17) 18:38:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000040000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 472.088554][T28394] loop4: detected capacity change from 0 to 264192 18:38:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000649000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 472.158418][T28404] loop1: detected capacity change from 0 to 264192 [ 472.158438][T28405] loop5: detected capacity change from 0 to 264192 18:38:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 472.230607][T28397] FAULT_INJECTION: forcing a failure. [ 472.230607][T28397] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 472.244000][T28397] CPU: 0 PID: 28397 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 472.255027][T28397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.265289][T28397] Call Trace: [ 472.268566][T28397] [ 472.271580][T28397] dump_stack_lvl+0xd6/0x122 [ 472.276253][T28397] dump_stack+0x11/0x1b [ 472.280424][T28397] should_fail+0x23c/0x250 [ 472.284877][T28397] __alloc_pages+0x102/0x330 [ 472.289472][T28397] alloc_pages_vma+0x67e/0x810 [ 472.294240][T28397] new_page+0x121/0x170 [ 472.298443][T28397] migrate_pages+0x465/0x1810 [ 472.303339][T28397] ? do_mbind+0x760/0x760 [ 472.307754][T28397] ? remove_migration_ptes+0x90/0x90 [ 472.313081][T28397] do_mbind+0x5b7/0x760 [ 472.317242][T28397] __se_sys_mbind+0x151/0x410 [ 472.321919][T28397] __x64_sys_mbind+0x74/0x80 [ 472.326509][T28397] do_syscall_64+0x44/0xd0 [ 472.330944][T28397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.336835][T28397] RIP: 0033:0x7fb80e59e059 [ 472.341239][T28397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 472.361014][T28397] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 472.369569][T28397] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 472.377674][T28397] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 472.385895][T28397] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 472.393908][T28397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 472.402005][T28397] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 472.410079][T28397] [ 472.415800][T28405] FAULT_INJECTION: forcing a failure. [ 472.415800][T28405] name failslab, interval 1, probability 0, space 0, times 0 [ 472.428671][T28405] CPU: 1 PID: 28405 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 472.439782][T28405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.449942][T28405] Call Trace: [ 472.453223][T28405] [ 472.456152][T28405] dump_stack_lvl+0xd6/0x122 [ 472.460768][T28405] dump_stack+0x11/0x1b [ 472.464964][T28405] should_fail+0x23c/0x250 [ 472.469406][T28405] ? mempool_alloc_slab+0x16/0x20 [ 472.474513][T28405] __should_failslab+0x81/0x90 [ 472.479399][T28405] should_failslab+0x5/0x20 [ 472.483957][T28405] kmem_cache_alloc+0x4f/0x320 [ 472.488733][T28405] mempool_alloc_slab+0x16/0x20 [ 472.493699][T28405] ? mempool_free+0x130/0x130 [ 472.498465][T28405] mempool_alloc+0x9d/0x310 [ 472.503058][T28405] ? submit_bio_noacct+0x49f/0x4e0 [ 472.508185][T28405] bio_alloc_bioset+0xcc/0x560 [ 472.512959][T28405] submit_bh_wbc+0x133/0x320 [ 472.522768][T28405] __block_write_full_page+0x648/0xa10 [ 472.528239][T28405] ? mark_buffer_write_io_error+0x180/0x180 [ 472.534134][T28405] ? fat_block_truncate_page+0x30/0x30 [ 472.539644][T28405] ? fat_block_truncate_page+0x30/0x30 [ 472.545150][T28405] block_write_full_page+0x1f0/0x210 [ 472.550440][T28405] fat_writepage+0x20/0x30 [ 472.554987][T28405] move_to_new_page+0x2f6/0x520 [ 472.560042][T28405] ? remove_migration_ptes+0x90/0x90 [ 472.565329][T28405] migrate_pages+0xdec/0x1810 [ 472.570035][T28405] ? do_mbind+0x760/0x760 [ 472.574368][T28405] ? remove_migration_ptes+0x90/0x90 18:38:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 18) [ 472.579831][T28405] do_mbind+0x5b7/0x760 [ 472.584005][T28405] __se_sys_mbind+0x151/0x410 [ 472.589031][T28405] __x64_sys_mbind+0x74/0x80 [ 472.593617][T28405] do_syscall_64+0x44/0xd0 [ 472.598118][T28405] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.604081][T28405] RIP: 0033:0x7f0d68981059 [ 472.608696][T28405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 472.628467][T28405] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 472.636883][T28405] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 472.645016][T28405] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 472.652981][T28405] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 [ 472.661031][T28405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 472.668981][T28405] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 472.676938][T28405] [ 472.703957][T28415] FAULT_INJECTION: forcing a failure. [ 472.703957][T28415] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 472.717410][T28415] CPU: 1 PID: 28415 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 472.727095][T28417] loop1: detected capacity change from 0 to 264192 [ 472.728436][T28415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.728449][T28415] Call Trace: [ 472.728455][T28415] [ 472.751229][T28415] dump_stack_lvl+0xd6/0x122 [ 472.755831][T28415] dump_stack+0x11/0x1b [ 472.760021][T28415] should_fail+0x23c/0x250 [ 472.764507][T28415] __alloc_pages+0x102/0x330 [ 472.769097][T28415] alloc_pages_vma+0x67e/0x810 [ 472.773940][T28415] new_page+0x121/0x170 [ 472.778097][T28415] migrate_pages+0x465/0x1810 [ 472.782806][T28415] ? do_mbind+0x760/0x760 [ 472.787169][T28415] ? remove_migration_ptes+0x90/0x90 [ 472.792704][T28415] do_mbind+0x5b7/0x760 [ 472.797039][T28415] __se_sys_mbind+0x151/0x410 18:38:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 11) 18:38:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 472.801740][T28415] __x64_sys_mbind+0x74/0x80 [ 472.806348][T28415] do_syscall_64+0x44/0xd0 [ 472.810884][T28415] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.816972][T28415] RIP: 0033:0x7fb80e59e059 [ 472.821390][T28415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 472.841047][T28415] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 472.849477][T28415] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 472.857545][T28415] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 472.865506][T28415] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 472.873466][T28415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 472.881423][T28415] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 472.889454][T28415] 18:38:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 19) 18:38:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 472.929166][T28425] loop4: detected capacity change from 0 to 264192 [ 472.977671][T28429] loop1: detected capacity change from 0 to 264192 [ 472.992169][T28431] loop5: detected capacity change from 0 to 264192 18:38:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 473.089958][T28438] FAULT_INJECTION: forcing a failure. [ 473.089958][T28438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.103218][T28438] CPU: 1 PID: 28438 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 473.114252][T28438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.124405][T28438] Call Trace: [ 473.127757][T28438] [ 473.130675][T28438] dump_stack_lvl+0xd6/0x122 [ 473.135259][T28438] dump_stack+0x11/0x1b [ 473.139481][T28438] should_fail+0x23c/0x250 [ 473.143922][T28438] __alloc_pages+0x102/0x330 [ 473.148511][T28438] alloc_pages_vma+0x67e/0x810 [ 473.153285][T28438] new_page+0x121/0x170 [ 473.157511][T28438] migrate_pages+0x465/0x1810 [ 473.162190][T28438] ? do_mbind+0x760/0x760 [ 473.166625][T28438] ? remove_migration_ptes+0x90/0x90 [ 473.172015][T28438] do_mbind+0x5b7/0x760 [ 473.176335][T28438] __se_sys_mbind+0x151/0x410 [ 473.181017][T28438] __x64_sys_mbind+0x74/0x80 [ 473.185673][T28438] do_syscall_64+0x44/0xd0 [ 473.190105][T28438] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.196034][T28438] RIP: 0033:0x7f0d68981059 [ 473.200449][T28438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 473.220097][T28438] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 473.228529][T28438] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059 [ 473.236606][T28438] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 473.244578][T28438] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002 [ 473.252544][T28438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 473.260592][T28438] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000 [ 473.268698][T28438] [ 473.275896][T28437] FAULT_INJECTION: forcing a failure. [ 473.275896][T28437] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.289254][T28437] CPU: 0 PID: 28437 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 473.294043][T28445] loop1: detected capacity change from 0 to 264192 [ 473.300307][T28437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.300320][T28437] Call Trace: [ 473.300327][T28437] [ 473.300334][T28437] dump_stack_lvl+0xd6/0x122 [ 473.327825][T28437] dump_stack+0x11/0x1b [ 473.332010][T28437] should_fail+0x23c/0x250 [ 473.336437][T28437] __alloc_pages+0x102/0x330 18:38:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 473.341030][T28437] alloc_pages_vma+0x67e/0x810 [ 473.345805][T28437] new_page+0x121/0x170 [ 473.349975][T28437] migrate_pages+0x465/0x1810 [ 473.354663][T28437] ? do_mbind+0x760/0x760 [ 473.358995][T28437] ? remove_migration_ptes+0x90/0x90 [ 473.364352][T28437] do_mbind+0x5b7/0x760 [ 473.368559][T28437] __se_sys_mbind+0x151/0x410 [ 473.373368][T28437] __x64_sys_mbind+0x74/0x80 [ 473.378052][T28437] do_syscall_64+0x44/0xd0 [ 473.382553][T28437] entry_SYSCALL_64_after_hwframe+0x44/0xae 18:38:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 12) [ 473.388491][T28437] RIP: 0033:0x7fb80e59e059 [ 473.392901][T28437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 473.412870][T28437] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 473.421408][T28437] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 473.429441][T28437] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 18:38:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 473.437671][T28437] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 473.445653][T28437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 473.453831][T28437] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 473.461887][T28437] 18:38:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 20) 18:38:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000300000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 473.542633][T28454] loop1: detected capacity change from 0 to 264192 [ 473.573834][T28459] loop5: detected capacity change from 0 to 264192 18:38:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 473.597600][T28463] FAULT_INJECTION: forcing a failure. [ 473.597600][T28463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.610933][T28463] CPU: 1 PID: 28463 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 473.622040][T28463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.625403][T28465] loop4: detected capacity change from 0 to 264192 [ 473.632191][T28463] Call Trace: [ 473.632200][T28463] [ 473.632206][T28463] dump_stack_lvl+0xd6/0x122 [ 473.632236][T28463] dump_stack+0x11/0x1b [ 473.653641][T28463] should_fail+0x23c/0x250 [ 473.658225][T28463] __alloc_pages+0x102/0x330 [ 473.663077][T28463] alloc_pages_vma+0x67e/0x810 [ 473.667857][T28463] new_page+0x121/0x170 [ 473.672033][T28463] migrate_pages+0x465/0x1810 [ 473.676846][T28463] ? do_mbind+0x760/0x760 [ 473.681450][T28463] ? remove_migration_ptes+0x90/0x90 [ 473.686837][T28463] do_mbind+0x5b7/0x760 [ 473.691014][T28463] __se_sys_mbind+0x151/0x410 [ 473.695709][T28463] __x64_sys_mbind+0x74/0x80 [ 473.700318][T28463] do_syscall_64+0x44/0xd0 [ 473.704777][T28463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.711548][T28463] RIP: 0033:0x7fb80e59e059 [ 473.716076][T28463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 473.735921][T28463] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 473.744384][T28463] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 473.752438][T28463] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 473.760440][T28463] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 473.768411][T28463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 473.776407][T28463] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 473.784390][T28463] 18:38:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 21) 18:38:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 473.809912][T28469] FAULT_INJECTION: forcing a failure. [ 473.809912][T28469] name failslab, interval 1, probability 0, space 0, times 0 [ 473.822751][T28469] CPU: 1 PID: 28469 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 473.833911][T28469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.844043][T28469] Call Trace: [ 473.847321][T28469] [ 473.850258][T28469] dump_stack_lvl+0xd6/0x122 [ 473.854973][T28469] dump_stack+0x11/0x1b [ 473.859174][T28469] should_fail+0x23c/0x250 [ 473.863597][T28469] ? mempool_alloc_slab+0x16/0x20 [ 473.868628][T28469] __should_failslab+0x81/0x90 [ 473.873475][T28469] should_failslab+0x5/0x20 [ 473.877999][T28469] kmem_cache_alloc+0x4f/0x320 [ 473.882804][T28469] mempool_alloc_slab+0x16/0x20 [ 473.887763][T28469] ? mempool_free+0x130/0x130 [ 473.892440][T28469] mempool_alloc+0x9d/0x310 [ 473.896996][T28469] ? __rcu_read_unlock+0x45/0x290 [ 473.902024][T28469] ? __this_cpu_preempt_check+0x18/0x20 [ 473.907582][T28469] bio_alloc_bioset+0xcc/0x560 [ 473.912393][T28469] submit_bh_wbc+0x133/0x320 [ 473.916994][T28469] __block_write_full_page+0x648/0xa10 [ 473.922480][T28469] ? mark_buffer_write_io_error+0x180/0x180 [ 473.928380][T28469] ? fat_block_truncate_page+0x30/0x30 [ 473.933848][T28469] ? fat_block_truncate_page+0x30/0x30 [ 473.939374][T28469] block_write_full_page+0x1f0/0x210 [ 473.944686][T28469] fat_writepage+0x20/0x30 [ 473.949086][T28469] move_to_new_page+0x2f6/0x520 [ 473.953986][T28469] ? remove_migration_ptes+0x90/0x90 [ 473.959313][T28469] migrate_pages+0xdec/0x1810 [ 473.964004][T28469] ? do_mbind+0x760/0x760 [ 473.968347][T28469] ? remove_migration_ptes+0x90/0x90 [ 473.973619][T28469] do_mbind+0x5b7/0x760 [ 473.977802][T28469] __se_sys_mbind+0x151/0x410 [ 473.982464][T28469] __x64_sys_mbind+0x74/0x80 [ 473.987107][T28469] do_syscall_64+0x44/0xd0 [ 473.991569][T28469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.997538][T28469] RIP: 0033:0x7f0d68981059 [ 474.001937][T28469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 474.021813][T28469] RSP: 002b:00007f0d67ab5168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 474.030211][T28469] RAX: ffffffffffffffda RBX: 00007f0d68a94100 RCX: 00007f0d68981059 [ 474.038193][T28469] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 474.046174][T28469] RBP: 00007f0d67ab51d0 R08: 0000000000000006 R09: 0000010000000002 [ 474.054172][T28469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 474.062190][T28469] R13: 00007ffffb4ad59f R14: 00007f0d67ab5300 R15: 0000000000022000 [ 474.070152][T28469] [ 474.091705][T28473] FAULT_INJECTION: forcing a failure. [ 474.091705][T28473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.105069][T28473] CPU: 1 PID: 28473 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 474.116090][T28473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.126171][T28473] Call Trace: [ 474.129587][T28473] [ 474.132507][T28473] dump_stack_lvl+0xd6/0x122 [ 474.137288][T28473] dump_stack+0x11/0x1b [ 474.141497][T28473] should_fail+0x23c/0x250 [ 474.145925][T28473] __alloc_pages+0x102/0x330 [ 474.150520][T28473] alloc_pages_vma+0x67e/0x810 [ 474.155283][T28473] new_page+0x121/0x170 [ 474.159447][T28473] migrate_pages+0x465/0x1810 [ 474.164130][T28473] ? do_mbind+0x760/0x760 [ 474.168728][T28473] ? remove_migration_ptes+0x90/0x90 [ 474.174151][T28473] do_mbind+0x5b7/0x760 [ 474.178326][T28473] __se_sys_mbind+0x151/0x410 [ 474.183000][T28473] __x64_sys_mbind+0x74/0x80 [ 474.187590][T28473] do_syscall_64+0x44/0xd0 [ 474.192027][T28473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.197980][T28473] RIP: 0033:0x7fb80e59e059 18:38:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 13) 18:38:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 474.202410][T28473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 474.222044][T28473] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 474.230589][T28473] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 474.238582][T28473] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 474.246589][T28473] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 474.254547][T28473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 474.262505][T28473] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 474.270563][T28473] [ 474.297602][T28479] loop4: detected capacity change from 0 to 264192 18:38:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 22) 18:38:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 474.311989][T28480] loop1: detected capacity change from 0 to 264192 [ 474.341281][T28484] loop5: detected capacity change from 0 to 264192 18:38:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000040000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 474.461450][T28484] FAULT_INJECTION: forcing a failure. [ 474.461450][T28484] name failslab, interval 1, probability 0, space 0, times 0 [ 474.474133][T28484] CPU: 1 PID: 28484 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 474.485161][T28484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.495217][T28484] Call Trace: [ 474.498492][T28484] [ 474.501421][T28484] dump_stack_lvl+0xd6/0x122 [ 474.506015][T28484] dump_stack+0x11/0x1b [ 474.510207][T28484] should_fail+0x23c/0x250 [ 474.514730][T28484] ? mempool_alloc_slab+0x16/0x20 [ 474.519752][T28484] __should_failslab+0x81/0x90 [ 474.524540][T28484] should_failslab+0x5/0x20 [ 474.529082][T28484] kmem_cache_alloc+0x4f/0x320 [ 474.533906][T28484] mempool_alloc_slab+0x16/0x20 [ 474.538750][T28484] ? mempool_free+0x130/0x130 [ 474.543417][T28484] mempool_alloc+0x9d/0x310 [ 474.547915][T28484] ? submit_bio_noacct+0x49f/0x4e0 [ 474.553026][T28484] bio_alloc_bioset+0xcc/0x560 [ 474.557849][T28484] submit_bh_wbc+0x133/0x320 [ 474.562508][T28484] __block_write_full_page+0x648/0xa10 [ 474.568059][T28484] ? mark_buffer_write_io_error+0x180/0x180 [ 474.574029][T28484] ? fat_block_truncate_page+0x30/0x30 [ 474.579539][T28484] ? fat_block_truncate_page+0x30/0x30 [ 474.585000][T28484] block_write_full_page+0x1f0/0x210 [ 474.590318][T28484] fat_writepage+0x20/0x30 [ 474.594740][T28484] move_to_new_page+0x2f6/0x520 [ 474.599634][T28484] ? remove_migration_ptes+0x90/0x90 [ 474.604948][T28484] migrate_pages+0xdec/0x1810 [ 474.609646][T28484] ? do_mbind+0x760/0x760 [ 474.614186][T28484] ? remove_migration_ptes+0x90/0x90 [ 474.619519][T28484] do_mbind+0x5b7/0x760 [ 474.623677][T28484] __se_sys_mbind+0x151/0x410 [ 474.628353][T28484] __x64_sys_mbind+0x74/0x80 [ 474.632973][T28484] do_syscall_64+0x44/0xd0 [ 474.637388][T28484] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.643279][T28484] RIP: 0033:0x7f0d68981059 18:38:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 474.647681][T28484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 474.667307][T28484] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 474.675715][T28484] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 474.683665][T28484] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 474.691619][T28484] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 [ 474.699602][T28484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:38:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000700000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 474.707646][T28484] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 474.715773][T28484] [ 474.737977][T28498] FAULT_INJECTION: forcing a failure. [ 474.737977][T28498] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.751272][T28498] CPU: 1 PID: 28498 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 474.762296][T28498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.767456][T28504] loop1: detected capacity change from 0 to 264192 [ 474.772346][T28498] Call Trace: [ 474.772354][T28498] [ 474.772361][T28498] dump_stack_lvl+0xd6/0x122 [ 474.789640][T28498] dump_stack+0x11/0x1b [ 474.793801][T28498] should_fail+0x23c/0x250 [ 474.798217][T28498] __alloc_pages+0x102/0x330 [ 474.802812][T28498] alloc_pages_vma+0x67e/0x810 [ 474.807651][T28498] new_page+0x121/0x170 [ 474.811807][T28498] migrate_pages+0x465/0x1810 [ 474.816515][T28498] ? do_mbind+0x760/0x760 [ 474.820954][T28498] ? remove_migration_ptes+0x90/0x90 [ 474.826287][T28498] do_mbind+0x5b7/0x760 [ 474.830449][T28498] __se_sys_mbind+0x151/0x410 [ 474.835126][T28498] __x64_sys_mbind+0x74/0x80 [ 474.839764][T28498] do_syscall_64+0x44/0xd0 [ 474.844185][T28498] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.850174][T28498] RIP: 0033:0x7fb80e59e059 18:38:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 14) [ 474.854584][T28498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 474.874189][T28498] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 474.882607][T28498] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 474.890595][T28498] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 474.898559][T28498] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 18:38:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 474.906516][T28498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 474.914466][T28498] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 474.922424][T28498] 18:38:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 23) 18:38:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 474.961828][T28510] loop4: detected capacity change from 0 to 264192 [ 474.982474][T28512] loop5: detected capacity change from 0 to 264192 18:38:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 475.083871][T28512] FAULT_INJECTION: forcing a failure. [ 475.083871][T28512] name failslab, interval 1, probability 0, space 0, times 0 [ 475.096661][T28512] CPU: 1 PID: 28512 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 475.098435][T28524] loop1: detected capacity change from 0 to 264192 [ 475.107679][T28512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.107693][T28512] Call Trace: [ 475.107699][T28512] [ 475.107706][T28512] dump_stack_lvl+0xd6/0x122 [ 475.135202][T28512] dump_stack+0x11/0x1b [ 475.139363][T28512] should_fail+0x23c/0x250 [ 475.143836][T28512] ? mempool_alloc_slab+0x16/0x20 [ 475.148855][T28512] __should_failslab+0x81/0x90 [ 475.153631][T28512] should_failslab+0x5/0x20 [ 475.158138][T28512] kmem_cache_alloc+0x4f/0x320 [ 475.162982][T28512] mempool_alloc_slab+0x16/0x20 [ 475.167931][T28512] ? mempool_free+0x130/0x130 [ 475.172613][T28512] mempool_alloc+0x9d/0x310 [ 475.177120][T28512] ? submit_bio_noacct+0x49f/0x4e0 [ 475.182231][T28512] bio_alloc_bioset+0xcc/0x560 [ 475.187025][T28512] submit_bh_wbc+0x133/0x320 [ 475.191620][T28512] __block_write_full_page+0x648/0xa10 [ 475.197088][T28512] ? mark_buffer_write_io_error+0x180/0x180 [ 475.202987][T28512] ? fat_block_truncate_page+0x30/0x30 [ 475.208470][T28512] ? fat_block_truncate_page+0x30/0x30 [ 475.214067][T28512] block_write_full_page+0x1f0/0x210 [ 475.219372][T28512] fat_writepage+0x20/0x30 [ 475.224000][T28512] move_to_new_page+0x2f6/0x520 [ 475.228950][T28512] ? remove_migration_ptes+0x90/0x90 18:38:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 475.234278][T28512] migrate_pages+0xdec/0x1810 [ 475.238974][T28512] ? do_mbind+0x760/0x760 [ 475.243300][T28512] ? remove_migration_ptes+0x90/0x90 [ 475.248650][T28512] do_mbind+0x5b7/0x760 [ 475.252807][T28512] __se_sys_mbind+0x151/0x410 [ 475.257559][T28512] __x64_sys_mbind+0x74/0x80 [ 475.262193][T28512] do_syscall_64+0x44/0xd0 [ 475.266617][T28512] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 475.272611][T28512] RIP: 0033:0x7f0d68981059 [ 475.277030][T28512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 475.296615][T28512] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 475.305127][T28512] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 475.313149][T28512] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 475.321242][T28512] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 18:38:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 475.329192][T28512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 475.337319][T28512] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 475.345286][T28512] [ 475.368554][T28520] FAULT_INJECTION: forcing a failure. [ 475.368554][T28520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 475.381898][T28520] CPU: 0 PID: 28520 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 475.392986][T28520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.403043][T28520] Call Trace: [ 475.406307][T28520] [ 475.409225][T28520] dump_stack_lvl+0xd6/0x122 [ 475.413812][T28520] dump_stack+0x11/0x1b [ 475.417959][T28520] should_fail+0x23c/0x250 [ 475.422396][T28520] __alloc_pages+0x102/0x330 [ 475.427031][T28520] alloc_pages_vma+0x67e/0x810 [ 475.431785][T28520] new_page+0x121/0x170 [ 475.435928][T28520] migrate_pages+0x465/0x1810 [ 475.440598][T28520] ? do_mbind+0x760/0x760 [ 475.444926][T28520] ? remove_migration_ptes+0x90/0x90 [ 475.450201][T28520] do_mbind+0x5b7/0x760 [ 475.454400][T28520] __se_sys_mbind+0x151/0x410 [ 475.459065][T28520] __x64_sys_mbind+0x74/0x80 [ 475.463640][T28520] do_syscall_64+0x44/0xd0 [ 475.468049][T28520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 475.473933][T28520] RIP: 0033:0x7fb80e59e059 [ 475.478344][T28520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 475.498068][T28520] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 475.506554][T28520] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 475.514561][T28520] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 475.522576][T28520] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 475.530559][T28520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 475.538593][T28520] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 475.546641][T28520] 18:38:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 15) 18:38:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000a00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000005bb000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 24) 18:38:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000b00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 475.631035][T28536] loop5: detected capacity change from 0 to 264192 [ 475.669688][T28539] loop4: detected capacity change from 0 to 264192 [ 475.682689][T28540] FAULT_INJECTION: forcing a failure. [ 475.682689][T28540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 475.695945][T28540] CPU: 1 PID: 28540 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 475.706965][T28540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.717134][T28540] Call Trace: [ 475.720413][T28540] [ 475.723412][T28540] dump_stack_lvl+0xd6/0x122 [ 475.728084][T28540] dump_stack+0x11/0x1b [ 475.732244][T28540] should_fail+0x23c/0x250 [ 475.736845][T28540] __alloc_pages+0x102/0x330 [ 475.741441][T28540] alloc_pages_vma+0x67e/0x810 [ 475.746210][T28540] new_page+0x121/0x170 [ 475.750455][T28540] migrate_pages+0x465/0x1810 [ 475.755155][T28540] ? do_mbind+0x760/0x760 [ 475.759547][T28540] ? remove_migration_ptes+0x90/0x90 [ 475.764836][T28540] do_mbind+0x5b7/0x760 [ 475.769007][T28540] __se_sys_mbind+0x151/0x410 [ 475.773689][T28540] __x64_sys_mbind+0x74/0x80 [ 475.778302][T28540] do_syscall_64+0x44/0xd0 [ 475.782786][T28540] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 475.788732][T28540] RIP: 0033:0x7fb80e59e059 [ 475.793144][T28540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 475.800511][T28543] loop1: detected capacity change from 0 to 264192 [ 475.812742][T28540] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 475.812779][T28540] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 475.812791][T28540] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 475.812805][T28540] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 475.851631][T28540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 475.859662][T28540] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 475.867632][T28540] [ 475.873089][T28536] FAULT_INJECTION: forcing a failure. 18:38:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 25) [ 475.873089][T28536] name failslab, interval 1, probability 0, space 0, times 0 [ 475.885966][T28536] CPU: 0 PID: 28536 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 475.896984][T28536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.907036][T28536] Call Trace: [ 475.910312][T28536] [ 475.913238][T28536] dump_stack_lvl+0xd6/0x122 [ 475.917882][T28536] dump_stack+0x11/0x1b [ 475.922061][T28536] should_fail+0x23c/0x250 [ 475.926477][T28536] ? mempool_alloc_slab+0x16/0x20 [ 475.931510][T28536] __should_failslab+0x81/0x90 [ 475.936309][T28536] should_failslab+0x5/0x20 [ 475.940881][T28536] kmem_cache_alloc+0x4f/0x320 [ 475.945647][T28536] mempool_alloc_slab+0x16/0x20 [ 475.950521][T28536] ? mempool_free+0x130/0x130 [ 475.955211][T28536] mempool_alloc+0x9d/0x310 [ 475.959715][T28536] ? submit_bio_noacct+0x49f/0x4e0 [ 475.964834][T28536] bio_alloc_bioset+0xcc/0x560 [ 475.969607][T28536] submit_bh_wbc+0x133/0x320 [ 475.974200][T28536] __block_write_full_page+0x648/0xa10 [ 475.979686][T28536] ? mark_buffer_write_io_error+0x180/0x180 [ 475.985589][T28536] ? fat_block_truncate_page+0x30/0x30 [ 475.991047][T28536] ? fat_block_truncate_page+0x30/0x30 [ 475.996573][T28536] block_write_full_page+0x1f0/0x210 [ 476.001872][T28536] fat_writepage+0x20/0x30 [ 476.006310][T28536] move_to_new_page+0x2f6/0x520 [ 476.011171][T28536] ? remove_migration_ptes+0x90/0x90 [ 476.016524][T28536] migrate_pages+0xdec/0x1810 [ 476.021273][T28536] ? do_mbind+0x760/0x760 [ 476.025648][T28536] ? remove_migration_ptes+0x90/0x90 [ 476.030941][T28536] do_mbind+0x5b7/0x760 [ 476.035095][T28536] __se_sys_mbind+0x151/0x410 [ 476.039776][T28536] __x64_sys_mbind+0x74/0x80 [ 476.044368][T28536] do_syscall_64+0x44/0xd0 [ 476.048796][T28536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 476.054721][T28536] RIP: 0033:0x7f0d68981059 [ 476.059163][T28536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 476.078786][T28536] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 476.087334][T28536] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059 [ 476.095337][T28536] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 476.103332][T28536] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002 [ 476.111330][T28536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 476.119282][T28536] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000 [ 476.127298][T28536] [ 476.153696][T28550] FAULT_INJECTION: forcing a failure. [ 476.153696][T28550] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 476.167026][T28550] CPU: 1 PID: 28550 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 476.178105][T28550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.188158][T28550] Call Trace: [ 476.191428][T28550] [ 476.194387][T28550] dump_stack_lvl+0xd6/0x122 [ 476.199083][T28550] dump_stack+0x11/0x1b [ 476.203265][T28550] should_fail+0x23c/0x250 [ 476.207675][T28550] __alloc_pages+0x102/0x330 [ 476.212419][T28550] alloc_pages_vma+0x67e/0x810 [ 476.217170][T28550] new_page+0x121/0x170 [ 476.221364][T28550] migrate_pages+0x465/0x1810 [ 476.226042][T28550] ? do_mbind+0x760/0x760 [ 476.230354][T28550] ? remove_migration_ptes+0x90/0x90 [ 476.235718][T28550] do_mbind+0x5b7/0x760 [ 476.239916][T28550] __se_sys_mbind+0x151/0x410 [ 476.244596][T28550] __x64_sys_mbind+0x74/0x80 [ 476.249170][T28550] do_syscall_64+0x44/0xd0 [ 476.253569][T28550] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 476.259526][T28550] RIP: 0033:0x7fb80e59e059 [ 476.263934][T28550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 476.283563][T28550] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 476.291969][T28550] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 18:38:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 476.299923][T28550] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 476.307890][T28550] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 476.315856][T28550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 476.323812][T28550] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 476.331829][T28550] 18:38:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 476.368054][T28553] loop4: detected capacity change from 0 to 264192 [ 476.392235][T28556] loop1: detected capacity change from 0 to 264192 18:38:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000d00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 26) 18:38:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000300000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 476.535341][T28567] loop4: detected capacity change from 0 to 264192 18:38:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 476.634416][T28574] loop5: detected capacity change from 0 to 264192 [ 476.635173][T28566] FAULT_INJECTION: forcing a failure. [ 476.635173][T28566] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 476.654185][T28566] CPU: 0 PID: 28566 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 476.665262][T28566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.675313][T28566] Call Trace: [ 476.678590][T28566] [ 476.681541][T28566] dump_stack_lvl+0xd6/0x122 [ 476.686184][T28566] dump_stack+0x11/0x1b [ 476.690347][T28566] should_fail+0x23c/0x250 [ 476.694763][T28566] __alloc_pages+0x102/0x330 [ 476.699374][T28566] alloc_pages_vma+0x67e/0x810 [ 476.704151][T28566] new_page+0x121/0x170 [ 476.708326][T28566] migrate_pages+0x465/0x1810 [ 476.713113][T28566] ? do_mbind+0x760/0x760 [ 476.717440][T28566] ? remove_migration_ptes+0x90/0x90 [ 476.722728][T28566] do_mbind+0x5b7/0x760 [ 476.726886][T28566] __se_sys_mbind+0x151/0x410 [ 476.731576][T28566] __x64_sys_mbind+0x74/0x80 [ 476.736183][T28566] do_syscall_64+0x44/0xd0 [ 476.740599][T28566] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 476.746577][T28566] RIP: 0033:0x7fb80e59e059 [ 476.750994][T28566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 476.770599][T28566] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 476.779110][T28566] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 476.787063][T28566] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 476.795027][T28566] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 476.802985][T28566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 476.811058][T28566] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 476.819032][T28566] 18:38:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000f00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 476.840431][T28577] loop4: detected capacity change from 0 to 264192 18:38:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 27) [ 476.888287][T28581] loop1: detected capacity change from 0 to 264192 [ 477.009383][T28585] FAULT_INJECTION: forcing a failure. [ 477.009383][T28585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 477.022702][T28585] CPU: 0 PID: 28585 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 477.033854][T28585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.043908][T28585] Call Trace: [ 477.047181][T28585] [ 477.050163][T28585] dump_stack_lvl+0xd6/0x122 [ 477.054764][T28585] dump_stack+0x11/0x1b 18:38:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x0, 0x0, 0x6, 0x10000000002) 18:38:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 477.058922][T28585] should_fail+0x23c/0x250 [ 477.063396][T28585] __alloc_pages+0x102/0x330 [ 477.068006][T28585] alloc_pages_vma+0x67e/0x810 [ 477.072773][T28585] new_page+0x121/0x170 [ 477.076927][T28585] migrate_pages+0x465/0x1810 [ 477.081657][T28585] ? do_mbind+0x760/0x760 [ 477.083670][T28589] loop4: detected capacity change from 0 to 264192 [ 477.086003][T28585] ? remove_migration_ptes+0x90/0x90 [ 477.086032][T28585] do_mbind+0x5b7/0x760 [ 477.101944][T28585] __se_sys_mbind+0x151/0x410 [ 477.106623][T28585] __x64_sys_mbind+0x74/0x80 [ 477.111285][T28585] do_syscall_64+0x44/0xd0 [ 477.115746][T28585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 477.121710][T28585] RIP: 0033:0x7fb80e59e059 [ 477.126123][T28585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 477.145733][T28585] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 28) [ 477.154158][T28585] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 477.162116][T28585] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 477.170071][T28585] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 477.178023][T28585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 477.185979][T28585] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 477.194003][T28585] 18:38:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000700000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 477.286001][T28601] loop5: detected capacity change from 0 to 264192 [ 477.286714][T28599] loop4: detected capacity change from 0 to 264192 [ 477.303148][T28604] FAULT_INJECTION: forcing a failure. [ 477.303148][T28604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 477.308083][T28606] loop1: detected capacity change from 0 to 264192 [ 477.316420][T28604] CPU: 0 PID: 28604 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 477.333916][T28604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.344067][T28604] Call Trace: [ 477.347342][T28604] [ 477.350269][T28604] dump_stack_lvl+0xd6/0x122 [ 477.354945][T28604] dump_stack+0x11/0x1b [ 477.359113][T28604] should_fail+0x23c/0x250 [ 477.363617][T28604] __alloc_pages+0x102/0x330 [ 477.368208][T28604] alloc_pages_vma+0x67e/0x810 [ 477.372979][T28604] new_page+0x121/0x170 [ 477.377145][T28604] migrate_pages+0x465/0x1810 [ 477.381831][T28604] ? do_mbind+0x760/0x760 [ 477.386225][T28604] ? remove_migration_ptes+0x90/0x90 [ 477.391521][T28604] do_mbind+0x5b7/0x760 [ 477.395682][T28604] __se_sys_mbind+0x151/0x410 [ 477.400361][T28604] __x64_sys_mbind+0x74/0x80 [ 477.404989][T28604] do_syscall_64+0x44/0xd0 [ 477.409408][T28604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 477.415309][T28604] RIP: 0033:0x7fb80e59e059 [ 477.419724][T28604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 477.439451][T28604] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 477.447866][T28604] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 477.455839][T28604] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 477.463817][T28604] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 477.471792][T28604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:38:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 477.479757][T28604] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 477.487815][T28604] 18:38:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 29) 18:38:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00026, 0x0, 0x0, 0x6, 0x10000000002) 18:38:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 477.588226][T28613] loop4: detected capacity change from 0 to 264192 [ 477.612018][T28615] loop1: detected capacity change from 0 to 264192 18:38:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 477.707015][T28620] loop4: detected capacity change from 0 to 264192 [ 477.756030][T28630] loop5: detected capacity change from 0 to 264192 [ 477.765714][T28621] FAULT_INJECTION: forcing a failure. [ 477.765714][T28621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 477.778963][T28621] CPU: 1 PID: 28621 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 477.789988][T28621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.800058][T28621] Call Trace: [ 477.803330][T28621] [ 477.806255][T28621] dump_stack_lvl+0xd6/0x122 [ 477.810943][T28621] dump_stack+0x11/0x1b [ 477.815133][T28621] should_fail+0x23c/0x250 [ 477.819614][T28621] __alloc_pages+0x102/0x330 [ 477.824198][T28621] alloc_pages_vma+0x67e/0x810 [ 477.828983][T28621] new_page+0x121/0x170 [ 477.833146][T28621] migrate_pages+0x465/0x1810 [ 477.837889][T28621] ? do_mbind+0x760/0x760 [ 477.842217][T28621] ? remove_migration_ptes+0x90/0x90 [ 477.847509][T28621] do_mbind+0x5b7/0x760 [ 477.851744][T28621] __se_sys_mbind+0x151/0x410 18:38:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 477.856441][T28621] __x64_sys_mbind+0x74/0x80 [ 477.861116][T28621] do_syscall_64+0x44/0xd0 [ 477.865552][T28621] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 477.871471][T28621] RIP: 0033:0x7fb80e59e059 [ 477.875882][T28621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 477.895678][T28621] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 30) 18:38:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000a00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 477.904086][T28621] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 477.912055][T28621] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 477.920021][T28621] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 477.927965][T28621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 477.935909][T28621] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 477.943876][T28621] 18:38:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000b00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 478.002559][T28638] loop4: detected capacity change from 0 to 264192 [ 478.033164][T28644] loop1: detected capacity change from 0 to 264192 [ 478.125500][T28649] loop4: detected capacity change from 0 to 264192 [ 478.134470][T28647] FAULT_INJECTION: forcing a failure. [ 478.134470][T28647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 478.147732][T28647] CPU: 0 PID: 28647 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 478.158831][T28647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.168935][T28647] Call Trace: [ 478.172210][T28647] [ 478.175143][T28647] dump_stack_lvl+0xd6/0x122 [ 478.179752][T28647] dump_stack+0x11/0x1b [ 478.184106][T28647] should_fail+0x23c/0x250 [ 478.188547][T28647] __alloc_pages+0x102/0x330 [ 478.193247][T28647] alloc_pages_vma+0x67e/0x810 [ 478.198013][T28647] new_page+0x121/0x170 [ 478.202243][T28647] migrate_pages+0x465/0x1810 [ 478.206922][T28647] ? do_mbind+0x760/0x760 [ 478.211292][T28647] ? remove_migration_ptes+0x90/0x90 [ 478.216631][T28647] do_mbind+0x5b7/0x760 [ 478.220811][T28647] __se_sys_mbind+0x151/0x410 [ 478.225481][T28647] __x64_sys_mbind+0x74/0x80 [ 478.230162][T28647] do_syscall_64+0x44/0xd0 [ 478.234571][T28647] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 478.240496][T28647] RIP: 0033:0x7fb80e59e059 [ 478.244970][T28647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 478.264579][T28647] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, 0x0, 0x6, 0x10000000002) 18:38:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000002500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 478.273050][T28647] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 478.281021][T28647] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 478.288977][T28647] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 478.297053][T28647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 478.305021][T28647] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 478.312990][T28647] 18:38:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 18:38:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000004000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000d00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 31) 18:38:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 478.407511][T28660] loop5: detected capacity change from 0 to 264192 [ 478.472581][T28668] loop4: detected capacity change from 0 to 264192 [ 478.486682][T28671] loop1: detected capacity change from 0 to 264192 [ 478.511858][T28664] FAULT_INJECTION: forcing a failure. [ 478.511858][T28664] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 478.525122][T28664] CPU: 1 PID: 28664 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 478.536225][T28664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.546278][T28664] Call Trace: [ 478.549552][T28664] [ 478.552473][T28664] dump_stack_lvl+0xd6/0x122 [ 478.557097][T28664] dump_stack+0x11/0x1b [ 478.561259][T28664] should_fail+0x23c/0x250 [ 478.565668][T28664] __alloc_pages+0x102/0x330 18:38:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000064900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 478.570255][T28664] alloc_pages_vma+0x67e/0x810 [ 478.575061][T28664] new_page+0x121/0x170 [ 478.579319][T28664] migrate_pages+0x465/0x1810 [ 478.584097][T28664] ? do_mbind+0x760/0x760 [ 478.588538][T28664] ? remove_migration_ptes+0x90/0x90 [ 478.593897][T28664] do_mbind+0x5b7/0x760 [ 478.598057][T28664] __se_sys_mbind+0x151/0x410 [ 478.602755][T28664] __x64_sys_mbind+0x74/0x80 [ 478.607468][T28664] do_syscall_64+0x44/0xd0 [ 478.611959][T28664] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 478.617929][T28664] RIP: 0033:0x7fb80e59e059 [ 478.622405][T28664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 478.642015][T28664] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 478.650422][T28664] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 478.658388][T28664] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 18:38:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000f00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 32) [ 478.666388][T28664] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 478.674424][T28664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 478.682400][T28664] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 478.690351][T28664] 18:38:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00028, 0x0, 0x0, 0x6, 0x10000000002) 18:38:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000005c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 478.801562][T28684] loop5: detected capacity change from 0 to 264192 [ 478.821688][T28679] FAULT_INJECTION: forcing a failure. [ 478.821688][T28679] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 478.834967][T28679] CPU: 1 PID: 28679 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 18:38:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 18:38:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000006000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 478.845985][T28679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.856038][T28679] Call Trace: [ 478.859403][T28679] [ 478.862350][T28679] dump_stack_lvl+0xd6/0x122 [ 478.866944][T28679] dump_stack+0x11/0x1b [ 478.871098][T28679] should_fail+0x23c/0x250 [ 478.875523][T28679] __alloc_pages+0x102/0x330 [ 478.880148][T28679] alloc_pages_vma+0x67e/0x810 [ 478.884940][T28679] new_page+0x121/0x170 [ 478.889113][T28679] migrate_pages+0x465/0x1810 [ 478.893864][T28679] ? do_mbind+0x760/0x760 [ 478.898213][T28679] ? remove_migration_ptes+0x90/0x90 [ 478.903505][T28679] do_mbind+0x5b7/0x760 [ 478.907662][T28679] __se_sys_mbind+0x151/0x410 [ 478.912336][T28679] __x64_sys_mbind+0x74/0x80 [ 478.916968][T28679] do_syscall_64+0x44/0xd0 [ 478.921385][T28679] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 478.927357][T28679] RIP: 0033:0x7fb80e59e059 [ 478.931764][T28679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 478.951369][T28679] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 478.959776][T28679] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 478.967892][T28679] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 478.975860][T28679] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 478.983813][T28679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 478.991770][T28679] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 18:38:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 478.999861][T28679] 18:38:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 33) 18:38:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 479.039595][T28691] loop4: detected capacity change from 0 to 264192 18:38:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 479.097601][T28698] loop1: detected capacity change from 0 to 264192 [ 479.164087][T28695] FAULT_INJECTION: forcing a failure. [ 479.164087][T28695] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.177391][T28695] CPU: 1 PID: 28695 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 479.188411][T28695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.198461][T28695] Call Trace: [ 479.201738][T28695] [ 479.204713][T28695] dump_stack_lvl+0xd6/0x122 [ 479.209304][T28695] dump_stack+0x11/0x1b [ 479.213450][T28695] should_fail+0x23c/0x250 [ 479.217859][T28695] __alloc_pages+0x102/0x330 [ 479.222441][T28695] alloc_pages_vma+0x67e/0x810 [ 479.227197][T28695] new_page+0x121/0x170 [ 479.231350][T28695] migrate_pages+0x465/0x1810 [ 479.236134][T28695] ? do_mbind+0x760/0x760 [ 479.240516][T28695] ? remove_migration_ptes+0x90/0x90 [ 479.245815][T28695] do_mbind+0x5b7/0x760 [ 479.249967][T28695] __se_sys_mbind+0x151/0x410 [ 479.254703][T28695] __x64_sys_mbind+0x74/0x80 [ 479.259288][T28695] do_syscall_64+0x44/0xd0 [ 479.263702][T28695] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 479.269678][T28695] RIP: 0033:0x7fb80e59e059 [ 479.274103][T28695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 479.293805][T28695] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 479.302259][T28695] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffff9e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 479.310234][T28695] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 479.318188][T28695] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 479.326142][T28695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 479.334145][T28695] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 479.342160][T28695] 18:38:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0006e, 0x0, 0x0, 0x6, 0x10000000002) 18:38:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 34) [ 479.427237][T28708] loop4: detected capacity change from 0 to 264192 18:38:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 18:38:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffffef00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 479.525594][T28712] FAULT_INJECTION: forcing a failure. [ 479.525594][T28712] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.534141][T28720] loop5: detected capacity change from 0 to 264192 [ 479.538897][T28712] CPU: 0 PID: 28712 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 479.556311][T28712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.566386][T28712] Call Trace: [ 479.569655][T28712] [ 479.572658][T28712] dump_stack_lvl+0xd6/0x122 [ 479.577327][T28712] dump_stack+0x11/0x1b [ 479.581481][T28712] should_fail+0x23c/0x250 [ 479.585986][T28712] __alloc_pages+0x102/0x330 [ 479.590582][T28712] alloc_pages_vma+0x67e/0x810 [ 479.595350][T28712] new_page+0x121/0x170 [ 479.599504][T28712] migrate_pages+0x465/0x1810 [ 479.604217][T28712] ? do_mbind+0x760/0x760 [ 479.608578][T28712] ? remove_migration_ptes+0x90/0x90 [ 479.613867][T28712] do_mbind+0x5b7/0x760 [ 479.618035][T28712] __se_sys_mbind+0x151/0x410 [ 479.622712][T28712] __x64_sys_mbind+0x74/0x80 [ 479.627382][T28712] do_syscall_64+0x44/0xd0 [ 479.631793][T28712] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 479.637986][T28712] RIP: 0033:0x7fb80e59e059 [ 479.642395][T28712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 479.662019][T28712] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 479.670418][T28712] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 479.678419][T28712] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 479.686373][T28712] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 479.694372][T28712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 479.702352][T28712] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 479.710307][T28712] 18:38:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 35) [ 479.731514][T28723] loop1: detected capacity change from 0 to 264192 18:38:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 479.860786][T28735] loop4: detected capacity change from 0 to 264192 [ 479.877724][T28729] FAULT_INJECTION: forcing a failure. [ 479.877724][T28729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.891007][T28729] CPU: 1 PID: 28729 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 479.902047][T28729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.912099][T28729] Call Trace: [ 479.915371][T28729] [ 479.918297][T28729] dump_stack_lvl+0xd6/0x122 [ 479.923057][T28729] dump_stack+0x11/0x1b [ 479.927321][T28729] should_fail+0x23c/0x250 [ 479.931742][T28729] __alloc_pages+0x102/0x330 [ 479.936335][T28729] alloc_pages_vma+0x67e/0x810 [ 479.941101][T28729] new_page+0x121/0x170 [ 479.945322][T28729] migrate_pages+0x465/0x1810 [ 479.950143][T28729] ? do_mbind+0x760/0x760 [ 479.954478][T28729] ? remove_migration_ptes+0x90/0x90 [ 479.959770][T28729] do_mbind+0x5b7/0x760 [ 479.963931][T28729] __se_sys_mbind+0x151/0x410 [ 479.968653][T28729] __x64_sys_mbind+0x74/0x80 [ 479.973247][T28729] do_syscall_64+0x44/0xd0 [ 479.977718][T28729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 479.983671][T28729] RIP: 0033:0x7fb80e59e059 [ 479.988090][T28729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2, 0x0, 0x6, 0x10000000002) 18:38:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0) 18:38:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 36) 18:38:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffffe00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) [ 480.007757][T28729] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 480.016176][T28729] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 480.024147][T28729] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 480.032221][T28729] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 480.040180][T28729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 480.048224][T28729] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 480.056176][T28729] 18:38:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000002500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007fffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 480.119639][T28744] loop5: detected capacity change from 0 to 264192 [ 480.146891][T28745] loop1: detected capacity change from 0 to 264192 [ 480.172641][T28739] FAULT_INJECTION: forcing a failure. [ 480.172641][T28739] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.185917][T28739] CPU: 1 PID: 28739 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 480.196952][T28739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.207003][T28739] Call Trace: [ 480.210337][T28739] [ 480.213279][T28739] dump_stack_lvl+0xd6/0x122 [ 480.217891][T28739] dump_stack+0x11/0x1b 18:38:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 480.222129][T28739] should_fail+0x23c/0x250 [ 480.226544][T28739] __alloc_pages+0x102/0x330 [ 480.231198][T28739] alloc_pages_vma+0x67e/0x810 [ 480.235976][T28739] new_page+0x121/0x170 [ 480.240142][T28739] migrate_pages+0x465/0x1810 [ 480.244822][T28739] ? do_mbind+0x760/0x760 [ 480.249198][T28739] ? remove_migration_ptes+0x90/0x90 [ 480.254566][T28739] do_mbind+0x5b7/0x760 [ 480.258737][T28739] __se_sys_mbind+0x151/0x410 [ 480.263427][T28739] __x64_sys_mbind+0x74/0x80 [ 480.268023][T28739] do_syscall_64+0x44/0xd0 [ 480.272431][T28739] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 480.278314][T28739] RIP: 0033:0x7fb80e59e059 [ 480.282717][T28739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 480.302314][T28739] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 480.310751][T28739] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 480.318710][T28739] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 480.326668][T28739] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 480.334708][T28739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 480.342712][T28739] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 480.350699][T28739] 18:38:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000004000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 37) 18:38:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000009effffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 480.374633][T28753] loop4: detected capacity change from 0 to 264192 18:38:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000efffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000005c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0) 18:38:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f0ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 480.455218][T28763] loop5: detected capacity change from 0 to 264192 [ 480.535002][T28761] FAULT_INJECTION: forcing a failure. [ 480.535002][T28761] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.548264][T28761] CPU: 1 PID: 28761 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 480.559338][T28761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.569442][T28761] Call Trace: [ 480.572712][T28761] [ 480.575633][T28761] dump_stack_lvl+0xd6/0x122 [ 480.580242][T28761] dump_stack+0x11/0x1b [ 480.584385][T28761] should_fail+0x23c/0x250 [ 480.588838][T28761] __alloc_pages+0x102/0x330 [ 480.593416][T28761] alloc_pages_vma+0x67e/0x810 [ 480.598210][T28761] new_page+0x121/0x170 [ 480.602353][T28761] migrate_pages+0x465/0x1810 [ 480.607094][T28761] ? do_mbind+0x760/0x760 [ 480.611408][T28761] ? remove_migration_ptes+0x90/0x90 [ 480.616687][T28761] do_mbind+0x5b7/0x760 [ 480.620839][T28761] __se_sys_mbind+0x151/0x410 [ 480.625504][T28761] __x64_sys_mbind+0x74/0x80 [ 480.630078][T28761] do_syscall_64+0x44/0xd0 [ 480.634478][T28761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 480.640378][T28761] RIP: 0033:0x7fb80e59e059 [ 480.644774][T28761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 480.664419][T28761] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 480.672813][T28761] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000006000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 480.680841][T28761] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 480.688793][T28761] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 480.696748][T28761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 480.704706][T28761] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 480.712674][T28761] 18:38:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f5ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 480.739506][T28773] loop1: detected capacity change from 0 to 264192 18:38:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 38) 18:38:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x6, 0x10000000002) 18:38:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000feffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffff9e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0) [ 480.872399][T28781] loop4: detected capacity change from 0 to 264192 18:38:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000005bb00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 480.928672][T28789] loop5: detected capacity change from 0 to 264192 [ 480.992143][T28784] FAULT_INJECTION: forcing a failure. [ 480.992143][T28784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.005418][T28784] CPU: 0 PID: 28784 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 481.016456][T28784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.020190][T28799] loop1: detected capacity change from 0 to 264192 [ 481.026503][T28784] Call Trace: [ 481.026510][T28784] 18:38:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x6, 0x0, 0x6, 0x10000000002) [ 481.026517][T28784] dump_stack_lvl+0xd6/0x122 [ 481.043819][T28784] dump_stack+0x11/0x1b [ 481.048032][T28784] should_fail+0x23c/0x250 [ 481.052523][T28784] __alloc_pages+0x102/0x330 [ 481.057165][T28784] alloc_pages_vma+0x67e/0x810 [ 481.061929][T28784] new_page+0x121/0x170 [ 481.066091][T28784] migrate_pages+0x465/0x1810 [ 481.070792][T28784] ? do_mbind+0x760/0x760 [ 481.075207][T28784] ? remove_migration_ptes+0x90/0x90 [ 481.080497][T28784] do_mbind+0x5b7/0x760 [ 481.084656][T28784] __se_sys_mbind+0x151/0x410 [ 481.089330][T28784] __x64_sys_mbind+0x74/0x80 [ 481.093922][T28784] do_syscall_64+0x44/0xd0 [ 481.098397][T28784] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.104292][T28784] RIP: 0033:0x7fb80e59e059 [ 481.108703][T28784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 481.128390][T28784] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x6, 0x10000000002) 18:38:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 481.136807][T28784] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 481.144797][T28784] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 481.152766][T28784] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 481.160774][T28784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.168768][T28784] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 481.176783][T28784] 18:38:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 39) 18:38:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffffef00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000002000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 481.262474][T28806] loop5: detected capacity change from 0 to 264192 18:38:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 481.308959][T28813] loop1: detected capacity change from 0 to 264192 [ 481.346132][T28817] loop4: detected capacity change from 0 to 264192 [ 481.381137][T28804] FAULT_INJECTION: forcing a failure. [ 481.381137][T28804] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.394621][T28804] CPU: 0 PID: 28804 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 481.405647][T28804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.415702][T28804] Call Trace: [ 481.418978][T28804] [ 481.421901][T28804] dump_stack_lvl+0xd6/0x122 [ 481.426531][T28804] dump_stack+0x11/0x1b [ 481.430758][T28804] should_fail+0x23c/0x250 [ 481.435274][T28804] __alloc_pages+0x102/0x330 [ 481.439866][T28804] alloc_pages_vma+0x67e/0x810 [ 481.444645][T28804] new_page+0x121/0x170 [ 481.448829][T28804] migrate_pages+0x465/0x1810 [ 481.453526][T28804] ? do_mbind+0x760/0x760 [ 481.457953][T28804] ? remove_migration_ptes+0x90/0x90 [ 481.463243][T28804] do_mbind+0x5b7/0x760 [ 481.467410][T28804] __se_sys_mbind+0x151/0x410 [ 481.472101][T28804] __x64_sys_mbind+0x74/0x80 [ 481.476703][T28804] do_syscall_64+0x44/0xd0 [ 481.481136][T28804] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.487063][T28804] RIP: 0033:0x7fb80e59e059 [ 481.491488][T28804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 481.511182][T28804] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 481.519620][T28804] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x7, 0x0, 0x6, 0x10000000002) 18:38:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 40) [ 481.527591][T28804] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 481.535567][T28804] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 481.543535][T28804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.551507][T28804] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 481.559481][T28804] [ 481.660772][T28830] loop5: detected capacity change from 0 to 264192 [ 481.723664][T28832] FAULT_INJECTION: forcing a failure. [ 481.723664][T28832] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.736928][T28832] CPU: 0 PID: 28832 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 481.747949][T28832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.758040][T28832] Call Trace: [ 481.761393][T28832] [ 481.764359][T28832] dump_stack_lvl+0xd6/0x122 [ 481.769023][T28832] dump_stack+0x11/0x1b 18:38:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000004000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffffe00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 481.773192][T28832] should_fail+0x23c/0x250 [ 481.777634][T28832] __alloc_pages+0x102/0x330 [ 481.782259][T28832] alloc_pages_vma+0x67e/0x810 [ 481.787096][T28832] new_page+0x121/0x170 [ 481.791381][T28832] migrate_pages+0x465/0x1810 [ 481.796061][T28832] ? do_mbind+0x760/0x760 [ 481.800382][T28832] ? remove_migration_ptes+0x90/0x90 [ 481.805713][T28832] do_mbind+0x5b7/0x760 [ 481.809865][T28832] __se_sys_mbind+0x151/0x410 [ 481.814621][T28832] __x64_sys_mbind+0x74/0x80 [ 481.819197][T28832] do_syscall_64+0x44/0xd0 [ 481.823609][T28832] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.829492][T28832] RIP: 0033:0x7fb80e59e059 [ 481.833896][T28832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 481.853503][T28832] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 481.862083][T28832] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 18:38:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 481.870039][T28832] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 481.877993][T28832] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 481.885979][T28832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.894070][T28832] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 481.902029][T28832] 18:38:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 41) 18:38:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007fffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x8, 0x0, 0x6, 0x10000000002) 18:38:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 482.001199][T28845] loop1: detected capacity change from 0 to 264192 [ 482.050061][T28850] FAULT_INJECTION: forcing a failure. [ 482.050061][T28850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.056072][T28849] loop4: detected capacity change from 0 to 264192 [ 482.063327][T28850] CPU: 0 PID: 28850 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 482.063354][T28850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.091068][T28850] Call Trace: [ 482.094340][T28850] [ 482.097317][T28850] dump_stack_lvl+0xd6/0x122 [ 482.101956][T28850] dump_stack+0x11/0x1b [ 482.106161][T28850] should_fail+0x23c/0x250 [ 482.110576][T28850] __alloc_pages+0x102/0x330 [ 482.115196][T28850] alloc_pages_vma+0x67e/0x810 [ 482.120023][T28850] new_page+0x121/0x170 [ 482.124204][T28850] migrate_pages+0x465/0x1810 [ 482.128917][T28850] ? do_mbind+0x760/0x760 [ 482.133357][T28850] ? remove_migration_ptes+0x90/0x90 [ 482.138695][T28850] do_mbind+0x5b7/0x760 [ 482.142852][T28850] __se_sys_mbind+0x151/0x410 [ 482.147532][T28850] __x64_sys_mbind+0x74/0x80 [ 482.152155][T28850] do_syscall_64+0x44/0xd0 [ 482.156642][T28850] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.162597][T28850] RIP: 0033:0x7fb80e59e059 [ 482.167073][T28850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.186750][T28850] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000009effffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) [ 482.195165][T28850] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 482.203143][T28850] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 482.211175][T28850] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 482.219247][T28850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 482.227270][T28850] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 482.235250][T28850] 18:38:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000efffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 42) [ 482.265956][T28856] loop5: detected capacity change from 0 to 264192 18:38:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000008000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f0ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 482.431347][T28870] loop4: detected capacity change from 0 to 264192 [ 482.440171][T28862] FAULT_INJECTION: forcing a failure. [ 482.440171][T28862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.453412][T28862] CPU: 0 PID: 28862 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 482.464433][T28862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.474491][T28862] Call Trace: [ 482.477767][T28862] 18:38:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x9, 0x0, 0x6, 0x10000000002) 18:38:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f5ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 482.480696][T28862] dump_stack_lvl+0xd6/0x122 [ 482.485464][T28862] dump_stack+0x11/0x1b [ 482.489678][T28862] should_fail+0x23c/0x250 [ 482.494106][T28862] __alloc_pages+0x102/0x330 [ 482.498695][T28862] alloc_pages_vma+0x67e/0x810 [ 482.503456][T28862] new_page+0x121/0x170 [ 482.507612][T28862] migrate_pages+0x465/0x1810 [ 482.512347][T28862] ? do_mbind+0x760/0x760 [ 482.516724][T28862] ? remove_migration_ptes+0x90/0x90 [ 482.522016][T28862] do_mbind+0x5b7/0x760 [ 482.526182][T28862] __se_sys_mbind+0x151/0x410 [ 482.530983][T28862] __x64_sys_mbind+0x74/0x80 [ 482.535578][T28862] do_syscall_64+0x44/0xd0 [ 482.540066][T28862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.546009][T28862] RIP: 0033:0x7fb80e59e059 [ 482.550493][T28862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.570097][T28862] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 482.578517][T28862] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 482.586487][T28862] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 482.594514][T28862] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 482.602520][T28862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 482.610581][T28862] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 482.618542][T28862] 18:38:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 43) 18:38:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000feffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 482.661262][T28876] loop5: detected capacity change from 0 to 264192 [ 482.730393][T28880] loop1: detected capacity change from 0 to 264192 [ 482.817804][T28883] FAULT_INJECTION: forcing a failure. [ 482.817804][T28883] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.831120][T28883] CPU: 0 PID: 28883 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 482.842145][T28883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.852197][T28883] Call Trace: [ 482.855467][T28883] [ 482.858849][T28883] dump_stack_lvl+0xd6/0x122 [ 482.863440][T28883] dump_stack+0x11/0x1b [ 482.867611][T28883] should_fail+0x23c/0x250 [ 482.872026][T28883] __alloc_pages+0x102/0x330 [ 482.876614][T28883] alloc_pages_vma+0x67e/0x810 [ 482.881392][T28883] new_page+0x121/0x170 [ 482.885548][T28883] migrate_pages+0x465/0x1810 [ 482.890235][T28883] ? do_mbind+0x760/0x760 [ 482.894577][T28883] ? remove_migration_ptes+0x90/0x90 [ 482.899869][T28883] do_mbind+0x5b7/0x760 [ 482.904057][T28883] __se_sys_mbind+0x151/0x410 [ 482.909628][T28883] __x64_sys_mbind+0x74/0x80 18:38:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0) 18:38:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000a000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xd, 0x0, 0x6, 0x10000000002) 18:38:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 482.914222][T28883] do_syscall_64+0x44/0xd0 [ 482.918640][T28883] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.924607][T28883] RIP: 0033:0x7fb80e59e059 [ 482.929016][T28883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.948720][T28883] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 482.957132][T28883] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 44) [ 482.965125][T28883] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 482.973096][T28883] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 482.981128][T28883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 482.989091][T28883] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 482.997060][T28883] 18:38:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 483.037704][T28892] loop5: detected capacity change from 0 to 264192 [ 483.072153][T28897] loop1: detected capacity change from 0 to 264192 [ 483.105380][T28901] loop4: detected capacity change from 0 to 264192 [ 483.125626][T28893] FAULT_INJECTION: forcing a failure. [ 483.125626][T28893] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.138921][T28893] CPU: 0 PID: 28893 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 483.149944][T28893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.160043][T28893] Call Trace: [ 483.163315][T28893] [ 483.166327][T28893] dump_stack_lvl+0xd6/0x122 [ 483.170927][T28893] dump_stack+0x11/0x1b [ 483.175121][T28893] should_fail+0x23c/0x250 [ 483.179546][T28893] __alloc_pages+0x102/0x330 [ 483.184199][T28893] alloc_pages_vma+0x67e/0x810 [ 483.189052][T28893] new_page+0x121/0x170 [ 483.193236][T28893] migrate_pages+0x465/0x1810 [ 483.197923][T28893] ? do_mbind+0x760/0x760 18:38:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xf, 0x0, 0x6, 0x10000000002) [ 483.202252][T28893] ? remove_migration_ptes+0x90/0x90 [ 483.207569][T28893] do_mbind+0x5b7/0x760 [ 483.211732][T28893] __se_sys_mbind+0x151/0x410 [ 483.216413][T28893] __x64_sys_mbind+0x74/0x80 [ 483.221025][T28893] do_syscall_64+0x44/0xd0 [ 483.225450][T28893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.231350][T28893] RIP: 0033:0x7fb80e59e059 [ 483.235775][T28893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.255520][T28893] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 483.263935][T28893] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 483.271942][T28893] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 483.279919][T28893] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 483.287894][T28893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 483.295874][T28893] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0) [ 483.303919][T28893] 18:38:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 45) 18:38:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000002000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000d000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 483.413895][T28913] loop5: detected capacity change from 0 to 264192 [ 483.448923][T28915] FAULT_INJECTION: forcing a failure. [ 483.448923][T28915] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.462278][T28915] CPU: 1 PID: 28915 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 483.473320][T28915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.474423][T28919] loop4: detected capacity change from 0 to 264192 [ 483.483400][T28915] Call Trace: [ 483.483409][T28915] [ 483.483417][T28915] dump_stack_lvl+0xd6/0x122 [ 483.483445][T28915] dump_stack+0x11/0x1b [ 483.483466][T28915] should_fail+0x23c/0x250 [ 483.509305][T28915] __alloc_pages+0x102/0x330 [ 483.513902][T28915] alloc_pages_vma+0x67e/0x810 [ 483.518784][T28915] new_page+0x121/0x170 [ 483.523003][T28915] migrate_pages+0x465/0x1810 [ 483.527739][T28915] ? do_mbind+0x760/0x760 [ 483.532069][T28915] ? remove_migration_ptes+0x90/0x90 [ 483.537408][T28915] do_mbind+0x5b7/0x760 [ 483.541566][T28915] __se_sys_mbind+0x151/0x410 [ 483.546317][T28915] __x64_sys_mbind+0x74/0x80 [ 483.550924][T28915] do_syscall_64+0x44/0xd0 [ 483.555381][T28915] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.561412][T28915] RIP: 0033:0x7fb80e59e059 [ 483.565915][T28915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.585530][T28915] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 483.593948][T28915] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 483.601929][T28915] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 18:38:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0) [ 483.609898][T28915] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 483.618047][T28915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 483.626251][T28915] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 483.634396][T28915] 18:38:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 46) 18:38:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x10, 0x0, 0x6, 0x10000000002) 18:38:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000004000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000010000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 483.767470][T28930] loop4: detected capacity change from 0 to 264192 [ 483.813098][T28936] loop5: detected capacity change from 0 to 264192 [ 483.824241][T28939] loop1: detected capacity change from 0 to 264192 [ 483.837156][T28928] FAULT_INJECTION: forcing a failure. [ 483.837156][T28928] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.850443][T28928] CPU: 0 PID: 28928 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 483.861533][T28928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.871594][T28928] Call Trace: [ 483.874867][T28928] [ 483.877790][T28928] dump_stack_lvl+0xd6/0x122 [ 483.882389][T28928] dump_stack+0x11/0x1b [ 483.886544][T28928] should_fail+0x23c/0x250 [ 483.891145][T28928] __alloc_pages+0x102/0x330 [ 483.895801][T28928] alloc_pages_vma+0x67e/0x810 [ 483.900562][T28928] new_page+0x121/0x170 [ 483.904736][T28928] migrate_pages+0x465/0x1810 [ 483.909466][T28928] ? do_mbind+0x760/0x760 [ 483.913798][T28928] ? remove_migration_ptes+0x90/0x90 [ 483.919154][T28928] do_mbind+0x5b7/0x760 [ 483.923318][T28928] __se_sys_mbind+0x151/0x410 [ 483.927993][T28928] __x64_sys_mbind+0x74/0x80 [ 483.932589][T28928] do_syscall_64+0x44/0xd0 [ 483.937023][T28928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.942925][T28928] RIP: 0033:0x7fb80e59e059 [ 483.947334][T28928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.966943][T28928] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 483.975427][T28928] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 483.983501][T28928] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 483.991531][T28928] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 483.999544][T28928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:38:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x11, 0x0, 0x6, 0x10000000002) 18:38:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 484.007522][T28928] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 484.015495][T28928] 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000011000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x0, 0x0, 0x6, 0x10000000002) 18:38:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 47) 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x12, 0x0, 0x6, 0x10000000002) 18:38:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000008000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 484.238373][T28956] loop5: detected capacity change from 0 to 264192 [ 484.258503][T28960] loop4: detected capacity change from 0 to 264192 [ 484.266176][T28964] loop1: detected capacity change from 0 to 264192 18:38:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 484.335844][T28954] FAULT_INJECTION: forcing a failure. [ 484.335844][T28954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 484.349130][T28954] CPU: 0 PID: 28954 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 484.360165][T28954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.370226][T28954] Call Trace: [ 484.373508][T28954] [ 484.376430][T28954] dump_stack_lvl+0xd6/0x122 [ 484.381135][T28954] dump_stack+0x11/0x1b [ 484.385299][T28954] should_fail+0x23c/0x250 [ 484.389720][T28954] __alloc_pages+0x102/0x330 [ 484.394312][T28954] alloc_pages_vma+0x67e/0x810 [ 484.399090][T28954] new_page+0x121/0x170 [ 484.403262][T28954] migrate_pages+0x465/0x1810 [ 484.408039][T28954] ? do_mbind+0x760/0x760 [ 484.412508][T28954] ? remove_migration_ptes+0x90/0x90 [ 484.417874][T28954] do_mbind+0x5b7/0x760 [ 484.422098][T28954] __se_sys_mbind+0x151/0x410 [ 484.426774][T28954] __x64_sys_mbind+0x74/0x80 [ 484.431374][T28954] do_syscall_64+0x44/0xd0 [ 484.435842][T28954] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.441740][T28954] RIP: 0033:0x7fb80e59e059 [ 484.446166][T28954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 484.465834][T28954] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 484.474386][T28954] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x13, 0x0, 0x6, 0x10000000002) 18:38:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 48) [ 484.482385][T28954] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 484.490346][T28954] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 484.498318][T28954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 484.506289][T28954] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 484.514308][T28954] 18:38:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 484.665226][T28979] loop5: detected capacity change from 0 to 264192 [ 484.675115][T28985] loop1: detected capacity change from 0 to 264192 [ 484.686932][T28976] FAULT_INJECTION: forcing a failure. [ 484.686932][T28976] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 484.700220][T28976] CPU: 1 PID: 28976 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 484.711287][T28976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.721341][T28976] Call Trace: [ 484.724618][T28976] [ 484.727583][T28976] dump_stack_lvl+0xd6/0x122 [ 484.732239][T28976] dump_stack+0x11/0x1b [ 484.736397][T28976] should_fail+0x23c/0x250 [ 484.740817][T28976] __alloc_pages+0x102/0x330 [ 484.745493][T28976] alloc_pages_vma+0x67e/0x810 [ 484.750331][T28976] new_page+0x121/0x170 [ 484.754553][T28976] migrate_pages+0x465/0x1810 [ 484.759236][T28976] ? do_mbind+0x760/0x760 [ 484.763620][T28976] ? remove_migration_ptes+0x90/0x90 [ 484.768977][T28976] do_mbind+0x5b7/0x760 [ 484.773133][T28976] __se_sys_mbind+0x151/0x410 [ 484.778015][T28976] __x64_sys_mbind+0x74/0x80 [ 484.782611][T28976] do_syscall_64+0x44/0xd0 [ 484.787027][T28976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.792931][T28976] RIP: 0033:0x7fb80e59e059 18:38:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x14, 0x0, 0x6, 0x10000000002) [ 484.797372][T28976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 484.817051][T28976] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 484.825465][T28976] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 484.833480][T28976] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 484.841453][T28976] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 484.849411][T28976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 484.857478][T28976] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 18:38:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 49) 18:38:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000a000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 484.865451][T28976] 18:38:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000025000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 484.919787][T28992] loop4: detected capacity change from 0 to 264192 18:38:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000040000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 485.032609][T29000] loop1: detected capacity change from 0 to 264192 [ 485.037229][T29002] loop5: detected capacity change from 0 to 264192 [ 485.049798][T28998] FAULT_INJECTION: forcing a failure. [ 485.049798][T28998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.063042][T28998] CPU: 0 PID: 28998 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 485.074092][T28998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.084144][T28998] Call Trace: [ 485.087498][T28998] [ 485.090420][T28998] dump_stack_lvl+0xd6/0x122 [ 485.095134][T28998] dump_stack+0x11/0x1b [ 485.099296][T28998] should_fail+0x23c/0x250 [ 485.103711][T28998] __alloc_pages+0x102/0x330 [ 485.108390][T28998] alloc_pages_vma+0x67e/0x810 [ 485.113160][T28998] new_page+0x121/0x170 [ 485.117326][T28998] migrate_pages+0x465/0x1810 [ 485.122077][T28998] ? do_mbind+0x760/0x760 [ 485.126403][T28998] ? remove_migration_ptes+0x90/0x90 [ 485.131698][T28998] do_mbind+0x5b7/0x760 [ 485.135855][T28998] __se_sys_mbind+0x151/0x410 [ 485.140529][T28998] __x64_sys_mbind+0x74/0x80 [ 485.145151][T28998] do_syscall_64+0x44/0xd0 [ 485.149568][T28998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.155483][T28998] RIP: 0033:0x7fb80e59e059 [ 485.159890][T28998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x15, 0x0, 0x6, 0x10000000002) [ 485.179751][T28998] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 485.188238][T28998] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 485.196207][T28998] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 485.204246][T28998] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 485.212249][T28998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 485.220215][T28998] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 485.228252][T28998] 18:38:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 1) 18:38:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 50) 18:38:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000649000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000d000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000005c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 485.346592][T29015] loop5: detected capacity change from 0 to 264192 [ 485.399831][T29016] loop4: detected capacity change from 0 to 264192 [ 485.413306][T29023] loop1: detected capacity change from 0 to 264192 [ 485.427857][T29010] FAULT_INJECTION: forcing a failure. [ 485.427857][T29010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:38:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 485.441127][T29010] CPU: 0 PID: 29010 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 485.452234][T29010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.462289][T29010] Call Trace: [ 485.465564][T29010] [ 485.468525][T29010] dump_stack_lvl+0xd6/0x122 [ 485.473194][T29010] dump_stack+0x11/0x1b [ 485.477372][T29010] should_fail+0x23c/0x250 [ 485.481798][T29010] __alloc_pages+0x102/0x330 [ 485.486418][T29010] alloc_pages_vma+0x67e/0x810 [ 485.491242][T29010] new_page+0x121/0x170 [ 485.495401][T29010] migrate_pages+0x465/0x1810 18:38:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x16, 0x0, 0x6, 0x10000000002) [ 485.500167][T29010] ? do_mbind+0x760/0x760 [ 485.504509][T29010] ? remove_migration_ptes+0x90/0x90 [ 485.509854][T29010] do_mbind+0x5b7/0x760 [ 485.514017][T29010] __se_sys_mbind+0x151/0x410 [ 485.518700][T29010] __x64_sys_mbind+0x74/0x80 [ 485.523302][T29010] do_syscall_64+0x44/0xd0 [ 485.527780][T29010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.533755][T29010] RIP: 0033:0x7fb80e59e059 [ 485.538166][T29010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 485.557790][T29010] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 485.566206][T29010] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 485.574202][T29010] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 485.582150][T29010] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 485.590106][T29010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 485.598159][T29010] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 485.606110][T29010] [ 485.620797][T29027] FAULT_INJECTION: forcing a failure. [ 485.620797][T29027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.634095][T29027] CPU: 1 PID: 29027 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 485.645126][T29027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.655168][T29027] Call Trace: [ 485.658451][T29027] [ 485.661368][T29027] dump_stack_lvl+0xd6/0x122 [ 485.665950][T29027] dump_stack+0x11/0x1b [ 485.670098][T29027] should_fail+0x23c/0x250 [ 485.674503][T29027] __alloc_pages+0x102/0x330 [ 485.679097][T29027] alloc_pages_vma+0x67e/0x810 [ 485.683850][T29027] new_page+0x121/0x170 [ 485.687991][T29027] migrate_pages+0x465/0x1810 [ 485.692657][T29027] ? mbind_range+0x846/0x8d0 [ 485.697281][T29027] ? do_mbind+0x760/0x760 [ 485.701595][T29027] do_mbind+0x5b7/0x760 [ 485.705766][T29027] __se_sys_mbind+0x151/0x410 [ 485.710433][T29027] __x64_sys_mbind+0x74/0x80 [ 485.715007][T29027] do_syscall_64+0x44/0xd0 [ 485.719590][T29027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.725472][T29027] RIP: 0033:0x7f1ee090e059 [ 485.729871][T29027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 51) 18:38:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 2) [ 485.749515][T29027] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 485.758027][T29027] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059 [ 485.766024][T29027] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 485.773984][T29027] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002 [ 485.782205][T29027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.790231][T29027] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000 [ 485.798216][T29027] 18:38:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000007c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 485.870298][T29035] loop5: detected capacity change from 0 to 264192 [ 485.878721][T29037] loop1: detected capacity change from 0 to 264192 18:38:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000010000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 485.927000][T29040] loop4: detected capacity change from 0 to 264192 [ 485.955112][T29031] FAULT_INJECTION: forcing a failure. [ 485.955112][T29031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.968409][T29031] CPU: 0 PID: 29031 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 485.979528][T29031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.989664][T29031] Call Trace: [ 485.992940][T29031] [ 485.995866][T29031] dump_stack_lvl+0xd6/0x122 [ 486.000491][T29031] dump_stack+0x11/0x1b [ 486.004651][T29031] should_fail+0x23c/0x250 [ 486.009125][T29031] __alloc_pages+0x102/0x330 [ 486.013772][T29031] alloc_pages_vma+0x67e/0x810 [ 486.018569][T29031] new_page+0x121/0x170 [ 486.022732][T29031] migrate_pages+0x465/0x1810 [ 486.027499][T29031] ? do_mbind+0x760/0x760 [ 486.031828][T29031] ? remove_migration_ptes+0x90/0x90 [ 486.037122][T29031] do_mbind+0x5b7/0x760 [ 486.041285][T29031] __se_sys_mbind+0x151/0x410 [ 486.045961][T29031] __x64_sys_mbind+0x74/0x80 [ 486.050553][T29031] do_syscall_64+0x44/0xd0 [ 486.054968][T29031] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 486.061010][T29031] RIP: 0033:0x7fb80e59e059 18:38:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x17, 0x0, 0x6, 0x10000000002) [ 486.065415][T29031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 486.085017][T29031] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 486.093554][T29031] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 486.101572][T29031] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 486.109524][T29031] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 486.117499][T29031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 486.125457][T29031] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 486.133422][T29031] [ 486.140788][T29040] FAULT_INJECTION: forcing a failure. [ 486.140788][T29040] name failslab, interval 1, probability 0, space 0, times 0 [ 486.153446][T29040] CPU: 1 PID: 29040 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 486.164464][T29040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.174520][T29040] Call Trace: [ 486.177864][T29040] [ 486.180885][T29040] dump_stack_lvl+0xd6/0x122 [ 486.185486][T29040] dump_stack+0x11/0x1b [ 486.190249][T29040] should_fail+0x23c/0x250 [ 486.194674][T29040] ? mempool_alloc_slab+0x16/0x20 [ 486.199796][T29040] __should_failslab+0x81/0x90 [ 486.204565][T29040] should_failslab+0x5/0x20 [ 486.209069][T29040] kmem_cache_alloc+0x4f/0x320 [ 486.213846][T29040] mempool_alloc_slab+0x16/0x20 [ 486.218724][T29040] ? mempool_free+0x130/0x130 [ 486.223403][T29040] mempool_alloc+0x9d/0x310 [ 486.227907][T29040] ? __rcu_read_unlock+0x45/0x290 [ 486.232961][T29040] ? __this_cpu_preempt_check+0x18/0x20 [ 486.238550][T29040] bio_alloc_bioset+0xcc/0x560 [ 486.243322][T29040] submit_bh_wbc+0x133/0x320 [ 486.247917][T29040] __block_write_full_page+0x648/0xa10 [ 486.253384][T29040] ? mark_buffer_write_io_error+0x180/0x180 [ 486.259311][T29040] ? fat_block_truncate_page+0x30/0x30 [ 486.264843][T29040] ? fat_block_truncate_page+0x30/0x30 [ 486.270301][T29040] block_write_full_page+0x1f0/0x210 [ 486.275682][T29040] fat_writepage+0x20/0x30 [ 486.280159][T29040] move_to_new_page+0x2f6/0x520 [ 486.285013][T29040] ? remove_migration_ptes+0x90/0x90 [ 486.290297][T29040] migrate_pages+0xdec/0x1810 [ 486.295110][T29040] ? do_mbind+0x760/0x760 [ 486.299443][T29040] do_mbind+0x5b7/0x760 [ 486.303684][T29040] __se_sys_mbind+0x151/0x410 [ 486.308409][T29040] __x64_sys_mbind+0x74/0x80 [ 486.313029][T29040] do_syscall_64+0x44/0xd0 [ 486.317446][T29040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 486.323339][T29040] RIP: 0033:0x7f1ee090e059 18:38:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 52) [ 486.327752][T29040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 486.347497][T29040] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 486.355906][T29040] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059 [ 486.363885][T29040] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 18:38:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000080000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 486.372043][T29040] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002 [ 486.380031][T29040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.388138][T29040] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000 [ 486.396095][T29040] [ 486.427133][T29050] FAULT_INJECTION: forcing a failure. [ 486.427133][T29050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.440425][T29050] CPU: 0 PID: 29050 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 486.451518][T29050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.461569][T29050] Call Trace: [ 486.464843][T29050] [ 486.467766][T29050] dump_stack_lvl+0xd6/0x122 [ 486.472361][T29050] dump_stack+0x11/0x1b [ 486.476518][T29050] should_fail+0x23c/0x250 [ 486.480932][T29050] __alloc_pages+0x102/0x330 [ 486.485613][T29050] alloc_pages_vma+0x67e/0x810 [ 486.490380][T29050] new_page+0x121/0x170 [ 486.494709][T29050] migrate_pages+0x465/0x1810 [ 486.499566][T29050] ? do_mbind+0x760/0x760 [ 486.503903][T29050] ? remove_migration_ptes+0x90/0x90 [ 486.509193][T29050] do_mbind+0x5b7/0x760 [ 486.513440][T29050] __se_sys_mbind+0x151/0x410 [ 486.518192][T29050] __x64_sys_mbind+0x74/0x80 [ 486.522789][T29050] do_syscall_64+0x44/0xd0 18:38:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 3) [ 486.522799][T29054] loop1: detected capacity change from 0 to 264192 [ 486.527202][T29050] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 486.539575][T29050] RIP: 0033:0x7fb80e59e059 [ 486.544063][T29050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 486.563827][T29050] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 486.572262][T29050] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 486.580309][T29050] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 486.588462][T29050] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 486.596411][T29050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 486.604360][T29050] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 486.612365][T29050] 18:38:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000011000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffff9e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 486.638158][T29056] loop5: detected capacity change from 0 to 264192 18:38:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 53) 18:38:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffef000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 486.703362][T29063] loop1: detected capacity change from 0 to 264192 [ 486.706480][T29064] loop4: detected capacity change from 0 to 264192 18:38:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x18, 0x0, 0x6, 0x10000000002) 18:38:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff0000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 486.810939][T29071] loop1: detected capacity change from 0 to 264192 18:38:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 486.882981][T29078] FAULT_INJECTION: forcing a failure. [ 486.882981][T29078] name failslab, interval 1, probability 0, space 0, times 0 [ 486.895664][T29078] CPU: 1 PID: 29078 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 486.906719][T29078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.916783][T29078] Call Trace: [ 486.920041][T29078] [ 486.922970][T29078] dump_stack_lvl+0xd6/0x122 [ 486.927577][T29078] dump_stack+0x11/0x1b [ 486.931777][T29078] should_fail+0x23c/0x250 [ 486.936176][T29078] ? mempool_alloc_slab+0x16/0x20 [ 486.941263][T29078] __should_failslab+0x81/0x90 [ 486.946003][T29078] should_failslab+0x5/0x20 [ 486.950504][T29078] kmem_cache_alloc+0x4f/0x320 [ 486.955248][T29078] mempool_alloc_slab+0x16/0x20 [ 486.960079][T29078] ? mempool_free+0x130/0x130 [ 486.964782][T29078] mempool_alloc+0x9d/0x310 [ 486.969338][T29078] ? submit_bio_noacct+0x49f/0x4e0 [ 486.974521][T29078] bio_alloc_bioset+0xcc/0x560 [ 486.979275][T29078] submit_bh_wbc+0x133/0x320 [ 486.983865][T29078] __block_write_full_page+0x648/0xa10 [ 486.989309][T29078] ? mark_buffer_write_io_error+0x180/0x180 [ 486.995248][T29078] ? fat_block_truncate_page+0x30/0x30 [ 487.000844][T29078] ? fat_block_truncate_page+0x30/0x30 [ 487.006381][T29078] block_write_full_page+0x1f0/0x210 [ 487.011652][T29078] fat_writepage+0x20/0x30 [ 487.016063][T29078] move_to_new_page+0x2f6/0x520 [ 487.020906][T29078] ? remove_migration_ptes+0x90/0x90 [ 487.026172][T29078] migrate_pages+0xdec/0x1810 [ 487.030910][T29078] ? do_mbind+0x760/0x760 [ 487.035228][T29078] do_mbind+0x5b7/0x760 [ 487.039375][T29078] __se_sys_mbind+0x151/0x410 [ 487.044112][T29078] __x64_sys_mbind+0x74/0x80 [ 487.048691][T29078] do_syscall_64+0x44/0xd0 [ 487.053098][T29078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 487.059042][T29078] RIP: 0033:0x7f1ee090e059 [ 487.063438][T29078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 487.083043][T29078] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 487.091559][T29078] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059 [ 487.099511][T29078] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 487.107458][T29078] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002 [ 487.115411][T29078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.123431][T29078] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000 [ 487.131392][T29078] [ 487.140147][T29075] FAULT_INJECTION: forcing a failure. [ 487.140147][T29075] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.153393][T29075] CPU: 1 PID: 29075 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 487.164416][T29075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.174503][T29075] Call Trace: [ 487.177909][T29075] [ 487.180840][T29075] dump_stack_lvl+0xd6/0x122 [ 487.185439][T29075] dump_stack+0x11/0x1b [ 487.189596][T29075] should_fail+0x23c/0x250 [ 487.194122][T29075] __alloc_pages+0x102/0x330 [ 487.198760][T29075] alloc_pages_vma+0x67e/0x810 [ 487.203762][T29075] new_page+0x121/0x170 [ 487.207950][T29075] migrate_pages+0x465/0x1810 [ 487.212658][T29075] ? do_mbind+0x760/0x760 [ 487.216987][T29075] ? remove_migration_ptes+0x90/0x90 [ 487.222313][T29075] do_mbind+0x5b7/0x760 [ 487.226503][T29075] __se_sys_mbind+0x151/0x410 18:38:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 4) 18:38:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff5000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 487.231246][T29075] __x64_sys_mbind+0x74/0x80 [ 487.235836][T29075] do_syscall_64+0x44/0xd0 [ 487.240264][T29075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 487.246158][T29075] RIP: 0033:0x7fb80e59e059 [ 487.250580][T29075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 487.270212][T29075] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 487.278662][T29075] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 487.286714][T29075] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 487.294671][T29075] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 487.302699][T29075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 487.310679][T29075] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 487.318693][T29075] 18:38:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 54) [ 487.330147][T29086] loop5: detected capacity change from 0 to 264192 [ 487.337304][T29085] loop1: detected capacity change from 0 to 264192 18:38:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffffe000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 487.384388][T29089] loop4: detected capacity change from 0 to 264192 18:38:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x19, 0x0, 0x6, 0x10000000002) 18:38:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007fffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 487.487668][T29099] loop1: detected capacity change from 0 to 264192 [ 487.523988][T29089] FAULT_INJECTION: forcing a failure. [ 487.523988][T29089] name failslab, interval 1, probability 0, space 0, times 0 [ 487.536649][T29089] CPU: 1 PID: 29089 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 487.547708][T29089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.557758][T29089] Call Trace: [ 487.561069][T29089] [ 487.563998][T29089] dump_stack_lvl+0xd6/0x122 [ 487.568611][T29089] dump_stack+0x11/0x1b [ 487.572828][T29089] should_fail+0x23c/0x250 [ 487.577375][T29089] ? mempool_alloc_slab+0x16/0x20 [ 487.582395][T29089] __should_failslab+0x81/0x90 [ 487.587166][T29089] should_failslab+0x5/0x20 [ 487.591672][T29089] kmem_cache_alloc+0x4f/0x320 [ 487.596434][T29089] mempool_alloc_slab+0x16/0x20 [ 487.601351][T29089] ? mempool_free+0x130/0x130 [ 487.606066][T29089] mempool_alloc+0x9d/0x310 [ 487.610599][T29089] ? submit_bio_noacct+0x49f/0x4e0 [ 487.615714][T29089] bio_alloc_bioset+0xcc/0x560 [ 487.620494][T29089] submit_bh_wbc+0x133/0x320 [ 487.625129][T29089] __block_write_full_page+0x648/0xa10 [ 487.630637][T29089] ? mark_buffer_write_io_error+0x180/0x180 [ 487.636580][T29089] ? fat_block_truncate_page+0x30/0x30 [ 487.642106][T29089] ? fat_block_truncate_page+0x30/0x30 [ 487.647648][T29089] block_write_full_page+0x1f0/0x210 [ 487.650605][T29107] loop5: detected capacity change from 0 to 264192 [ 487.653027][T29089] fat_writepage+0x20/0x30 [ 487.653057][T29089] move_to_new_page+0x2f6/0x520 [ 487.668923][T29089] ? remove_migration_ptes+0x90/0x90 [ 487.674292][T29089] migrate_pages+0xdec/0x1810 [ 487.678982][T29089] ? do_mbind+0x760/0x760 [ 487.683323][T29089] do_mbind+0x5b7/0x760 [ 487.687486][T29089] __se_sys_mbind+0x151/0x410 [ 487.692306][T29089] __x64_sys_mbind+0x74/0x80 [ 487.696899][T29089] do_syscall_64+0x44/0xd0 [ 487.701371][T29089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 487.707352][T29089] RIP: 0033:0x7f1ee090e059 [ 487.711818][T29089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a, 0x0, 0x6, 0x10000000002) [ 487.731434][T29089] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 487.739851][T29089] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059 [ 487.747860][T29089] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 487.755846][T29089] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002 [ 487.763817][T29089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.771783][T29089] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000 [ 487.779785][T29089] [ 487.796557][T29094] FAULT_INJECTION: forcing a failure. [ 487.796557][T29094] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.809829][T29094] CPU: 0 PID: 29094 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 487.820844][T29094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.830891][T29094] Call Trace: [ 487.834163][T29094] [ 487.837090][T29094] dump_stack_lvl+0xd6/0x122 [ 487.841683][T29094] dump_stack+0x11/0x1b [ 487.845864][T29094] should_fail+0x23c/0x250 [ 487.850330][T29094] __alloc_pages+0x102/0x330 [ 487.854921][T29094] alloc_pages_vma+0x67e/0x810 [ 487.859808][T29094] new_page+0x121/0x170 [ 487.864020][T29094] migrate_pages+0x465/0x1810 [ 487.868763][T29094] ? do_mbind+0x760/0x760 [ 487.873095][T29094] ? remove_migration_ptes+0x90/0x90 [ 487.878484][T29094] do_mbind+0x5b7/0x760 [ 487.882650][T29094] __se_sys_mbind+0x151/0x410 [ 487.887340][T29094] __x64_sys_mbind+0x74/0x80 [ 487.891953][T29094] do_syscall_64+0x44/0xd0 18:38:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000025000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 5) 18:38:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 487.896366][T29094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 487.902433][T29094] RIP: 0033:0x7fb80e59e059 [ 487.906838][T29094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 487.926439][T29094] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 487.934854][T29094] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 55) [ 487.942817][T29094] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 487.950767][T29094] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 487.958714][T29094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 487.966670][T29094] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 487.974623][T29094] 18:38:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000040000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000002000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 488.018421][T29116] loop5: detected capacity change from 0 to 264192 18:38:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 488.075042][T29118] loop4: detected capacity change from 0 to 264192 18:38:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000005c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 488.136830][T29114] FAULT_INJECTION: forcing a failure. [ 488.136830][T29114] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 488.150170][T29114] CPU: 0 PID: 29114 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 488.161196][T29114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.171251][T29114] Call Trace: [ 488.174564][T29114] [ 488.177489][T29114] dump_stack_lvl+0xd6/0x122 [ 488.182091][T29114] dump_stack+0x11/0x1b [ 488.186295][T29114] should_fail+0x23c/0x250 [ 488.190733][T29114] __alloc_pages+0x102/0x330 [ 488.195356][T29114] alloc_pages_vma+0x67e/0x810 [ 488.200255][T29114] new_page+0x121/0x170 [ 488.204418][T29114] migrate_pages+0x465/0x1810 [ 488.209100][T29114] ? do_mbind+0x760/0x760 [ 488.213425][T29114] ? remove_migration_ptes+0x90/0x90 [ 488.218821][T29114] do_mbind+0x5b7/0x760 [ 488.222980][T29114] __se_sys_mbind+0x151/0x410 [ 488.227664][T29114] __x64_sys_mbind+0x74/0x80 [ 488.232254][T29114] do_syscall_64+0x44/0xd0 18:38:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 488.236668][T29114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 488.242573][T29114] RIP: 0033:0x7fb80e59e059 [ 488.247122][T29114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 488.266763][T29114] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 488.275177][T29114] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 488.283151][T29114] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 488.291121][T29114] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 488.299090][T29114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 488.307061][T29114] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 488.315115][T29114] [ 488.321991][T29118] FAULT_INJECTION: forcing a failure. [ 488.321991][T29118] name failslab, interval 1, probability 0, space 0, times 0 [ 488.334683][T29118] CPU: 1 PID: 29118 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 488.345763][T29118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.355810][T29118] Call Trace: [ 488.359131][T29118] [ 488.362078][T29118] dump_stack_lvl+0xd6/0x122 [ 488.366724][T29118] dump_stack+0x11/0x1b [ 488.370883][T29118] should_fail+0x23c/0x250 [ 488.375497][T29118] ? mempool_alloc_slab+0x16/0x20 [ 488.380531][T29118] __should_failslab+0x81/0x90 [ 488.385298][T29118] should_failslab+0x5/0x20 [ 488.389872][T29118] kmem_cache_alloc+0x4f/0x320 [ 488.394641][T29118] mempool_alloc_slab+0x16/0x20 [ 488.399501][T29118] ? mempool_free+0x130/0x130 [ 488.404209][T29118] mempool_alloc+0x9d/0x310 [ 488.408739][T29118] ? submit_bio_noacct+0x49f/0x4e0 [ 488.413905][T29118] bio_alloc_bioset+0xcc/0x560 [ 488.418675][T29118] submit_bh_wbc+0x133/0x320 [ 488.423339][T29118] __block_write_full_page+0x648/0xa10 [ 488.428877][T29118] ? mark_buffer_write_io_error+0x180/0x180 [ 488.434883][T29118] ? fat_block_truncate_page+0x30/0x30 [ 488.440349][T29118] ? fat_block_truncate_page+0x30/0x30 [ 488.445888][T29118] block_write_full_page+0x1f0/0x210 [ 488.451175][T29118] fat_writepage+0x20/0x30 [ 488.455590][T29118] move_to_new_page+0x2f6/0x520 [ 488.460470][T29118] ? remove_migration_ptes+0x90/0x90 [ 488.465791][T29118] migrate_pages+0xdec/0x1810 [ 488.470470][T29118] ? do_mbind+0x760/0x760 [ 488.474843][T29118] do_mbind+0x5b7/0x760 [ 488.479046][T29118] __se_sys_mbind+0x151/0x410 [ 488.483732][T29118] __x64_sys_mbind+0x74/0x80 18:38:52 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 56) 18:38:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1b, 0x0, 0x6, 0x10000000002) [ 488.488319][T29118] do_syscall_64+0x44/0xd0 [ 488.492793][T29118] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 488.498686][T29118] RIP: 0033:0x7f1ee090e059 [ 488.503100][T29118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 488.522708][T29118] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000004000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 488.531134][T29118] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059 [ 488.539149][T29118] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 488.547175][T29118] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002 [ 488.555139][T29118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 488.563188][T29118] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000 [ 488.571192][T29118] [ 488.618260][T29140] FAULT_INJECTION: forcing a failure. [ 488.618260][T29140] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 488.631558][T29140] CPU: 0 PID: 29140 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 488.642698][T29140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.652759][T29140] Call Trace: [ 488.656031][T29140] [ 488.658955][T29140] dump_stack_lvl+0xd6/0x122 [ 488.663557][T29140] dump_stack+0x11/0x1b [ 488.667724][T29140] should_fail+0x23c/0x250 [ 488.672147][T29140] __alloc_pages+0x102/0x330 [ 488.676737][T29140] alloc_pages_vma+0x67e/0x810 [ 488.681518][T29140] new_page+0x121/0x170 [ 488.685723][T29140] migrate_pages+0x465/0x1810 [ 488.690408][T29140] ? do_mbind+0x760/0x760 [ 488.694877][T29140] ? remove_migration_ptes+0x90/0x90 [ 488.700156][T29140] do_mbind+0x5b7/0x760 [ 488.704320][T29140] __se_sys_mbind+0x151/0x410 [ 488.708986][T29140] __x64_sys_mbind+0x74/0x80 [ 488.713560][T29140] do_syscall_64+0x44/0xd0 [ 488.717966][T29140] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 488.723846][T29140] RIP: 0033:0x7fb80e59e059 [ 488.728310][T29140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 488.748020][T29140] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 488.756428][T29140] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 18:38:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 6) [ 488.764384][T29140] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 488.772435][T29140] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 488.780399][T29140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 488.788360][T29140] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 488.796316][T29140] 18:38:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000007c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 488.842148][T29144] loop5: detected capacity change from 0 to 264192 18:38:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:52 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 57) 18:38:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1c, 0x0, 0x6, 0x10000000002) [ 488.926738][T29151] loop4: detected capacity change from 0 to 264192 18:38:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000080000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 489.055016][T29151] FAULT_INJECTION: forcing a failure. [ 489.055016][T29151] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.068320][T29151] CPU: 1 PID: 29151 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 489.079416][T29151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.089533][T29151] Call Trace: [ 489.092871][T29151] [ 489.095800][T29151] dump_stack_lvl+0xd6/0x122 [ 489.100384][T29151] dump_stack+0x11/0x1b [ 489.104538][T29151] should_fail+0x23c/0x250 [ 489.109000][T29151] __alloc_pages+0x102/0x330 [ 489.113578][T29151] alloc_pages_vma+0x67e/0x810 [ 489.118405][T29151] new_page+0x121/0x170 [ 489.122550][T29151] migrate_pages+0x465/0x1810 [ 489.127390][T29151] ? do_mbind+0x760/0x760 [ 489.131776][T29151] ? remove_migration_ptes+0x90/0x90 [ 489.137133][T29151] do_mbind+0x5b7/0x760 [ 489.141343][T29151] __se_sys_mbind+0x151/0x410 [ 489.146061][T29151] __x64_sys_mbind+0x74/0x80 [ 489.150637][T29151] do_syscall_64+0x44/0xd0 [ 489.155043][T29151] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 489.161051][T29151] RIP: 0033:0x7f1ee090e059 [ 489.165463][T29151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 489.185417][T29151] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 489.194053][T29151] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059 [ 489.202019][T29151] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 489.210073][T29151] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002 [ 489.218241][T29151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 489.226202][T29151] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000 [ 489.234197][T29151] [ 489.265241][T29171] loop5: detected capacity change from 0 to 264192 [ 489.265521][T29169] FAULT_INJECTION: forcing a failure. [ 489.265521][T29169] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.285075][T29169] CPU: 1 PID: 29169 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 489.296095][T29169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.306151][T29169] Call Trace: [ 489.309458][T29169] 18:38:53 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 7) 18:38:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffff9e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000008000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 489.312461][T29169] dump_stack_lvl+0xd6/0x122 [ 489.317063][T29169] dump_stack+0x11/0x1b [ 489.321256][T29169] should_fail+0x23c/0x250 [ 489.325703][T29169] __alloc_pages+0x102/0x330 [ 489.330413][T29169] alloc_pages_vma+0x67e/0x810 [ 489.335181][T29169] new_page+0x121/0x170 [ 489.339351][T29169] migrate_pages+0x465/0x1810 [ 489.344032][T29169] ? do_mbind+0x760/0x760 [ 489.348418][T29169] ? remove_migration_ptes+0x90/0x90 [ 489.353749][T29169] do_mbind+0x5b7/0x760 [ 489.357907][T29169] __se_sys_mbind+0x151/0x410 [ 489.362592][T29169] __x64_sys_mbind+0x74/0x80 [ 489.367269][T29169] do_syscall_64+0x44/0xd0 [ 489.371688][T29169] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 489.377662][T29169] RIP: 0033:0x7fb80e59e059 [ 489.382176][T29169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 489.401837][T29169] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000005bb000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 489.410294][T29169] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 489.418248][T29169] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 489.426215][T29169] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 489.434227][T29169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 489.442190][T29169] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 489.450150][T29169] 18:38:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1d, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 58) 18:38:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffef000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 489.572814][T29195] loop4: detected capacity change from 0 to 264192 [ 489.622596][T29198] loop5: detected capacity change from 0 to 264192 [ 489.624680][T29186] FAULT_INJECTION: forcing a failure. [ 489.624680][T29186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.642371][T29186] CPU: 1 PID: 29186 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 489.653610][T29186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.663657][T29186] Call Trace: [ 489.666982][T29186] [ 489.669976][T29186] dump_stack_lvl+0xd6/0x122 [ 489.674606][T29186] dump_stack+0x11/0x1b [ 489.678761][T29186] should_fail+0x23c/0x250 [ 489.683232][T29186] __alloc_pages+0x102/0x330 [ 489.687898][T29186] alloc_pages_vma+0x67e/0x810 [ 489.692712][T29186] new_page+0x121/0x170 [ 489.696869][T29186] migrate_pages+0x465/0x1810 [ 489.701607][T29186] ? do_mbind+0x760/0x760 [ 489.705941][T29186] ? remove_migration_ptes+0x90/0x90 [ 489.711287][T29186] do_mbind+0x5b7/0x760 [ 489.715681][T29186] __se_sys_mbind+0x151/0x410 [ 489.720364][T29186] __x64_sys_mbind+0x74/0x80 [ 489.724949][T29186] do_syscall_64+0x44/0xd0 [ 489.729365][T29186] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 489.735381][T29186] RIP: 0033:0x7fb80e59e059 [ 489.739874][T29186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 489.759478][T29186] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 489.767965][T29186] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 489.775937][T29186] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 489.783900][T29186] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 489.791936][T29186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 489.799885][T29186] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 489.807871][T29186] [ 489.815423][T29199] FAULT_INJECTION: forcing a failure. [ 489.815423][T29199] name failslab, interval 1, probability 0, space 0, times 0 [ 489.828101][T29199] CPU: 1 PID: 29199 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 489.839116][T29199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.849162][T29199] Call Trace: [ 489.852429][T29199] [ 489.855354][T29199] dump_stack_lvl+0xd6/0x122 [ 489.859951][T29199] dump_stack+0x11/0x1b [ 489.864149][T29199] should_fail+0x23c/0x250 [ 489.868637][T29199] ? mempool_alloc_slab+0x16/0x20 [ 489.873666][T29199] __should_failslab+0x81/0x90 [ 489.878563][T29199] should_failslab+0x5/0x20 [ 489.883069][T29199] kmem_cache_alloc+0x4f/0x320 [ 489.887856][T29199] mempool_alloc_slab+0x16/0x20 [ 489.892718][T29199] ? mempool_free+0x130/0x130 [ 489.897369][T29199] mempool_alloc+0x9d/0x310 [ 489.901846][T29199] ? __rcu_read_unlock+0x45/0x290 [ 489.906848][T29199] ? __this_cpu_preempt_check+0x18/0x20 [ 489.912391][T29199] bio_alloc_bioset+0xcc/0x560 [ 489.917139][T29199] submit_bh_wbc+0x133/0x320 [ 489.921787][T29199] __block_write_full_page+0x648/0xa10 [ 489.927249][T29199] ? mark_buffer_write_io_error+0x180/0x180 [ 489.933120][T29199] ? fat_block_truncate_page+0x30/0x30 [ 489.938608][T29199] ? fat_block_truncate_page+0x30/0x30 [ 489.944127][T29199] block_write_full_page+0x1f0/0x210 [ 489.949413][T29199] fat_writepage+0x20/0x30 [ 489.953866][T29199] move_to_new_page+0x2f6/0x520 [ 489.958747][T29199] ? remove_migration_ptes+0x90/0x90 [ 489.964045][T29199] migrate_pages+0xdec/0x1810 [ 489.968704][T29199] ? do_mbind+0x760/0x760 [ 489.973064][T29199] ? remove_migration_ptes+0x90/0x90 [ 489.978402][T29199] do_mbind+0x5b7/0x760 [ 489.982662][T29199] __se_sys_mbind+0x151/0x410 [ 489.987322][T29199] __x64_sys_mbind+0x74/0x80 [ 489.991961][T29199] do_syscall_64+0x44/0xd0 [ 489.996415][T29199] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.002306][T29199] RIP: 0033:0x7f1ee090e059 [ 490.006776][T29199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 490.026359][T29199] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 490.034755][T29199] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059 [ 490.042705][T29199] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 490.050651][T29199] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002 [ 490.058595][T29199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.066550][T29199] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000 [ 490.074540][T29199] 18:38:53 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 8) 18:38:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1e, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff0000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 59) 18:38:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff5000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 490.165941][T29208] loop5: detected capacity change from 0 to 264192 18:38:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 490.255381][T29217] loop4: detected capacity change from 0 to 264192 [ 490.284624][T29206] FAULT_INJECTION: forcing a failure. [ 490.284624][T29206] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 490.298082][T29206] CPU: 0 PID: 29206 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 490.309163][T29206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.319250][T29206] Call Trace: [ 490.322544][T29206] [ 490.325462][T29206] dump_stack_lvl+0xd6/0x122 [ 490.330080][T29206] dump_stack+0x11/0x1b [ 490.334236][T29206] should_fail+0x23c/0x250 [ 490.338673][T29206] __alloc_pages+0x102/0x330 [ 490.343261][T29206] alloc_pages_vma+0x67e/0x810 [ 490.348035][T29206] new_page+0x121/0x170 18:38:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:54 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x21, 0x0, 0x6, 0x10000000002) 18:38:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffffe000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 490.352192][T29206] migrate_pages+0x465/0x1810 [ 490.356908][T29206] ? do_mbind+0x760/0x760 [ 490.361451][T29206] ? remove_migration_ptes+0x90/0x90 [ 490.366799][T29206] do_mbind+0x5b7/0x760 [ 490.370959][T29206] __se_sys_mbind+0x151/0x410 [ 490.375683][T29206] __x64_sys_mbind+0x74/0x80 [ 490.380299][T29206] do_syscall_64+0x44/0xd0 [ 490.384743][T29206] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.390683][T29206] RIP: 0033:0x7fb80e59e059 [ 490.395103][T29206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 490.414730][T29206] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 490.423139][T29206] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 490.431190][T29206] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 490.439265][T29206] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 490.447273][T29206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 490.455238][T29206] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 490.463215][T29206] [ 490.478802][T29224] FAULT_INJECTION: forcing a failure. [ 490.478802][T29224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 490.492120][T29224] CPU: 1 PID: 29224 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 490.503143][T29224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.513208][T29224] Call Trace: [ 490.516482][T29224] [ 490.519432][T29224] dump_stack_lvl+0xd6/0x122 [ 490.524037][T29224] dump_stack+0x11/0x1b [ 490.528198][T29224] should_fail+0x23c/0x250 [ 490.532616][T29224] __alloc_pages+0x102/0x330 [ 490.537255][T29224] alloc_pages_vma+0x67e/0x810 [ 490.542072][T29224] new_page+0x121/0x170 [ 490.546221][T29224] migrate_pages+0x465/0x1810 [ 490.550932][T29224] ? do_mbind+0x760/0x760 [ 490.555250][T29224] ? remove_migration_ptes+0x90/0x90 [ 490.560532][T29224] do_mbind+0x5b7/0x760 [ 490.564674][T29224] __se_sys_mbind+0x151/0x410 [ 490.569339][T29224] __x64_sys_mbind+0x74/0x80 [ 490.573959][T29224] do_syscall_64+0x44/0xd0 [ 490.578361][T29224] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.584242][T29224] RIP: 0033:0x7f1ee090e059 [ 490.588660][T29224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 490.608251][T29224] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 490.616718][T29224] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059 [ 490.624675][T29224] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 490.632652][T29224] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002 [ 490.640620][T29224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.648582][T29224] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000 18:38:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 9) 18:38:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 60) 18:38:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 490.656552][T29224] 18:38:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007fffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 490.705825][T29235] loop5: detected capacity change from 0 to 264192 18:38:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 490.778640][T29243] loop4: detected capacity change from 0 to 264192 [ 490.798544][T29233] FAULT_INJECTION: forcing a failure. [ 490.798544][T29233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 490.811905][T29233] CPU: 1 PID: 29233 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 490.822926][T29233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.833043][T29233] Call Trace: [ 490.836339][T29233] [ 490.839298][T29233] dump_stack_lvl+0xd6/0x122 [ 490.843926][T29233] dump_stack+0x11/0x1b [ 490.848077][T29233] should_fail+0x23c/0x250 [ 490.852494][T29233] __alloc_pages+0x102/0x330 [ 490.857128][T29233] alloc_pages_vma+0x67e/0x810 [ 490.861892][T29233] new_page+0x121/0x170 [ 490.866046][T29233] migrate_pages+0x465/0x1810 [ 490.870727][T29233] ? do_mbind+0x760/0x760 [ 490.875060][T29233] ? remove_migration_ptes+0x90/0x90 [ 490.880376][T29233] do_mbind+0x5b7/0x760 [ 490.884532][T29233] __se_sys_mbind+0x151/0x410 [ 490.889219][T29233] __x64_sys_mbind+0x74/0x80 [ 490.893809][T29233] do_syscall_64+0x44/0xd0 [ 490.898229][T29233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.904127][T29233] RIP: 0033:0x7fb80e59e059 [ 490.908540][T29233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 490.928147][T29233] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 490.936612][T29233] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 490.944582][T29233] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 490.952559][T29233] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 490.960591][T29233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 490.968615][T29233] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 490.976586][T29233] 18:38:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 490.987038][T29247] FAULT_INJECTION: forcing a failure. [ 490.987038][T29247] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 491.000392][T29247] CPU: 0 PID: 29247 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 491.011408][T29247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.021459][T29247] Call Trace: [ 491.024750][T29247] [ 491.027684][T29247] dump_stack_lvl+0xd6/0x122 [ 491.032329][T29247] dump_stack+0x11/0x1b 18:38:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 61) [ 491.036496][T29247] should_fail+0x23c/0x250 [ 491.040912][T29247] __alloc_pages+0x102/0x330 [ 491.045650][T29247] alloc_pages_vma+0x67e/0x810 [ 491.050456][T29247] new_page+0x121/0x170 [ 491.054615][T29247] migrate_pages+0x465/0x1810 [ 491.059368][T29247] ? do_mbind+0x760/0x760 [ 491.063712][T29247] ? remove_migration_ptes+0x90/0x90 [ 491.069099][T29247] do_mbind+0x5b7/0x760 [ 491.073334][T29247] __se_sys_mbind+0x151/0x410 [ 491.078021][T29247] __x64_sys_mbind+0x74/0x80 [ 491.082633][T29247] do_syscall_64+0x44/0xd0 18:38:54 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x22, 0x0, 0x6, 0x10000000002) 18:38:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 491.087097][T29247] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.093076][T29247] RIP: 0033:0x7f1ee090e059 [ 491.097493][T29247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 491.117315][T29247] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 491.125755][T29247] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059 18:38:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 10) [ 491.133731][T29247] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 491.141734][T29247] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002 [ 491.149851][T29247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 491.157832][T29247] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000 [ 491.165875][T29247] 18:38:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 491.198668][T29254] FAULT_INJECTION: forcing a failure. [ 491.198668][T29254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 491.212009][T29254] CPU: 0 PID: 29254 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 491.223040][T29254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.233096][T29254] Call Trace: [ 491.236369][T29254] [ 491.239301][T29254] dump_stack_lvl+0xd6/0x122 [ 491.243972][T29254] dump_stack+0x11/0x1b [ 491.248203][T29254] should_fail+0x23c/0x250 [ 491.252683][T29254] __alloc_pages+0x102/0x330 [ 491.257306][T29254] alloc_pages_vma+0x67e/0x810 [ 491.262069][T29254] new_page+0x121/0x170 [ 491.266225][T29254] migrate_pages+0x465/0x1810 [ 491.270909][T29254] ? do_mbind+0x760/0x760 [ 491.275236][T29254] ? remove_migration_ptes+0x90/0x90 [ 491.280525][T29254] do_mbind+0x5b7/0x760 [ 491.284771][T29254] __se_sys_mbind+0x151/0x410 [ 491.289446][T29254] __x64_sys_mbind+0x74/0x80 [ 491.294033][T29254] do_syscall_64+0x44/0xd0 [ 491.298508][T29254] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.304588][T29254] RIP: 0033:0x7fb80e59e059 [ 491.309019][T29254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 491.328691][T29254] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 491.337123][T29254] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 62) 18:38:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000002000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 491.345100][T29254] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 491.353098][T29254] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 491.361109][T29254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 491.369181][T29254] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 491.377164][T29254] 18:38:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 491.433327][T29265] loop5: detected capacity change from 0 to 264192 [ 491.441812][T29268] loop4: detected capacity change from 0 to 264192 18:38:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000010000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 491.541730][T29274] FAULT_INJECTION: forcing a failure. [ 491.541730][T29274] name failslab, interval 1, probability 0, space 0, times 0 [ 491.554390][T29274] CPU: 0 PID: 29274 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 491.565408][T29274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.575460][T29274] Call Trace: [ 491.578735][T29274] [ 491.581739][T29274] dump_stack_lvl+0xd6/0x122 [ 491.586411][T29274] dump_stack+0x11/0x1b [ 491.590655][T29274] should_fail+0x23c/0x250 [ 491.595069][T29274] ? mempool_alloc_slab+0x16/0x20 [ 491.600268][T29274] __should_failslab+0x81/0x90 [ 491.605085][T29274] should_failslab+0x5/0x20 [ 491.609669][T29274] kmem_cache_alloc+0x4f/0x320 [ 491.610362][T29263] FAULT_INJECTION: forcing a failure. [ 491.610362][T29263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 491.614458][T29274] mempool_alloc_slab+0x16/0x20 [ 491.632682][T29274] ? mempool_free+0x130/0x130 [ 491.637353][T29274] mempool_alloc+0x9d/0x310 [ 491.641839][T29274] ? submit_bio_noacct+0x49f/0x4e0 [ 491.647015][T29274] bio_alloc_bioset+0xcc/0x560 [ 491.651768][T29274] submit_bh_wbc+0x133/0x320 [ 491.656349][T29274] __block_write_full_page+0x648/0xa10 [ 491.661892][T29274] ? mark_buffer_write_io_error+0x180/0x180 [ 491.667796][T29274] ? fat_block_truncate_page+0x30/0x30 [ 491.673257][T29274] ? fat_block_truncate_page+0x30/0x30 [ 491.678781][T29274] block_write_full_page+0x1f0/0x210 [ 491.684111][T29274] fat_writepage+0x20/0x30 [ 491.688525][T29274] move_to_new_page+0x2f6/0x520 [ 491.693404][T29274] ? remove_migration_ptes+0x90/0x90 [ 491.698754][T29274] migrate_pages+0xdec/0x1810 [ 491.703432][T29274] ? do_mbind+0x760/0x760 [ 491.707824][T29274] ? remove_migration_ptes+0x90/0x90 [ 491.713101][T29274] do_mbind+0x5b7/0x760 [ 491.717245][T29274] __se_sys_mbind+0x151/0x410 [ 491.721909][T29274] __x64_sys_mbind+0x74/0x80 [ 491.726497][T29274] do_syscall_64+0x44/0xd0 [ 491.730900][T29274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.736793][T29274] RIP: 0033:0x7f1ee090e059 [ 491.741249][T29274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 491.760890][T29274] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 491.769289][T29274] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059 [ 491.777678][T29274] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 491.785651][T29274] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002 [ 491.793782][T29274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 491.801777][T29274] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000 [ 491.809731][T29274] [ 491.812737][T29263] CPU: 1 PID: 29263 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 491.823790][T29263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.833851][T29263] Call Trace: [ 491.837126][T29263] [ 491.840047][T29263] dump_stack_lvl+0xd6/0x122 [ 491.844712][T29263] dump_stack+0x11/0x1b [ 491.848979][T29263] should_fail+0x23c/0x250 [ 491.853435][T29263] __alloc_pages+0x102/0x330 [ 491.858019][T29263] alloc_pages_vma+0x67e/0x810 [ 491.862780][T29263] new_page+0x121/0x170 [ 491.867079][T29263] migrate_pages+0x465/0x1810 [ 491.871832][T29263] ? do_mbind+0x760/0x760 [ 491.876161][T29263] ? remove_migration_ptes+0x90/0x90 [ 491.881642][T29263] do_mbind+0x5b7/0x760 [ 491.885817][T29263] __se_sys_mbind+0x151/0x410 [ 491.890539][T29263] __x64_sys_mbind+0x74/0x80 [ 491.895164][T29263] do_syscall_64+0x44/0xd0 [ 491.899598][T29263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.905665][T29263] RIP: 0033:0x7fb80e59e059 [ 491.910076][T29263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 491.929768][T29263] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:55 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x23, 0x0, 0x6, 0x10000000002) 18:38:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000004000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 491.938173][T29263] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 491.946138][T29263] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 491.954102][T29263] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 491.962250][T29263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 491.970220][T29263] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 491.978211][T29263] 18:38:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 63) 18:38:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 11) 18:38:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 492.071091][T29290] loop5: detected capacity change from 0 to 264192 18:38:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 492.143833][T29298] loop4: detected capacity change from 0 to 264192 [ 492.164823][T29301] FAULT_INJECTION: forcing a failure. [ 492.164823][T29301] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 492.178111][T29301] CPU: 1 PID: 29301 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 18:38:55 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x24, 0x0, 0x6, 0x10000000002) [ 492.189214][T29301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.199451][T29301] Call Trace: [ 492.202747][T29301] [ 492.205670][T29301] dump_stack_lvl+0xd6/0x122 [ 492.210280][T29301] dump_stack+0x11/0x1b [ 492.214497][T29301] should_fail+0x23c/0x250 [ 492.218913][T29301] __alloc_pages+0x102/0x330 [ 492.223933][T29301] alloc_pages_vma+0x67e/0x810 [ 492.228702][T29301] new_page+0x121/0x170 [ 492.232914][T29301] migrate_pages+0x465/0x1810 [ 492.237683][T29301] ? do_mbind+0x760/0x760 [ 492.242063][T29301] ? remove_migration_ptes+0x90/0x90 [ 492.247439][T29301] do_mbind+0x5b7/0x760 [ 492.251593][T29301] __se_sys_mbind+0x151/0x410 [ 492.256301][T29301] __x64_sys_mbind+0x74/0x80 [ 492.260903][T29301] do_syscall_64+0x44/0xd0 [ 492.265317][T29301] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 492.271216][T29301] RIP: 0033:0x7fb80e59e059 [ 492.275622][T29301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 492.295487][T29301] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 492.303899][T29301] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 492.311883][T29301] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 492.319856][T29301] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 492.327873][T29301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 492.335940][T29301] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 492.343973][T29301] [ 492.354940][T29298] FAULT_INJECTION: forcing a failure. [ 492.354940][T29298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 492.368232][T29298] CPU: 0 PID: 29298 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 492.379254][T29298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.389360][T29298] Call Trace: [ 492.392628][T29298] [ 492.395546][T29298] dump_stack_lvl+0xd6/0x122 [ 492.400130][T29298] dump_stack+0x11/0x1b [ 492.404378][T29298] should_fail+0x23c/0x250 [ 492.408828][T29298] __alloc_pages+0x102/0x330 [ 492.413463][T29298] alloc_pages_vma+0x67e/0x810 [ 492.418248][T29298] new_page+0x121/0x170 [ 492.422390][T29298] migrate_pages+0x465/0x1810 [ 492.427066][T29298] ? do_mbind+0x760/0x760 [ 492.431400][T29298] ? remove_migration_ptes+0x90/0x90 [ 492.436674][T29298] do_mbind+0x5b7/0x760 [ 492.440817][T29298] __se_sys_mbind+0x151/0x410 [ 492.445481][T29298] __x64_sys_mbind+0x74/0x80 [ 492.450194][T29298] do_syscall_64+0x44/0xd0 [ 492.454645][T29298] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 492.460614][T29298] RIP: 0033:0x7f1ee090e059 [ 492.465015][T29298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 492.484654][T29298] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 64) 18:38:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) [ 492.493051][T29298] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059 [ 492.501017][T29298] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 492.509156][T29298] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002 [ 492.517191][T29298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 492.525184][T29298] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000 [ 492.533201][T29298] 18:38:56 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 12) 18:38:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 492.615476][T29312] loop5: detected capacity change from 0 to 264192 [ 492.636441][T29313] FAULT_INJECTION: forcing a failure. [ 492.636441][T29313] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 492.649727][T29313] CPU: 0 PID: 29313 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 492.660799][T29313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.670930][T29313] Call Trace: [ 492.674250][T29313] [ 492.677173][T29313] dump_stack_lvl+0xd6/0x122 [ 492.681829][T29313] dump_stack+0x11/0x1b [ 492.685983][T29313] should_fail+0x23c/0x250 [ 492.690425][T29313] __alloc_pages+0x102/0x330 [ 492.695057][T29313] alloc_pages_vma+0x67e/0x810 [ 492.699863][T29313] new_page+0x121/0x170 [ 492.704022][T29313] migrate_pages+0x465/0x1810 [ 492.708708][T29313] ? do_mbind+0x760/0x760 [ 492.713043][T29313] ? remove_migration_ptes+0x90/0x90 [ 492.718339][T29313] do_mbind+0x5b7/0x760 [ 492.722520][T29313] __se_sys_mbind+0x151/0x410 [ 492.727236][T29313] __x64_sys_mbind+0x74/0x80 [ 492.731828][T29313] do_syscall_64+0x44/0xd0 [ 492.736250][T29313] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 492.742212][T29313] RIP: 0033:0x7fb80e59e059 [ 492.746617][T29313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 492.766388][T29313] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 492.774885][T29313] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 492.782856][T29313] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 492.790935][T29313] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 492.798936][T29313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 492.806907][T29313] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 18:38:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x25, 0x0, 0x6, 0x10000000002) 18:38:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 65) [ 492.814882][T29313] 18:38:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000008000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 492.896643][T29321] loop4: detected capacity change from 0 to 264192 [ 492.905028][T29327] loop5: detected capacity change from 0 to 264192 [ 492.941188][T29323] FAULT_INJECTION: forcing a failure. [ 492.941188][T29323] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 492.954560][T29323] CPU: 0 PID: 29323 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 492.965587][T29323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.975638][T29323] Call Trace: [ 492.978910][T29323] [ 492.981835][T29323] dump_stack_lvl+0xd6/0x122 [ 492.986488][T29323] dump_stack+0x11/0x1b 18:38:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 492.990650][T29323] should_fail+0x23c/0x250 [ 492.995068][T29323] __alloc_pages+0x102/0x330 [ 492.999658][T29323] alloc_pages_vma+0x67e/0x810 [ 493.004484][T29323] new_page+0x121/0x170 [ 493.008655][T29323] migrate_pages+0x465/0x1810 [ 493.013347][T29323] ? do_mbind+0x760/0x760 [ 493.017877][T29323] ? remove_migration_ptes+0x90/0x90 [ 493.023174][T29323] do_mbind+0x5b7/0x760 [ 493.027333][T29323] __se_sys_mbind+0x151/0x410 [ 493.032034][T29323] __x64_sys_mbind+0x74/0x80 [ 493.036679][T29323] do_syscall_64+0x44/0xd0 [ 493.041093][T29323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 493.047023][T29323] RIP: 0033:0x7fb80e59e059 [ 493.051438][T29323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 493.071047][T29323] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 493.079508][T29323] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002) 18:38:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 493.087531][T29323] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 493.095565][T29323] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 493.103534][T29323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.111501][T29323] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 493.119476][T29323] 18:38:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 66) 18:38:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:56 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 18:38:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x26, 0x0, 0x6, 0x10000000002) [ 493.314582][T29343] FAULT_INJECTION: forcing a failure. [ 493.314582][T29343] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.328110][T29343] CPU: 1 PID: 29343 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 493.339141][T29343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.349291][T29343] Call Trace: [ 493.352565][T29343] [ 493.355534][T29343] dump_stack_lvl+0xd6/0x122 [ 493.357794][T29352] loop4: detected capacity change from 0 to 264192 [ 493.360173][T29343] dump_stack+0x11/0x1b [ 493.360200][T29343] should_fail+0x23c/0x250 [ 493.375235][T29343] __alloc_pages+0x102/0x330 [ 493.379935][T29343] alloc_pages_vma+0x67e/0x810 [ 493.384731][T29343] new_page+0x121/0x170 [ 493.388887][T29343] migrate_pages+0x465/0x1810 [ 493.393653][T29343] ? do_mbind+0x760/0x760 [ 493.397986][T29343] ? remove_migration_ptes+0x90/0x90 [ 493.403796][T29343] do_mbind+0x5b7/0x760 [ 493.408035][T29343] __se_sys_mbind+0x151/0x410 [ 493.412856][T29343] __x64_sys_mbind+0x74/0x80 [ 493.417460][T29343] do_syscall_64+0x44/0xd0 [ 493.421939][T29343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 493.427853][T29343] RIP: 0033:0x7fb80e59e059 [ 493.432302][T29343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 493.446899][T29353] loop5: detected capacity change from 0 to 264192 18:38:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 493.451903][T29343] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 493.451940][T29343] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 493.474750][T29343] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 493.482835][T29343] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 493.490824][T29343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.498833][T29343] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 493.506876][T29343] 18:38:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x27, 0x0, 0x6, 0x10000000002) 18:38:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 67) 18:38:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 493.653767][T29371] loop5: detected capacity change from 0 to 264192 [ 493.729922][T29369] FAULT_INJECTION: forcing a failure. [ 493.729922][T29369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.743308][T29369] CPU: 1 PID: 29369 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 493.754330][T29369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.764379][T29369] Call Trace: [ 493.767650][T29369] [ 493.770570][T29369] dump_stack_lvl+0xd6/0x122 [ 493.775180][T29369] dump_stack+0x11/0x1b [ 493.779347][T29369] should_fail+0x23c/0x250 [ 493.783768][T29369] __alloc_pages+0x102/0x330 [ 493.788412][T29369] alloc_pages_vma+0x67e/0x810 [ 493.793176][T29369] new_page+0x121/0x170 [ 493.797354][T29369] migrate_pages+0x465/0x1810 [ 493.802066][T29369] ? do_mbind+0x760/0x760 [ 493.806412][T29369] ? remove_migration_ptes+0x90/0x90 [ 493.811755][T29369] do_mbind+0x5b7/0x760 [ 493.815972][T29369] __se_sys_mbind+0x151/0x410 [ 493.820649][T29369] __x64_sys_mbind+0x74/0x80 [ 493.825232][T29369] do_syscall_64+0x44/0xd0 18:38:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x28, 0x0, 0x6, 0x10000000002) 18:38:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2, 0x0, 0x0, 0x10000000002) [ 493.829646][T29369] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 493.835541][T29369] RIP: 0033:0x7fb80e59e059 [ 493.839954][T29369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 493.859569][T29369] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 493.868082][T29369] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 493.876035][T29369] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 493.884006][T29369] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 493.891963][T29369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.899963][T29369] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 493.907922][T29369] 18:38:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 68) 18:38:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) 18:38:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000010000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 493.991096][T29387] loop4: detected capacity change from 0 to 264192 [ 494.015962][T29390] loop5: detected capacity change from 0 to 264192 [ 494.092861][T29400] FAULT_INJECTION: forcing a failure. [ 494.092861][T29400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.106125][T29400] CPU: 0 PID: 29400 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 494.117147][T29400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.127197][T29400] Call Trace: [ 494.130494][T29400] [ 494.133418][T29400] dump_stack_lvl+0xd6/0x122 [ 494.138013][T29400] dump_stack+0x11/0x1b 18:38:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x0, 0x10000000002) [ 494.142200][T29400] should_fail+0x23c/0x250 [ 494.146617][T29400] __alloc_pages+0x102/0x330 [ 494.151206][T29400] alloc_pages_vma+0x67e/0x810 [ 494.155967][T29400] new_page+0x121/0x170 [ 494.160172][T29400] migrate_pages+0x465/0x1810 [ 494.164897][T29400] ? do_mbind+0x760/0x760 [ 494.169329][T29400] ? remove_migration_ptes+0x90/0x90 [ 494.174657][T29400] do_mbind+0x5b7/0x760 [ 494.178820][T29400] __se_sys_mbind+0x151/0x410 [ 494.183507][T29400] __x64_sys_mbind+0x74/0x80 [ 494.188098][T29400] do_syscall_64+0x44/0xd0 18:38:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x29, 0x0, 0x6, 0x10000000002) [ 494.192518][T29400] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 494.198415][T29400] RIP: 0033:0x7fb80e59e059 [ 494.202855][T29400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 494.222445][T29400] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 494.230872][T29400] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000049060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 69) 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 494.238826][T29400] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 494.246823][T29400] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 494.254775][T29400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 494.262754][T29400] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 494.270710][T29400] 18:38:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 494.349978][T29409] loop4: detected capacity change from 0 to 264192 [ 494.410215][T29417] loop5: detected capacity change from 0 to 264192 [ 494.418259][T29407] FAULT_INJECTION: forcing a failure. [ 494.418259][T29407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.431591][T29407] CPU: 1 PID: 29407 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 494.442616][T29407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.452671][T29407] Call Trace: [ 494.455970][T29407] [ 494.458897][T29407] dump_stack_lvl+0xd6/0x122 [ 494.463497][T29407] dump_stack+0x11/0x1b [ 494.467725][T29407] should_fail+0x23c/0x250 [ 494.472213][T29407] __alloc_pages+0x102/0x330 [ 494.476862][T29407] alloc_pages_vma+0x67e/0x810 [ 494.481633][T29407] new_page+0x121/0x170 [ 494.485810][T29407] migrate_pages+0x465/0x1810 [ 494.491060][T29407] ? do_mbind+0x760/0x760 [ 494.495396][T29407] ? remove_migration_ptes+0x90/0x90 [ 494.500688][T29407] do_mbind+0x5b7/0x760 [ 494.504914][T29407] __se_sys_mbind+0x151/0x410 18:38:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x7, 0x0, 0x0, 0x10000000002) [ 494.509595][T29407] __x64_sys_mbind+0x74/0x80 [ 494.514216][T29407] do_syscall_64+0x44/0xd0 [ 494.518678][T29407] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 494.524583][T29407] RIP: 0033:0x7fb80e59e059 [ 494.528993][T29407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 494.548629][T29407] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:58 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2a, 0x0, 0x6, 0x10000000002) 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 494.557069][T29407] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 494.565118][T29407] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 494.573107][T29407] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 494.581082][T29407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 494.589127][T29407] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 494.597101][T29407] 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0) 18:38:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 70) 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 494.692218][T29427] loop4: detected capacity change from 0 to 264192 [ 494.706423][T29432] loop5: detected capacity change from 0 to 264192 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0) [ 494.806686][T29430] FAULT_INJECTION: forcing a failure. [ 494.806686][T29430] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.820018][T29430] CPU: 1 PID: 29430 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 494.831220][T29430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.841332][T29430] Call Trace: [ 494.844610][T29430] [ 494.847539][T29430] dump_stack_lvl+0xd6/0x122 [ 494.852179][T29430] dump_stack+0x11/0x1b 18:38:58 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2b, 0x0, 0x6, 0x10000000002) 18:38:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x8, 0x0, 0x0, 0x10000000002) [ 494.856333][T29430] should_fail+0x23c/0x250 [ 494.860838][T29430] __alloc_pages+0x102/0x330 [ 494.865430][T29430] alloc_pages_vma+0x67e/0x810 [ 494.870219][T29430] new_page+0x121/0x170 [ 494.874379][T29430] migrate_pages+0x465/0x1810 [ 494.879055][T29430] ? do_mbind+0x760/0x760 [ 494.883386][T29430] ? remove_migration_ptes+0x90/0x90 [ 494.888686][T29430] do_mbind+0x5b7/0x760 [ 494.892848][T29430] __se_sys_mbind+0x151/0x410 [ 494.897518][T29430] __x64_sys_mbind+0x74/0x80 [ 494.902104][T29430] do_syscall_64+0x44/0xd0 [ 494.906515][T29430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 494.912521][T29430] RIP: 0033:0x7fb80e59e059 [ 494.916954][T29430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 494.936551][T29430] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 494.944952][T29430] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 494.952914][T29430] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 494.960900][T29430] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 494.968919][T29430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 494.976881][T29430] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 494.984889][T29430] 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 71) 18:38:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0) 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 495.081780][T29452] loop4: detected capacity change from 0 to 264192 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 495.140099][T29461] loop5: detected capacity change from 0 to 264192 18:38:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xc, 0x0, 0x0, 0x10000000002) 18:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 495.231014][T29458] FAULT_INJECTION: forcing a failure. [ 495.231014][T29458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.244274][T29458] CPU: 0 PID: 29458 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 495.255324][T29458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.265380][T29458] Call Trace: [ 495.268658][T29458] [ 495.271668][T29458] dump_stack_lvl+0xd6/0x122 [ 495.276262][T29458] dump_stack+0x11/0x1b 18:38:59 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2c, 0x0, 0x6, 0x10000000002) [ 495.280430][T29458] should_fail+0x23c/0x250 [ 495.284857][T29458] __alloc_pages+0x102/0x330 [ 495.289449][T29458] alloc_pages_vma+0x67e/0x810 [ 495.294375][T29458] new_page+0x121/0x170 [ 495.298543][T29458] migrate_pages+0x465/0x1810 [ 495.303283][T29458] ? do_mbind+0x760/0x760 [ 495.307809][T29458] ? remove_migration_ptes+0x90/0x90 [ 495.313094][T29458] do_mbind+0x5b7/0x760 [ 495.317256][T29458] __se_sys_mbind+0x151/0x410 [ 495.321929][T29458] __x64_sys_mbind+0x74/0x80 [ 495.326580][T29458] do_syscall_64+0x44/0xd0 [ 495.331001][T29458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 495.336925][T29458] RIP: 0033:0x7fb80e59e059 [ 495.341331][T29458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 495.361002][T29458] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 495.369478][T29458] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:38:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 1) 18:38:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 72) [ 495.377432][T29458] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 495.385398][T29458] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 495.393392][T29458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 495.401516][T29458] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 495.409475][T29458] [ 495.464777][T29477] loop4: detected capacity change from 0 to 264192 [ 495.494368][T29480] loop5: detected capacity change from 0 to 264192 [ 495.515205][T29473] FAULT_INJECTION: forcing a failure. [ 495.515205][T29473] name failslab, interval 1, probability 0, space 0, times 0 [ 495.527880][T29473] CPU: 0 PID: 29473 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 495.538962][T29473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.549013][T29473] Call Trace: [ 495.552286][T29473] [ 495.555204][T29473] dump_stack_lvl+0xd6/0x122 [ 495.559869][T29473] dump_stack+0x11/0x1b [ 495.564047][T29473] should_fail+0x23c/0x250 [ 495.568453][T29473] ? do_mbind+0x2cc/0x760 [ 495.572773][T29473] __should_failslab+0x81/0x90 [ 495.577689][T29473] should_failslab+0x5/0x20 [ 495.582250][T29473] kmem_cache_alloc+0x4f/0x320 [ 495.587005][T29473] ? get_pid_task+0x90/0xc0 [ 495.591528][T29473] do_mbind+0x2cc/0x760 [ 495.595686][T29473] ? __fget_files+0x1d2/0x210 [ 495.600346][T29473] __se_sys_mbind+0x151/0x410 [ 495.605104][T29473] __x64_sys_mbind+0x74/0x80 [ 495.609727][T29473] do_syscall_64+0x44/0xd0 [ 495.614153][T29473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 495.620039][T29473] RIP: 0033:0x7f7e86279059 [ 495.624438][T29473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 495.644095][T29473] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 495.652544][T29473] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:38:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x12, 0x0, 0x0, 0x10000000002) 18:38:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 495.660514][T29473] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 495.668469][T29473] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 495.676424][T29473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 495.684389][T29473] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 495.692345][T29473] 18:38:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 2) 18:38:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 495.736410][T29482] FAULT_INJECTION: forcing a failure. [ 495.736410][T29482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.749707][T29482] CPU: 0 PID: 29482 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 495.760762][T29482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.766695][T29485] loop4: detected capacity change from 0 to 264192 [ 495.770814][T29482] Call Trace: [ 495.770823][T29482] [ 495.770865][T29482] dump_stack_lvl+0xd6/0x122 [ 495.788150][T29482] dump_stack+0x11/0x1b [ 495.792348][T29482] should_fail+0x23c/0x250 [ 495.796795][T29482] __alloc_pages+0x102/0x330 [ 495.801404][T29482] alloc_pages_vma+0x67e/0x810 [ 495.806171][T29482] new_page+0x121/0x170 [ 495.810338][T29482] migrate_pages+0x465/0x1810 [ 495.815026][T29482] ? do_mbind+0x760/0x760 [ 495.819431][T29482] ? remove_migration_ptes+0x90/0x90 [ 495.824792][T29482] do_mbind+0x5b7/0x760 [ 495.829017][T29482] __se_sys_mbind+0x151/0x410 [ 495.833730][T29482] __x64_sys_mbind+0x74/0x80 [ 495.838322][T29482] do_syscall_64+0x44/0xd0 [ 495.842738][T29482] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 495.848640][T29482] RIP: 0033:0x7fb80e59e059 [ 495.853049][T29482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 495.872655][T29482] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:38:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x13, 0x0, 0x0, 0x10000000002) [ 495.881127][T29482] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 495.889103][T29482] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 495.897066][T29482] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 495.905070][T29482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 495.913031][T29482] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 495.920999][T29482] [ 495.925144][T29489] FAULT_INJECTION: forcing a failure. [ 495.925144][T29489] name failslab, interval 1, probability 0, space 0, times 0 [ 495.937788][T29489] CPU: 1 PID: 29489 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 495.948810][T29489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.958871][T29489] Call Trace: [ 495.962161][T29489] [ 495.965082][T29489] dump_stack_lvl+0xd6/0x122 [ 495.969679][T29489] dump_stack+0x11/0x1b [ 495.973936][T29489] should_fail+0x23c/0x250 [ 495.978427][T29489] ? vm_area_dup+0x44/0x130 [ 495.983076][T29489] __should_failslab+0x81/0x90 [ 495.987852][T29489] should_failslab+0x5/0x20 [ 495.992360][T29489] kmem_cache_alloc+0x4f/0x320 [ 495.997217][T29489] ? preempt_count_add+0x4e/0x90 [ 496.002171][T29489] vm_area_dup+0x44/0x130 [ 496.006575][T29489] ? debug_smp_processor_id+0x18/0x20 [ 496.011974][T29489] ? delay_tsc+0x96/0xe0 [ 496.016252][T29489] ? vma_merge+0x9c/0x810 [ 496.020594][T29489] __split_vma+0x82/0x320 [ 496.025010][T29489] ? vmacache_find+0x157/0x320 [ 496.029856][T29489] split_vma+0x57/0x70 [ 496.033918][T29489] mbind_range+0x52e/0x8d0 [ 496.038333][T29489] do_mbind+0x4d9/0x760 [ 496.042480][T29489] __se_sys_mbind+0x151/0x410 [ 496.047281][T29489] __x64_sys_mbind+0x74/0x80 [ 496.051975][T29489] do_syscall_64+0x44/0xd0 [ 496.056498][T29489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 496.062396][T29489] RIP: 0033:0x7f7e86279059 [ 496.066806][T29489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:38:59 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2d, 0x0, 0x6, 0x10000000002) 18:38:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 73) 18:38:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 496.086484][T29489] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 496.094903][T29489] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 496.102876][T29489] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 496.110842][T29489] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 496.118891][T29489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 496.126878][T29489] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 496.134865][T29489] 18:38:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 3) 18:38:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:38:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 496.185100][T29500] loop4: detected capacity change from 0 to 264192 [ 496.242587][T29496] FAULT_INJECTION: forcing a failure. [ 496.242587][T29496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.255909][T29496] CPU: 0 PID: 29496 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 496.267027][T29496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.277115][T29496] Call Trace: [ 496.280394][T29496] [ 496.283471][T29496] dump_stack_lvl+0xd6/0x122 [ 496.288438][T29496] dump_stack+0x11/0x1b [ 496.292619][T29496] should_fail+0x23c/0x250 [ 496.297536][T29496] __alloc_pages+0x102/0x330 [ 496.302175][T29496] alloc_pages_vma+0x67e/0x810 [ 496.306999][T29496] new_page+0x121/0x170 [ 496.311179][T29496] migrate_pages+0x465/0x1810 [ 496.315955][T29496] ? do_mbind+0x760/0x760 [ 496.320292][T29496] ? remove_migration_ptes+0x90/0x90 [ 496.325636][T29496] do_mbind+0x5b7/0x760 [ 496.329796][T29496] __se_sys_mbind+0x151/0x410 [ 496.333230][T29511] loop5: detected capacity change from 0 to 264192 [ 496.334485][T29496] __x64_sys_mbind+0x74/0x80 [ 496.334510][T29496] do_syscall_64+0x44/0xd0 [ 496.350056][T29496] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 496.356052][T29496] RIP: 0033:0x7fb80e59e059 [ 496.360489][T29496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 496.380285][T29496] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x14, 0x0, 0x0, 0x10000000002) 18:39:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 496.388785][T29496] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 496.397154][T29496] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 496.405205][T29496] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 496.413253][T29496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 496.421228][T29496] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 496.429227][T29496] [ 496.436687][T29503] FAULT_INJECTION: forcing a failure. [ 496.436687][T29503] name failslab, interval 1, probability 0, space 0, times 0 [ 496.449770][T29503] CPU: 1 PID: 29503 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 496.461752][T29503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.471803][T29503] Call Trace: [ 496.475075][T29503] [ 496.477996][T29503] dump_stack_lvl+0xd6/0x122 [ 496.482721][T29503] dump_stack+0x11/0x1b [ 496.486868][T29503] should_fail+0x23c/0x250 [ 496.491388][T29503] ? __mpol_dup+0x3f/0x180 [ 496.495806][T29503] __should_failslab+0x81/0x90 [ 496.500928][T29503] should_failslab+0x5/0x20 [ 496.505553][T29503] kmem_cache_alloc+0x4f/0x320 [ 496.510317][T29503] __mpol_dup+0x3f/0x180 [ 496.514568][T29503] mbind_range+0x5e7/0x8d0 [ 496.518975][T29503] do_mbind+0x4d9/0x760 [ 496.523122][T29503] __se_sys_mbind+0x151/0x410 [ 496.527805][T29503] __x64_sys_mbind+0x74/0x80 [ 496.532440][T29503] do_syscall_64+0x44/0xd0 [ 496.536846][T29503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 496.542942][T29503] RIP: 0033:0x7f7e86279059 [ 496.547381][T29503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 496.566971][T29503] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 496.575374][T29503] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 496.583328][T29503] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 18:39:00 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 74) 18:39:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 496.591319][T29503] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 496.599335][T29503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 496.607298][T29503] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 496.615261][T29503] 18:39:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 4) 18:39:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2e, 0x0, 0x6, 0x10000000002) 18:39:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 496.724152][T29526] loop4: detected capacity change from 0 to 264192 [ 496.761375][T29531] loop5: detected capacity change from 0 to 264192 [ 496.763932][T29519] FAULT_INJECTION: forcing a failure. [ 496.763932][T29519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.781084][T29519] CPU: 1 PID: 29519 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 496.792132][T29519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.802180][T29519] Call Trace: [ 496.805453][T29519] [ 496.808383][T29519] dump_stack_lvl+0xd6/0x122 [ 496.812989][T29519] dump_stack+0x11/0x1b [ 496.817228][T29519] should_fail+0x23c/0x250 [ 496.821689][T29519] __alloc_pages+0x102/0x330 [ 496.826339][T29519] alloc_pages_vma+0x67e/0x810 [ 496.831109][T29519] new_page+0x121/0x170 [ 496.835277][T29519] migrate_pages+0x465/0x1810 [ 496.839965][T29519] ? do_mbind+0x760/0x760 [ 496.844292][T29519] ? remove_migration_ptes+0x90/0x90 [ 496.849587][T29519] do_mbind+0x5b7/0x760 [ 496.853767][T29519] __se_sys_mbind+0x151/0x410 [ 496.858447][T29519] __x64_sys_mbind+0x74/0x80 [ 496.863169][T29519] do_syscall_64+0x44/0xd0 [ 496.867651][T29519] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 496.873768][T29519] RIP: 0033:0x7fb80e59e059 [ 496.878196][T29519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 496.897806][T29519] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 496.906299][T29519] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 496.914268][T29519] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 18:39:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x15, 0x0, 0x0, 0x10000000002) 18:39:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2f, 0x0, 0x6, 0x10000000002) [ 496.922305][T29519] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 496.930801][T29519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 496.939074][T29519] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 496.947119][T29519] [ 496.954917][T29523] FAULT_INJECTION: forcing a failure. [ 496.954917][T29523] name failslab, interval 1, probability 0, space 0, times 0 [ 496.967800][T29523] CPU: 0 PID: 29523 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 496.979421][T29523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.989778][T29523] Call Trace: [ 496.993317][T29523] [ 496.996351][T29523] dump_stack_lvl+0xd6/0x122 [ 497.001604][T29523] dump_stack+0x11/0x1b [ 497.005823][T29523] should_fail+0x23c/0x250 [ 497.010261][T29523] ? vm_area_dup+0x44/0x130 [ 497.014847][T29523] __should_failslab+0x81/0x90 [ 497.019929][T29523] should_failslab+0x5/0x20 [ 497.024446][T29523] kmem_cache_alloc+0x4f/0x320 [ 497.029509][T29523] ? __vma_adjust+0x1830/0x1a70 [ 497.034449][T29523] vm_area_dup+0x44/0x130 [ 497.040814][T29523] ? should_fail+0xd6/0x250 [ 497.045357][T29523] ? __mpol_equal+0x175/0x1c0 [ 497.050109][T29523] __split_vma+0x82/0x320 [ 497.054546][T29523] split_vma+0x57/0x70 [ 497.058627][T29523] mbind_range+0x587/0x8d0 [ 497.063224][T29523] do_mbind+0x4d9/0x760 [ 497.067558][T29523] __se_sys_mbind+0x151/0x410 18:39:00 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 75) [ 497.072372][T29523] __x64_sys_mbind+0x74/0x80 [ 497.076969][T29523] do_syscall_64+0x44/0xd0 [ 497.081541][T29523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 497.087527][T29523] RIP: 0033:0x7f7e86279059 [ 497.092057][T29523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 497.112648][T29523] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000bb050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 497.121066][T29523] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 497.129928][T29523] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 497.138006][T29523] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 497.146691][T29523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.155256][T29523] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 497.163301][T29523] [ 497.204731][T29536] FAULT_INJECTION: forcing a failure. [ 497.204731][T29536] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.210752][T29543] loop4: detected capacity change from 0 to 264192 [ 497.218450][T29536] CPU: 1 PID: 29536 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 497.218476][T29536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.218488][T29536] Call Trace: [ 497.218494][T29536] [ 497.253071][T29536] dump_stack_lvl+0xd6/0x122 [ 497.257888][T29536] dump_stack+0x11/0x1b [ 497.262056][T29536] should_fail+0x23c/0x250 [ 497.266502][T29536] __alloc_pages+0x102/0x330 [ 497.271272][T29536] alloc_pages_vma+0x67e/0x810 [ 497.276236][T29536] new_page+0x121/0x170 [ 497.280864][T29536] migrate_pages+0x465/0x1810 [ 497.285710][T29536] ? do_mbind+0x760/0x760 [ 497.290050][T29536] ? remove_migration_ptes+0x90/0x90 [ 497.295765][T29536] do_mbind+0x5b7/0x760 [ 497.300009][T29536] __se_sys_mbind+0x151/0x410 [ 497.304817][T29536] __x64_sys_mbind+0x74/0x80 [ 497.309511][T29536] do_syscall_64+0x44/0xd0 [ 497.314016][T29536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 497.320056][T29536] RIP: 0033:0x7fb80e59e059 [ 497.324504][T29536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 497.344291][T29536] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x16, 0x0, 0x0, 0x10000000002) 18:39:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 5) 18:39:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 497.352704][T29536] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 497.361115][T29536] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 497.369348][T29536] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 497.370839][T29541] loop5: detected capacity change from 0 to 264192 [ 497.377941][T29536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 497.393132][T29536] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 497.401105][T29536] 18:39:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 76) 18:39:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 497.501652][T29550] FAULT_INJECTION: forcing a failure. [ 497.501652][T29550] name failslab, interval 1, probability 0, space 0, times 0 [ 497.514412][T29550] CPU: 0 PID: 29550 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 497.525715][T29550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.535871][T29550] Call Trace: [ 497.539147][T29550] [ 497.542073][T29550] dump_stack_lvl+0xd6/0x122 [ 497.546674][T29550] dump_stack+0x11/0x1b [ 497.550901][T29550] should_fail+0x23c/0x250 [ 497.555319][T29550] ? anon_vma_clone+0x8d/0x380 [ 497.560080][T29550] __should_failslab+0x81/0x90 [ 497.564969][T29550] should_failslab+0x5/0x20 [ 497.569478][T29550] kmem_cache_alloc+0x4f/0x320 [ 497.574250][T29550] anon_vma_clone+0x8d/0x380 [ 497.578859][T29550] __split_vma+0x134/0x320 [ 497.583401][T29550] split_vma+0x57/0x70 [ 497.587578][T29550] mbind_range+0x587/0x8d0 [ 497.592028][T29550] do_mbind+0x4d9/0x760 [ 497.596464][T29550] __se_sys_mbind+0x151/0x410 [ 497.601142][T29550] __x64_sys_mbind+0x74/0x80 [ 497.605792][T29550] do_syscall_64+0x44/0xd0 [ 497.610212][T29550] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 497.616220][T29550] RIP: 0033:0x7f7e86279059 [ 497.620893][T29550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 497.640779][T29550] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 497.649191][T29550] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 497.657160][T29550] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 497.665138][T29550] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 497.673090][T29550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.681128][T29550] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 497.689156][T29550] [ 497.701597][T29557] FAULT_INJECTION: forcing a failure. [ 497.701597][T29557] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.714996][T29557] CPU: 1 PID: 29557 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 497.726093][T29557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.737119][T29557] Call Trace: [ 497.740489][T29557] [ 497.743417][T29557] dump_stack_lvl+0xd6/0x122 [ 497.748028][T29557] dump_stack+0x11/0x1b 18:39:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x30, 0x0, 0x6, 0x10000000002) [ 497.752251][T29557] should_fail+0x23c/0x250 [ 497.756665][T29557] __alloc_pages+0x102/0x330 [ 497.761252][T29557] alloc_pages_vma+0x67e/0x810 [ 497.766075][T29557] new_page+0x121/0x170 [ 497.770270][T29557] migrate_pages+0x465/0x1810 [ 497.775023][T29557] ? do_mbind+0x760/0x760 [ 497.779361][T29557] ? remove_migration_ptes+0x90/0x90 [ 497.780632][T29560] loop5: detected capacity change from 0 to 264192 [ 497.784708][T29557] do_mbind+0x5b7/0x760 [ 497.784735][T29557] __se_sys_mbind+0x151/0x410 [ 497.800160][T29557] __x64_sys_mbind+0x74/0x80 [ 497.804752][T29557] do_syscall_64+0x44/0xd0 [ 497.809274][T29557] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 497.815180][T29557] RIP: 0033:0x7fb80e59e059 [ 497.819593][T29557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 497.839720][T29557] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x31, 0x0, 0x6, 0x10000000002) 18:39:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 497.848176][T29557] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 497.856245][T29557] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 497.864788][T29557] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 497.872779][T29557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 497.880748][T29557] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 497.888868][T29557] 18:39:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 6) 18:39:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 497.902682][T29562] loop4: detected capacity change from 0 to 264192 18:39:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 77) 18:39:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x17, 0x0, 0x0, 0x10000000002) [ 498.016759][T29568] FAULT_INJECTION: forcing a failure. [ 498.016759][T29568] name failslab, interval 1, probability 0, space 0, times 0 [ 498.029468][T29568] CPU: 0 PID: 29568 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 498.040647][T29568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.050798][T29568] Call Trace: [ 498.054075][T29568] [ 498.057000][T29568] dump_stack_lvl+0xd6/0x122 [ 498.061622][T29568] dump_stack+0x11/0x1b [ 498.065847][T29568] should_fail+0x23c/0x250 [ 498.070329][T29568] ? __mpol_dup+0x3f/0x180 [ 498.074815][T29568] __should_failslab+0x81/0x90 [ 498.079647][T29568] should_failslab+0x5/0x20 [ 498.084159][T29568] kmem_cache_alloc+0x4f/0x320 [ 498.088928][T29568] __mpol_dup+0x3f/0x180 [ 498.093221][T29568] mbind_range+0x5e7/0x8d0 [ 498.097716][T29568] do_mbind+0x4d9/0x760 [ 498.101873][T29568] __se_sys_mbind+0x151/0x410 [ 498.106545][T29568] __x64_sys_mbind+0x74/0x80 [ 498.111147][T29568] do_syscall_64+0x44/0xd0 [ 498.115560][T29568] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 498.121502][T29568] RIP: 0033:0x7f7e86279059 [ 498.125904][T29568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 498.145616][T29568] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 498.154023][T29568] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 498.161981][T29568] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 498.169936][T29568] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 498.177893][T29568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.185851][T29568] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 498.194099][T29568] [ 498.226539][T29576] FAULT_INJECTION: forcing a failure. [ 498.226539][T29576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 498.240112][T29576] CPU: 0 PID: 29576 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 498.245403][T29581] loop5: detected capacity change from 0 to 264192 [ 498.251129][T29576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.251143][T29576] Call Trace: [ 498.251150][T29576] [ 498.251157][T29576] dump_stack_lvl+0xd6/0x122 [ 498.278538][T29576] dump_stack+0x11/0x1b [ 498.282746][T29576] should_fail+0x23c/0x250 [ 498.287210][T29576] __alloc_pages+0x102/0x330 [ 498.291804][T29576] alloc_pages_vma+0x67e/0x810 [ 498.296585][T29576] new_page+0x121/0x170 [ 498.300818][T29576] migrate_pages+0x465/0x1810 [ 498.305523][T29576] ? do_mbind+0x760/0x760 [ 498.310077][T29576] ? remove_migration_ptes+0x90/0x90 [ 498.316263][T29576] do_mbind+0x5b7/0x760 [ 498.320422][T29576] __se_sys_mbind+0x151/0x410 [ 498.325100][T29576] __x64_sys_mbind+0x74/0x80 [ 498.329694][T29576] do_syscall_64+0x44/0xd0 [ 498.334128][T29576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 498.340084][T29576] RIP: 0033:0x7fb80e59e059 [ 498.344531][T29576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 498.364134][T29576] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 7) 18:39:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x32, 0x0, 0x6, 0x10000000002) [ 498.372652][T29576] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 498.380629][T29576] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 498.388615][T29576] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 498.396656][T29576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 498.404758][T29576] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 498.412730][T29576] 18:39:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006490000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 498.421068][T29582] loop4: detected capacity change from 0 to 264192 18:39:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x18, 0x0, 0x0, 0x10000000002) 18:39:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 78) [ 498.498426][T29588] FAULT_INJECTION: forcing a failure. [ 498.498426][T29588] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 498.511844][T29588] CPU: 0 PID: 29588 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 498.522881][T29588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.532964][T29588] Call Trace: [ 498.536243][T29588] [ 498.539221][T29588] dump_stack_lvl+0xd6/0x122 [ 498.543906][T29588] dump_stack+0x11/0x1b [ 498.548132][T29588] should_fail+0x23c/0x250 [ 498.552590][T29588] __alloc_pages+0x102/0x330 [ 498.557187][T29588] alloc_pages_vma+0x67e/0x810 [ 498.561951][T29588] ? PageHuge+0x59/0xc0 [ 498.566115][T29588] new_page+0x121/0x170 [ 498.570272][T29588] migrate_pages+0x465/0x1810 [ 498.575022][T29588] ? __mpol_dup+0x151/0x180 [ 498.579529][T29588] ? mbind_range+0x846/0x8d0 [ 498.584117][T29588] ? do_mbind+0x760/0x760 [ 498.588483][T29588] do_mbind+0x5b7/0x760 [ 498.592742][T29588] __se_sys_mbind+0x151/0x410 [ 498.597425][T29588] __x64_sys_mbind+0x74/0x80 [ 498.602015][T29588] do_syscall_64+0x44/0xd0 [ 498.606521][T29588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 498.612453][T29588] RIP: 0033:0x7f7e86279059 [ 498.616863][T29588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 498.636484][T29588] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 498.644949][T29588] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 498.652969][T29588] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 498.662209][T29588] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 498.670181][T29588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.678229][T29588] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 498.686237][T29588] [ 498.699224][T29591] FAULT_INJECTION: forcing a failure. [ 498.699224][T29591] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 498.712600][T29591] CPU: 1 PID: 29591 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 498.723626][T29591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.733697][T29591] Call Trace: [ 498.736970][T29591] [ 498.739896][T29591] dump_stack_lvl+0xd6/0x122 [ 498.744534][T29591] dump_stack+0x11/0x1b [ 498.748785][T29591] should_fail+0x23c/0x250 [ 498.753204][T29591] __alloc_pages+0x102/0x330 [ 498.757871][T29591] alloc_pages_vma+0x67e/0x810 [ 498.762634][T29591] new_page+0x121/0x170 [ 498.766787][T29591] migrate_pages+0x465/0x1810 [ 498.771464][T29591] ? do_mbind+0x760/0x760 [ 498.775802][T29591] ? remove_migration_ptes+0x90/0x90 [ 498.781113][T29591] do_mbind+0x5b7/0x760 [ 498.785273][T29591] __se_sys_mbind+0x151/0x410 [ 498.789949][T29591] __x64_sys_mbind+0x74/0x80 [ 498.794536][T29591] do_syscall_64+0x44/0xd0 [ 498.798948][T29591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 498.804903][T29591] RIP: 0033:0x7fb80e59e059 [ 498.809383][T29591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 498.829188][T29591] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 498.837661][T29591] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:39:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 8) 18:39:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 498.845758][T29591] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 498.853723][T29591] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 498.861718][T29591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 498.869685][T29591] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 498.877689][T29591] 18:39:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 498.917680][T29599] loop4: detected capacity change from 0 to 264192 [ 498.949736][T29603] loop5: detected capacity change from 0 to 264192 [ 498.953727][T29597] FAULT_INJECTION: forcing a failure. [ 498.953727][T29597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 498.969797][T29597] CPU: 0 PID: 29597 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 498.981064][T29597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.991271][T29597] Call Trace: [ 498.994587][T29597] [ 498.997531][T29597] dump_stack_lvl+0xd6/0x122 [ 499.002141][T29597] dump_stack+0x11/0x1b [ 499.006303][T29597] should_fail+0x23c/0x250 [ 499.010727][T29597] __alloc_pages+0x102/0x330 18:39:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x19, 0x0, 0x0, 0x10000000002) [ 499.015455][T29597] alloc_pages_vma+0x67e/0x810 [ 499.020312][T29597] ? PageHuge+0x59/0xc0 [ 499.024488][T29597] new_page+0x121/0x170 [ 499.028738][T29597] migrate_pages+0x465/0x1810 [ 499.033560][T29597] ? do_mbind+0x760/0x760 [ 499.038183][T29597] ? remove_migration_ptes+0x90/0x90 [ 499.043483][T29597] do_mbind+0x5b7/0x760 [ 499.047645][T29597] __se_sys_mbind+0x151/0x410 [ 499.052391][T29597] __x64_sys_mbind+0x74/0x80 [ 499.057136][T29597] do_syscall_64+0x44/0xd0 [ 499.061554][T29597] entry_SYSCALL_64_after_hwframe+0x44/0xae 18:39:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 79) [ 499.067560][T29597] RIP: 0033:0x7f7e86279059 [ 499.071969][T29597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 499.091588][T29597] RSP: 002b:00007f7e853ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 499.100041][T29597] RAX: ffffffffffffffda RBX: 00007f7e8638c100 RCX: 00007f7e86279059 [ 499.108106][T29597] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 18:39:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x33, 0x0, 0x6, 0x10000000002) [ 499.116085][T29597] RBP: 00007f7e853ad1d0 R08: 0000000000000000 R09: 0000010000000002 [ 499.124091][T29597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 499.132071][T29597] R13: 00007ffc19a6cfdf R14: 00007f7e853ad300 R15: 0000000000022000 [ 499.140103][T29597] 18:39:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 499.215388][T29609] FAULT_INJECTION: forcing a failure. [ 499.215388][T29609] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 499.228674][T29609] CPU: 1 PID: 29609 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 499.239788][T29609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.249847][T29609] Call Trace: [ 499.253159][T29609] [ 499.256133][T29609] dump_stack_lvl+0xd6/0x122 [ 499.260793][T29609] dump_stack+0x11/0x1b [ 499.264954][T29609] should_fail+0x23c/0x250 [ 499.269482][T29609] __alloc_pages+0x102/0x330 [ 499.274093][T29609] alloc_pages_vma+0x67e/0x810 [ 499.278930][T29609] new_page+0x121/0x170 [ 499.283217][T29609] migrate_pages+0x465/0x1810 [ 499.287980][T29609] ? do_mbind+0x760/0x760 [ 499.292320][T29609] ? remove_migration_ptes+0x90/0x90 [ 499.297637][T29609] do_mbind+0x5b7/0x760 [ 499.301795][T29609] __se_sys_mbind+0x151/0x410 [ 499.306544][T29609] __x64_sys_mbind+0x74/0x80 [ 499.311168][T29609] do_syscall_64+0x44/0xd0 18:39:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 9) [ 499.315591][T29609] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 499.321489][T29609] RIP: 0033:0x7fb80e59e059 [ 499.325907][T29609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 499.345497][T29609] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 499.353999][T29609] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 499.362102][T29609] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 499.370064][T29609] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 499.378019][T29609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 499.385972][T29609] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 499.394022][T29609] 18:39:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 499.411405][T29619] loop4: detected capacity change from 0 to 264192 [ 499.432928][T29616] FAULT_INJECTION: forcing a failure. [ 499.432928][T29616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 499.446203][T29616] CPU: 0 PID: 29616 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 499.457399][T29616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.467454][T29616] Call Trace: [ 499.470720][T29616] [ 499.473645][T29616] dump_stack_lvl+0xd6/0x122 [ 499.478242][T29616] dump_stack+0x11/0x1b [ 499.482484][T29616] should_fail+0x23c/0x250 [ 499.486968][T29616] __alloc_pages+0x102/0x330 [ 499.491620][T29616] alloc_pages_vma+0x67e/0x810 [ 499.496395][T29616] ? PageHuge+0x59/0xc0 [ 499.500588][T29616] new_page+0x121/0x170 [ 499.504746][T29616] migrate_pages+0x465/0x1810 [ 499.509433][T29616] ? do_mbind+0x760/0x760 [ 499.513801][T29616] ? remove_migration_ptes+0x90/0x90 [ 499.519177][T29616] do_mbind+0x5b7/0x760 [ 499.523335][T29616] __se_sys_mbind+0x151/0x410 [ 499.528020][T29616] __x64_sys_mbind+0x74/0x80 [ 499.532611][T29616] do_syscall_64+0x44/0xd0 [ 499.537029][T29616] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 499.543020][T29616] RIP: 0033:0x7f7e86279059 18:39:03 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a, 0x0, 0x0, 0x10000000002) 18:39:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 80) [ 499.548300][T29616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 499.568286][T29616] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 499.576741][T29616] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 499.584710][T29616] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 499.592768][T29616] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 499.600741][T29616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 499.605926][T29626] loop5: detected capacity change from 0 to 264192 [ 499.608706][T29616] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 499.608727][T29616] [ 499.636402][T29623] FAULT_INJECTION: forcing a failure. [ 499.636402][T29623] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 499.649671][T29623] CPU: 0 PID: 29623 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 499.660821][T29623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.670870][T29623] Call Trace: [ 499.674150][T29623] [ 499.677156][T29623] dump_stack_lvl+0xd6/0x122 [ 499.681806][T29623] dump_stack+0x11/0x1b [ 499.686011][T29623] should_fail+0x23c/0x250 [ 499.690428][T29623] __alloc_pages+0x102/0x330 [ 499.695014][T29623] alloc_pages_vma+0x67e/0x810 [ 499.699786][T29623] new_page+0x121/0x170 [ 499.703964][T29623] migrate_pages+0x465/0x1810 [ 499.708703][T29623] ? do_mbind+0x760/0x760 18:39:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 10) [ 499.713116][T29623] ? remove_migration_ptes+0x90/0x90 [ 499.718467][T29623] do_mbind+0x5b7/0x760 [ 499.722667][T29623] __se_sys_mbind+0x151/0x410 [ 499.727350][T29623] __x64_sys_mbind+0x74/0x80 [ 499.732006][T29623] do_syscall_64+0x44/0xd0 [ 499.736442][T29623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 499.742391][T29623] RIP: 0033:0x7fb80e59e059 [ 499.746800][T29623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:39:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 499.766434][T29623] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 499.774852][T29623] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 499.782824][T29623] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 499.790791][T29623] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 499.798763][T29623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 499.806740][T29623] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 499.814866][T29623] 18:39:03 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x34, 0x0, 0x6, 0x10000000002) 18:39:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000001000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 81) [ 499.839949][T29629] FAULT_INJECTION: forcing a failure. [ 499.839949][T29629] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 499.853254][T29629] CPU: 0 PID: 29629 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 499.864322][T29629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.874516][T29629] Call Trace: [ 499.877794][T29629] [ 499.880794][T29629] dump_stack_lvl+0xd6/0x122 [ 499.885396][T29629] dump_stack+0x11/0x1b [ 499.889619][T29629] should_fail+0x23c/0x250 [ 499.894107][T29629] __alloc_pages+0x102/0x330 [ 499.898716][T29629] alloc_pages_vma+0x67e/0x810 [ 499.903486][T29629] ? PageHuge+0x59/0xc0 [ 499.907697][T29629] new_page+0x121/0x170 [ 499.911855][T29629] migrate_pages+0x465/0x1810 [ 499.916544][T29629] ? do_mbind+0x760/0x760 [ 499.920980][T29629] ? remove_migration_ptes+0x90/0x90 [ 499.926447][T29629] do_mbind+0x5b7/0x760 [ 499.930624][T29629] __se_sys_mbind+0x151/0x410 [ 499.935307][T29629] __x64_sys_mbind+0x74/0x80 [ 499.936114][T29638] loop4: detected capacity change from 0 to 264192 [ 499.939912][T29629] do_syscall_64+0x44/0xd0 [ 499.939937][T29629] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 499.939960][T29629] RIP: 0033:0x7f7e86279059 [ 499.939975][T29629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 499.981201][T29629] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000002000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 499.989621][T29629] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 499.997702][T29629] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 500.005670][T29629] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 500.013637][T29629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.021675][T29629] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 500.029652][T29629] 18:39:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 11) 18:39:03 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1b, 0x0, 0x0, 0x10000000002) [ 500.062315][T29641] FAULT_INJECTION: forcing a failure. [ 500.062315][T29641] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.075581][T29641] CPU: 0 PID: 29641 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 500.086627][T29641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.096680][T29641] Call Trace: [ 500.099965][T29641] [ 500.102889][T29641] dump_stack_lvl+0xd6/0x122 [ 500.107560][T29641] dump_stack+0x11/0x1b [ 500.111754][T29641] should_fail+0x23c/0x250 [ 500.116231][T29641] __alloc_pages+0x102/0x330 [ 500.120828][T29641] alloc_pages_vma+0x67e/0x810 [ 500.125594][T29641] new_page+0x121/0x170 [ 500.129783][T29641] migrate_pages+0x465/0x1810 [ 500.134465][T29641] ? do_mbind+0x760/0x760 [ 500.138842][T29641] ? remove_migration_ptes+0x90/0x90 [ 500.144253][T29641] do_mbind+0x5b7/0x760 [ 500.148406][T29641] __se_sys_mbind+0x151/0x410 [ 500.153080][T29641] __x64_sys_mbind+0x74/0x80 [ 500.157671][T29641] do_syscall_64+0x44/0xd0 [ 500.162088][T29641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 500.168063][T29641] RIP: 0033:0x7fb80e59e059 [ 500.172571][T29641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 500.192195][T29641] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 500.200660][T29641] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 500.208609][T29641] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 500.216571][T29641] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 500.224522][T29641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.232532][T29641] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 500.240587][T29641] [ 500.254845][T29647] FAULT_INJECTION: forcing a failure. [ 500.254845][T29647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.268098][T29647] CPU: 0 PID: 29647 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 500.279245][T29647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.289330][T29647] Call Trace: [ 500.292602][T29647] [ 500.295518][T29647] dump_stack_lvl+0xd6/0x122 [ 500.300104][T29647] dump_stack+0x11/0x1b [ 500.304301][T29647] should_fail+0x23c/0x250 [ 500.308759][T29647] __alloc_pages+0x102/0x330 [ 500.313357][T29647] alloc_pages_vma+0x67e/0x810 [ 500.318230][T29647] ? PageHuge+0x59/0xc0 [ 500.322443][T29647] new_page+0x121/0x170 [ 500.326602][T29647] migrate_pages+0x465/0x1810 [ 500.331375][T29647] ? do_mbind+0x760/0x760 [ 500.335695][T29647] ? remove_migration_ptes+0x90/0x90 [ 500.341035][T29647] do_mbind+0x5b7/0x760 [ 500.345363][T29647] __se_sys_mbind+0x151/0x410 [ 500.350030][T29647] __x64_sys_mbind+0x74/0x80 [ 500.354679][T29647] do_syscall_64+0x44/0xd0 [ 500.359119][T29647] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 500.365004][T29647] RIP: 0033:0x7f7e86279059 [ 500.369405][T29647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 500.389040][T29647] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 500.397437][T29647] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 500.405393][T29647] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 18:39:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 82) [ 500.413348][T29647] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 500.421378][T29647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.429342][T29647] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 500.437312][T29647] 18:39:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000003000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 12) 18:39:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 500.480966][T29652] loop5: detected capacity change from 0 to 264192 [ 500.554631][T29661] loop4: detected capacity change from 0 to 264192 [ 500.567121][T29663] FAULT_INJECTION: forcing a failure. [ 500.567121][T29663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.580423][T29663] CPU: 0 PID: 29663 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 500.591446][T29663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.601496][T29663] Call Trace: 18:39:04 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x35, 0x0, 0x6, 0x10000000002) 18:39:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000004000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 500.604768][T29663] [ 500.607696][T29663] dump_stack_lvl+0xd6/0x122 [ 500.612360][T29663] dump_stack+0x11/0x1b [ 500.616597][T29663] should_fail+0x23c/0x250 [ 500.621018][T29663] __alloc_pages+0x102/0x330 [ 500.625610][T29663] alloc_pages_vma+0x67e/0x810 [ 500.630900][T29663] new_page+0x121/0x170 [ 500.635120][T29663] migrate_pages+0x465/0x1810 [ 500.639807][T29663] ? do_mbind+0x760/0x760 [ 500.644136][T29663] ? remove_migration_ptes+0x90/0x90 [ 500.649432][T29663] do_mbind+0x5b7/0x760 [ 500.653595][T29663] __se_sys_mbind+0x151/0x410 [ 500.658271][T29663] __x64_sys_mbind+0x74/0x80 [ 500.662882][T29663] do_syscall_64+0x44/0xd0 [ 500.667300][T29663] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 500.673257][T29663] RIP: 0033:0x7fb80e59e059 [ 500.677690][T29663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:39:04 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1c, 0x0, 0x0, 0x10000000002) [ 500.697294][T29663] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 500.705726][T29663] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059 [ 500.713696][T29663] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 500.721732][T29663] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002 [ 500.729698][T29663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.737852][T29663] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000 [ 500.745805][T29663] [ 500.751986][T29662] FAULT_INJECTION: forcing a failure. [ 500.751986][T29662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.765265][T29662] CPU: 1 PID: 29662 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 500.776343][T29662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.786406][T29662] Call Trace: [ 500.789702][T29662] [ 500.792699][T29662] dump_stack_lvl+0xd6/0x122 [ 500.797350][T29662] dump_stack+0x11/0x1b [ 500.801513][T29662] should_fail+0x23c/0x250 18:39:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 83) [ 500.805932][T29662] __alloc_pages+0x102/0x330 [ 500.810516][T29662] alloc_pages_vma+0x67e/0x810 [ 500.815281][T29662] ? PageHuge+0x59/0xc0 [ 500.819436][T29662] new_page+0x121/0x170 [ 500.823589][T29662] migrate_pages+0x465/0x1810 [ 500.828281][T29662] ? do_mbind+0x760/0x760 [ 500.832648][T29662] ? remove_migration_ptes+0x90/0x90 [ 500.838109][T29662] do_mbind+0x5b7/0x760 [ 500.842261][T29662] __se_sys_mbind+0x151/0x410 [ 500.846939][T29662] __x64_sys_mbind+0x74/0x80 [ 500.851531][T29662] do_syscall_64+0x44/0xd0 [ 500.855961][T29662] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 500.861922][T29662] RIP: 0033:0x7f7e86279059 [ 500.866324][T29662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 500.886050][T29662] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 500.894454][T29662] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 500.902659][T29662] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 500.910616][T29662] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 500.918573][T29662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.926557][T29662] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 500.934559][T29662] [ 500.964962][T29670] FAULT_INJECTION: forcing a failure. [ 500.964962][T29670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.978223][T29670] CPU: 0 PID: 29670 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 500.989269][T29670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.999348][T29670] Call Trace: [ 501.002621][T29670] [ 501.005536][T29670] dump_stack_lvl+0xd6/0x122 [ 501.010119][T29670] dump_stack+0x11/0x1b [ 501.014272][T29670] should_fail+0x23c/0x250 [ 501.018789][T29670] __alloc_pages+0x102/0x330 [ 501.023461][T29670] alloc_pages_vma+0x67e/0x810 [ 501.028240][T29670] new_page+0x121/0x170 [ 501.032395][T29670] migrate_pages+0x465/0x1810 [ 501.037065][T29670] ? do_mbind+0x760/0x760 [ 501.041437][T29670] ? remove_migration_ptes+0x90/0x90 [ 501.046716][T29670] do_mbind+0x5b7/0x760 [ 501.050866][T29670] __se_sys_mbind+0x151/0x410 [ 501.055526][T29670] __x64_sys_mbind+0x74/0x80 [ 501.060210][T29670] do_syscall_64+0x44/0xd0 [ 501.064617][T29670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 501.070510][T29670] RIP: 0033:0x7fb80e59e059 [ 501.074910][T29670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 501.094518][T29670] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 501.102932][T29670] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:39:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 13) 18:39:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000005000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 501.110889][T29670] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 501.118894][T29670] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 501.126851][T29670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 501.134826][T29670] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 501.142792][T29670] 18:39:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 84) [ 501.177625][T29679] loop5: detected capacity change from 0 to 264192 [ 501.232713][T29683] loop4: detected capacity change from 0 to 264192 [ 501.254359][T29676] FAULT_INJECTION: forcing a failure. [ 501.254359][T29676] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 501.267637][T29676] CPU: 1 PID: 29676 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 501.278690][T29676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.288742][T29676] Call Trace: [ 501.292076][T29676] [ 501.295002][T29676] dump_stack_lvl+0xd6/0x122 [ 501.299690][T29676] dump_stack+0x11/0x1b [ 501.303920][T29676] should_fail+0x23c/0x250 [ 501.308438][T29676] __alloc_pages+0x102/0x330 [ 501.313097][T29676] alloc_pages_vma+0x67e/0x810 [ 501.317881][T29676] ? PageHuge+0x59/0xc0 [ 501.322066][T29676] new_page+0x121/0x170 [ 501.326294][T29676] migrate_pages+0x465/0x1810 18:39:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x36, 0x0, 0x6, 0x10000000002) [ 501.330980][T29676] ? do_mbind+0x760/0x760 [ 501.335310][T29676] ? remove_migration_ptes+0x90/0x90 [ 501.340675][T29676] do_mbind+0x5b7/0x760 [ 501.344871][T29676] __se_sys_mbind+0x151/0x410 [ 501.349620][T29676] __x64_sys_mbind+0x74/0x80 [ 501.354209][T29676] do_syscall_64+0x44/0xd0 [ 501.358682][T29676] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 501.364578][T29676] RIP: 0033:0x7f7e86279059 [ 501.368993][T29676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 501.388663][T29676] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 501.397077][T29676] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 501.405045][T29676] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 501.413019][T29676] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 501.420994][T29676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:39:05 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1d, 0x0, 0x0, 0x10000000002) [ 501.428965][T29676] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 501.436933][T29676] [ 501.449920][T29684] FAULT_INJECTION: forcing a failure. [ 501.449920][T29684] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 501.463242][T29684] CPU: 1 PID: 29684 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 18:39:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000006000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 14) [ 501.474269][T29684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.484327][T29684] Call Trace: [ 501.487656][T29684] [ 501.490615][T29684] dump_stack_lvl+0xd6/0x122 [ 501.495297][T29684] dump_stack+0x11/0x1b [ 501.499470][T29684] should_fail+0x23c/0x250 [ 501.503891][T29684] __alloc_pages+0x102/0x330 [ 501.508481][T29684] alloc_pages_vma+0x67e/0x810 [ 501.513359][T29684] new_page+0x121/0x170 [ 501.517519][T29684] migrate_pages+0x465/0x1810 [ 501.522349][T29684] ? do_mbind+0x760/0x760 [ 501.526731][T29684] ? remove_migration_ptes+0x90/0x90 [ 501.532071][T29684] do_mbind+0x5b7/0x760 [ 501.536256][T29684] __se_sys_mbind+0x151/0x410 [ 501.540955][T29684] __x64_sys_mbind+0x74/0x80 [ 501.545606][T29684] do_syscall_64+0x44/0xd0 [ 501.550028][T29684] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 501.555972][T29684] RIP: 0033:0x7fb80e59e059 [ 501.560430][T29684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 501.580156][T29684] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 501.588567][T29684] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 501.596541][T29684] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 501.604513][T29684] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 501.612517][T29684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 501.620985][T29684] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 501.628964][T29684] 18:39:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 85) [ 501.654036][T29693] FAULT_INJECTION: forcing a failure. [ 501.654036][T29693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 501.667383][T29693] CPU: 1 PID: 29693 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 501.678409][T29693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.688512][T29693] Call Trace: [ 501.691879][T29693] [ 501.694805][T29693] dump_stack_lvl+0xd6/0x122 [ 501.699552][T29693] dump_stack+0x11/0x1b [ 501.703728][T29693] should_fail+0x23c/0x250 [ 501.708144][T29693] __alloc_pages+0x102/0x330 [ 501.712733][T29693] alloc_pages_vma+0x67e/0x810 [ 501.717514][T29693] ? PageHuge+0x59/0xc0 [ 501.721678][T29693] new_page+0x121/0x170 [ 501.725828][T29693] migrate_pages+0x465/0x1810 [ 501.730513][T29693] ? do_mbind+0x760/0x760 [ 501.734848][T29693] ? remove_migration_ptes+0x90/0x90 [ 501.740154][T29693] do_mbind+0x5b7/0x760 [ 501.744310][T29693] __se_sys_mbind+0x151/0x410 [ 501.749036][T29693] __x64_sys_mbind+0x74/0x80 [ 501.753621][T29693] do_syscall_64+0x44/0xd0 [ 501.758053][T29693] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 501.763946][T29693] RIP: 0033:0x7f7e86279059 [ 501.768426][T29693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 501.788032][T29693] RSP: 002b:00007f7e853ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 501.796448][T29693] RAX: ffffffffffffffda RBX: 00007f7e8638c100 RCX: 00007f7e86279059 [ 501.804431][T29693] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 501.812425][T29693] RBP: 00007f7e853ad1d0 R08: 0000000000000000 R09: 0000010000000002 [ 501.820486][T29693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 501.828485][T29693] R13: 00007ffc19a6cfdf R14: 00007f7e853ad300 R15: 0000000000022000 [ 501.836457][T29693] [ 501.855626][T29704] loop5: detected capacity change from 0 to 264192 [ 501.865873][T29695] loop4: detected capacity change from 0 to 264192 [ 501.867224][T29697] FAULT_INJECTION: forcing a failure. [ 501.867224][T29697] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 501.885598][T29697] CPU: 0 PID: 29697 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 501.896611][T29697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.906659][T29697] Call Trace: [ 501.909935][T29697] [ 501.912857][T29697] dump_stack_lvl+0xd6/0x122 [ 501.917505][T29697] dump_stack+0x11/0x1b [ 501.921703][T29697] should_fail+0x23c/0x250 [ 501.926121][T29697] __alloc_pages+0x102/0x330 [ 501.930713][T29697] alloc_pages_vma+0x67e/0x810 [ 501.935553][T29697] new_page+0x121/0x170 [ 501.939718][T29697] migrate_pages+0x465/0x1810 [ 501.944453][T29697] ? do_mbind+0x760/0x760 [ 501.948782][T29697] ? remove_migration_ptes+0x90/0x90 [ 501.954086][T29697] do_mbind+0x5b7/0x760 [ 501.958258][T29697] __se_sys_mbind+0x151/0x410 [ 501.962942][T29697] __x64_sys_mbind+0x74/0x80 [ 501.967529][T29697] do_syscall_64+0x44/0xd0 [ 501.972061][T29697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 501.977958][T29697] RIP: 0033:0x7fb80e59e059 [ 501.982381][T29697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:39:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x37, 0x0, 0x6, 0x10000000002) 18:39:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 15) [ 502.002052][T29697] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 502.010466][T29697] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 502.018527][T29697] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 502.026595][T29697] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 502.034718][T29697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 502.042697][T29697] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 502.050757][T29697] 18:39:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000007000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 86) [ 502.088082][T29707] FAULT_INJECTION: forcing a failure. [ 502.088082][T29707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 502.101449][T29707] CPU: 1 PID: 29707 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 502.112470][T29707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.121548][ T1913] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 502.122527][T29707] Call Trace: 18:39:05 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1e, 0x0, 0x0, 0x10000000002) [ 502.122534][T29707] [ 502.122541][T29707] dump_stack_lvl+0xd6/0x122 [ 502.143509][T29707] dump_stack+0x11/0x1b [ 502.147667][T29707] should_fail+0x23c/0x250 [ 502.152286][T29707] __alloc_pages+0x102/0x330 [ 502.156869][T29707] alloc_pages_vma+0x67e/0x810 [ 502.161663][T29707] ? PageHuge+0x59/0xc0 [ 502.165827][T29707] new_page+0x121/0x170 [ 502.169989][T29707] migrate_pages+0x465/0x1810 [ 502.170469][T29713] loop4: detected capacity change from 0 to 264192 [ 502.174673][T29707] ? do_mbind+0x760/0x760 [ 502.174698][T29707] ? remove_migration_ptes+0x90/0x90 [ 502.190806][T29707] do_mbind+0x5b7/0x760 [ 502.194972][T29707] __se_sys_mbind+0x151/0x410 [ 502.199713][T29707] __x64_sys_mbind+0x74/0x80 [ 502.204311][T29707] do_syscall_64+0x44/0xd0 [ 502.208772][T29707] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 502.214668][T29707] RIP: 0033:0x7f7e86279059 [ 502.219160][T29707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:39:05 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x21, 0x0, 0x0, 0x10000000002) [ 502.238790][T29707] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 502.247207][T29707] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 502.255590][T29707] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 502.263566][T29707] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 502.271637][T29707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 502.279695][T29707] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 18:39:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 502.287670][T29707] 18:39:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 16) [ 502.331914][T29716] loop5: detected capacity change from 0 to 264192 [ 502.354848][T29711] FAULT_INJECTION: forcing a failure. [ 502.354848][T29711] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 502.368116][T29711] CPU: 1 PID: 29711 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 502.379225][T29711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.389281][T29711] Call Trace: [ 502.392556][T29711] [ 502.395486][T29711] dump_stack_lvl+0xd6/0x122 [ 502.400102][T29711] dump_stack+0x11/0x1b [ 502.404314][T29711] should_fail+0x23c/0x250 [ 502.408915][T29711] __alloc_pages+0x102/0x330 [ 502.413658][T29711] alloc_pages_vma+0x67e/0x810 [ 502.418476][T29711] new_page+0x121/0x170 [ 502.422632][T29711] migrate_pages+0x465/0x1810 [ 502.427331][T29711] ? do_mbind+0x760/0x760 18:39:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000008000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:06 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x38, 0x0, 0x6, 0x10000000002) [ 502.431738][T29711] ? remove_migration_ptes+0x90/0x90 [ 502.437032][T29711] do_mbind+0x5b7/0x760 [ 502.441189][T29711] __se_sys_mbind+0x151/0x410 [ 502.445867][T29711] __x64_sys_mbind+0x74/0x80 [ 502.450459][T29711] do_syscall_64+0x44/0xd0 [ 502.454874][T29711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 502.460793][T29711] RIP: 0033:0x7fb80e59e059 [ 502.465202][T29711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 502.484807][T29711] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 502.493216][T29711] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 502.501265][T29711] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 502.509233][T29711] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 502.517306][T29711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:39:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 502.525366][T29711] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 502.533350][T29711] [ 502.555972][T29724] FAULT_INJECTION: forcing a failure. [ 502.555972][T29724] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 502.569212][T29724] CPU: 1 PID: 29724 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 502.580362][T29724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.590422][T29724] Call Trace: [ 502.593838][T29724] [ 502.596755][T29724] dump_stack_lvl+0xd6/0x122 [ 502.601358][T29724] dump_stack+0x11/0x1b 18:39:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 87) [ 502.605595][T29724] should_fail+0x23c/0x250 [ 502.610027][T29724] __alloc_pages+0x102/0x330 [ 502.614662][T29724] alloc_pages_vma+0x67e/0x810 [ 502.619429][T29724] ? PageHuge+0x59/0xc0 [ 502.623595][T29724] new_page+0x121/0x170 [ 502.627765][T29724] migrate_pages+0x465/0x1810 [ 502.632451][T29724] ? do_mbind+0x760/0x760 [ 502.636875][T29724] ? remove_migration_ptes+0x90/0x90 [ 502.642242][T29724] do_mbind+0x5b7/0x760 [ 502.646431][T29724] __se_sys_mbind+0x151/0x410 [ 502.651398][T29724] __x64_sys_mbind+0x74/0x80 [ 502.655996][T29724] do_syscall_64+0x44/0xd0 [ 502.660408][T29724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 502.666378][T29724] RIP: 0033:0x7f7e86279059 [ 502.670788][T29724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 502.690656][T29724] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000009000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 502.699065][T29724] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 502.707031][T29724] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 502.715112][T29724] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 502.723131][T29724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 502.731172][T29724] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 502.739237][T29724] [ 502.747944][T29733] loop4: detected capacity change from 0 to 264192 [ 502.802349][T29732] FAULT_INJECTION: forcing a failure. [ 502.802349][T29732] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 502.815634][T29732] CPU: 1 PID: 29732 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 502.826658][T29732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.832900][T29737] loop5: detected capacity change from 0 to 264192 [ 502.836728][T29732] Call Trace: [ 502.836739][T29732] [ 502.836746][T29732] dump_stack_lvl+0xd6/0x122 [ 502.854077][T29732] dump_stack+0x11/0x1b [ 502.858282][T29732] should_fail+0x23c/0x250 [ 502.862777][T29732] __alloc_pages+0x102/0x330 [ 502.867758][T29732] alloc_pages_vma+0x67e/0x810 [ 502.872529][T29732] new_page+0x121/0x170 [ 502.876735][T29732] migrate_pages+0x465/0x1810 [ 502.881472][T29732] ? do_mbind+0x760/0x760 [ 502.885843][T29732] ? remove_migration_ptes+0x90/0x90 [ 502.891140][T29732] do_mbind+0x5b7/0x760 [ 502.895304][T29732] __se_sys_mbind+0x151/0x410 [ 502.900038][T29732] __x64_sys_mbind+0x74/0x80 [ 502.904662][T29732] do_syscall_64+0x44/0xd0 [ 502.909153][T29732] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 502.915102][T29732] RIP: 0033:0x7fb80e59e059 [ 502.919508][T29732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 502.939125][T29732] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:06 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x39, 0x0, 0x6, 0x10000000002) 18:39:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 17) [ 502.947604][T29732] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059 [ 502.955654][T29732] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 502.963626][T29732] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002 [ 502.971659][T29732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 502.979664][T29732] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000 [ 502.987642][T29732] 18:39:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000a000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:06 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x22, 0x0, 0x0, 0x10000000002) 18:39:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000b000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 503.111693][T29749] loop5: detected capacity change from 0 to 264192 [ 503.125938][T29742] FAULT_INJECTION: forcing a failure. [ 503.125938][T29742] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.139212][T29742] CPU: 1 PID: 29742 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 503.150671][T29742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:39:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 88) [ 503.160728][T29742] Call Trace: [ 503.164005][T29742] [ 503.166949][T29742] dump_stack_lvl+0xd6/0x122 [ 503.171553][T29742] dump_stack+0x11/0x1b [ 503.175763][T29742] should_fail+0x23c/0x250 [ 503.180178][T29742] __alloc_pages+0x102/0x330 [ 503.184770][T29742] alloc_pages_vma+0x67e/0x810 [ 503.189537][T29742] ? PageHuge+0x59/0xc0 [ 503.193712][T29742] new_page+0x121/0x170 [ 503.197914][T29742] migrate_pages+0x465/0x1810 [ 503.202679][T29742] ? do_mbind+0x760/0x760 [ 503.207067][T29742] ? remove_migration_ptes+0x90/0x90 [ 503.212430][T29742] do_mbind+0x5b7/0x760 [ 503.216592][T29742] __se_sys_mbind+0x151/0x410 [ 503.221276][T29742] __x64_sys_mbind+0x74/0x80 [ 503.225898][T29742] do_syscall_64+0x44/0xd0 [ 503.230309][T29742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 503.236203][T29742] RIP: 0033:0x7f7e86279059 [ 503.240635][T29742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 503.260241][T29742] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 503.268657][T29742] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 503.276683][T29742] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 503.284666][T29742] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 503.292677][T29742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.300642][T29742] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 503.308615][T29742] [ 503.317640][T29756] loop4: detected capacity change from 0 to 264192 [ 503.329182][T29754] FAULT_INJECTION: forcing a failure. [ 503.329182][T29754] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.342517][T29754] CPU: 0 PID: 29754 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 503.353617][T29754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.363713][T29754] Call Trace: 18:39:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 18) 18:39:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3a, 0x0, 0x6, 0x10000000002) [ 503.366987][T29754] [ 503.369907][T29754] dump_stack_lvl+0xd6/0x122 [ 503.374577][T29754] dump_stack+0x11/0x1b [ 503.378794][T29754] should_fail+0x23c/0x250 [ 503.383237][T29754] __alloc_pages+0x102/0x330 [ 503.387876][T29754] alloc_pages_vma+0x67e/0x810 [ 503.392641][T29754] new_page+0x121/0x170 [ 503.396816][T29754] migrate_pages+0x465/0x1810 [ 503.401500][T29754] ? do_mbind+0x760/0x760 [ 503.405907][T29754] ? remove_migration_ptes+0x90/0x90 [ 503.411200][T29754] do_mbind+0x5b7/0x760 18:39:07 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x23, 0x0, 0x0, 0x10000000002) [ 503.415380][T29754] __se_sys_mbind+0x151/0x410 [ 503.420142][T29754] __x64_sys_mbind+0x74/0x80 [ 503.424734][T29754] do_syscall_64+0x44/0xd0 [ 503.429154][T29754] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 503.435071][T29754] RIP: 0033:0x7fb80e59e059 [ 503.439478][T29754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 503.459131][T29754] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 503.467564][T29754] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 503.475535][T29754] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 503.483587][T29754] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 503.491557][T29754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.499528][T29754] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 503.507497][T29754] 18:39:07 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 89) [ 503.554795][T29759] FAULT_INJECTION: forcing a failure. [ 503.554795][T29759] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.568097][T29759] CPU: 0 PID: 29759 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 503.579119][T29759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.589170][T29759] Call Trace: [ 503.592443][T29759] [ 503.595367][T29759] dump_stack_lvl+0xd6/0x122 [ 503.599964][T29759] dump_stack+0x11/0x1b [ 503.604228][T29759] should_fail+0x23c/0x250 [ 503.608641][T29759] __alloc_pages+0x102/0x330 [ 503.613307][T29759] alloc_pages_vma+0x67e/0x810 [ 503.618137][T29759] ? PageHuge+0x59/0xc0 [ 503.622347][T29759] new_page+0x121/0x170 [ 503.626565][T29759] migrate_pages+0x465/0x1810 [ 503.631274][T29759] ? do_mbind+0x760/0x760 [ 503.635607][T29759] ? remove_migration_ptes+0x90/0x90 [ 503.640952][T29759] do_mbind+0x5b7/0x760 [ 503.645106][T29759] __se_sys_mbind+0x151/0x410 [ 503.649842][T29759] __x64_sys_mbind+0x74/0x80 [ 503.654429][T29759] do_syscall_64+0x44/0xd0 [ 503.658824][T29759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 503.664696][T29759] RIP: 0033:0x7f7e86279059 [ 503.669152][T29759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 503.688888][T29759] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 503.697282][T29759] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 503.705274][T29759] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 503.713239][T29759] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 503.721223][T29759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.729169][T29759] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 503.737122][T29759] [ 503.753538][T29764] FAULT_INJECTION: forcing a failure. [ 503.753538][T29764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.766900][T29764] CPU: 1 PID: 29764 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 503.777924][T29764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.787977][T29764] Call Trace: [ 503.791354][T29764] [ 503.794279][T29764] dump_stack_lvl+0xd6/0x122 [ 503.798905][T29764] dump_stack+0x11/0x1b [ 503.803119][T29764] should_fail+0x23c/0x250 [ 503.807609][T29764] __alloc_pages+0x102/0x330 [ 503.812206][T29764] alloc_pages_vma+0x67e/0x810 [ 503.817092][T29764] new_page+0x121/0x170 [ 503.821563][T29764] migrate_pages+0x465/0x1810 [ 503.826280][T29764] ? do_mbind+0x760/0x760 [ 503.830701][T29764] ? remove_migration_ptes+0x90/0x90 [ 503.836040][T29764] do_mbind+0x5b7/0x760 [ 503.840255][T29764] __se_sys_mbind+0x151/0x410 [ 503.844949][T29764] __x64_sys_mbind+0x74/0x80 [ 503.849600][T29764] do_syscall_64+0x44/0xd0 [ 503.854033][T29764] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 503.859930][T29764] RIP: 0033:0x7fb80e59e059 [ 503.864341][T29764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 503.883949][T29764] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 503.892375][T29764] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:39:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 19) [ 503.900451][T29764] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 503.908488][T29764] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 503.916456][T29764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.924464][T29764] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 503.932435][T29764] [ 503.965596][T29772] FAULT_INJECTION: forcing a failure. [ 503.965596][T29772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.978905][T29772] CPU: 0 PID: 29772 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 503.989946][T29772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.992686][T29776] loop4: detected capacity change from 0 to 264192 [ 503.999997][T29772] Call Trace: [ 504.000065][T29772] [ 504.006731][T29775] loop5: detected capacity change from 0 to 264192 [ 504.009872][T29772] dump_stack_lvl+0xd6/0x122 [ 504.009936][T29772] dump_stack+0x11/0x1b [ 504.028033][T29772] should_fail+0x23c/0x250 [ 504.032457][T29772] __alloc_pages+0x102/0x330 [ 504.037050][T29772] alloc_pages_vma+0x67e/0x810 [ 504.041817][T29772] ? PageHuge+0x59/0xc0 [ 504.045993][T29772] new_page+0x121/0x170 [ 504.050216][T29772] migrate_pages+0x465/0x1810 [ 504.054993][T29772] ? do_mbind+0x760/0x760 [ 504.059334][T29772] ? remove_migration_ptes+0x90/0x90 [ 504.064637][T29772] do_mbind+0x5b7/0x760 [ 504.068798][T29772] __se_sys_mbind+0x151/0x410 [ 504.073549][T29772] __x64_sys_mbind+0x74/0x80 [ 504.078143][T29772] do_syscall_64+0x44/0xd0 [ 504.082561][T29772] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 504.088495][T29772] RIP: 0033:0x7f7e86279059 [ 504.092905][T29772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:39:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000d000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:07 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 90) 18:39:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 504.112509][T29772] RSP: 002b:00007f7e853ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 504.121000][T29772] RAX: ffffffffffffffda RBX: 00007f7e8638c100 RCX: 00007f7e86279059 [ 504.128965][T29772] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 504.136929][T29772] RBP: 00007f7e853ad1d0 R08: 0000000000000000 R09: 0000010000000002 [ 504.144899][T29772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 504.153572][T29772] R13: 00007ffc19a6cfdf R14: 00007f7e853ad300 R15: 0000000000022000 [ 504.161551][T29772] 18:39:07 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x24, 0x0, 0x0, 0x10000000002) 18:39:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3b, 0x0, 0x6, 0x10000000002) 18:39:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 20) [ 504.257817][T29786] FAULT_INJECTION: forcing a failure. [ 504.257817][T29786] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 504.271251][T29786] CPU: 0 PID: 29786 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 504.282341][T29786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.292436][T29786] Call Trace: [ 504.295710][T29786] [ 504.298636][T29786] dump_stack_lvl+0xd6/0x122 [ 504.303235][T29786] dump_stack+0x11/0x1b [ 504.307426][T29786] should_fail+0x23c/0x250 [ 504.311842][T29786] __alloc_pages+0x102/0x330 [ 504.316431][T29786] alloc_pages_vma+0x67e/0x810 [ 504.321272][T29786] new_page+0x121/0x170 [ 504.325532][T29786] migrate_pages+0x465/0x1810 [ 504.330287][T29786] ? do_mbind+0x760/0x760 [ 504.334616][T29786] ? remove_migration_ptes+0x90/0x90 [ 504.339910][T29786] do_mbind+0x5b7/0x760 [ 504.344067][T29786] __se_sys_mbind+0x151/0x410 [ 504.348753][T29786] __x64_sys_mbind+0x74/0x80 [ 504.353371][T29786] do_syscall_64+0x44/0xd0 [ 504.357800][T29786] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 504.363811][T29786] RIP: 0033:0x7fb80e59e059 [ 504.368227][T29786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 504.387873][T29786] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 504.396276][T29786] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 504.404265][T29786] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 504.412221][T29786] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 504.420178][T29786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 504.428155][T29786] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 504.436127][T29786] [ 504.444618][T29791] FAULT_INJECTION: forcing a failure. [ 504.444618][T29791] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:39:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 91) [ 504.458234][T29791] CPU: 1 PID: 29791 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 504.469315][T29791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.479445][T29791] Call Trace: [ 504.482798][T29791] [ 504.485725][T29791] dump_stack_lvl+0xd6/0x122 [ 504.490321][T29791] dump_stack+0x11/0x1b [ 504.494493][T29791] should_fail+0x23c/0x250 [ 504.498938][T29791] __alloc_pages+0x102/0x330 [ 504.503591][T29791] alloc_pages_vma+0x67e/0x810 [ 504.508410][T29791] ? PageHuge+0x59/0xc0 [ 504.512606][T29791] new_page+0x121/0x170 [ 504.516877][T29791] migrate_pages+0x465/0x1810 [ 504.521640][T29791] ? do_mbind+0x760/0x760 [ 504.526030][T29791] ? remove_migration_ptes+0x90/0x90 [ 504.531335][T29791] do_mbind+0x5b7/0x760 [ 504.535494][T29791] __se_sys_mbind+0x151/0x410 [ 504.540262][T29791] __x64_sys_mbind+0x74/0x80 [ 504.544861][T29791] do_syscall_64+0x44/0xd0 [ 504.549777][T29791] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 504.555849][T29791] RIP: 0033:0x7f7e86279059 [ 504.560240][T29791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 504.580144][T29791] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 504.588559][T29791] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 504.596570][T29791] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 504.604643][T29791] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 504.612703][T29791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 504.620702][T29791] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 504.628666][T29791] [ 504.651241][T29799] loop4: detected capacity change from 0 to 264192 [ 504.653384][T29796] FAULT_INJECTION: forcing a failure. [ 504.653384][T29796] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 504.671320][T29796] CPU: 0 PID: 29796 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 504.682343][T29796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.692397][T29796] Call Trace: [ 504.692448][T29801] loop5: detected capacity change from 0 to 264192 [ 504.695670][T29796] [ 504.695679][T29796] dump_stack_lvl+0xd6/0x122 [ 504.709646][T29796] dump_stack+0x11/0x1b [ 504.714056][T29796] should_fail+0x23c/0x250 [ 504.718475][T29796] __alloc_pages+0x102/0x330 [ 504.723111][T29796] alloc_pages_vma+0x67e/0x810 [ 504.727914][T29796] new_page+0x121/0x170 [ 504.732073][T29796] migrate_pages+0x465/0x1810 [ 504.736760][T29796] ? do_mbind+0x760/0x760 [ 504.741094][T29796] ? remove_migration_ptes+0x90/0x90 [ 504.746440][T29796] do_mbind+0x5b7/0x760 [ 504.750631][T29796] __se_sys_mbind+0x151/0x410 [ 504.755315][T29796] __x64_sys_mbind+0x74/0x80 [ 504.759954][T29796] do_syscall_64+0x44/0xd0 [ 504.764368][T29796] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 504.770280][T29796] RIP: 0033:0x7fb80e59e059 [ 504.774692][T29796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 18:39:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 21) 18:39:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000f000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 504.794299][T29796] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 504.802719][T29796] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 504.810769][T29796] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 504.818743][T29796] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 504.826759][T29796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 504.834898][T29796] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 504.842946][T29796] 18:39:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:08 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x25, 0x0, 0x0, 0x10000000002) 18:39:08 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3c, 0x0, 0x6, 0x10000000002) 18:39:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 92) 18:39:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000010000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 504.962777][T29807] FAULT_INJECTION: forcing a failure. [ 504.962777][T29807] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 504.976117][T29807] CPU: 0 PID: 29807 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 504.987202][T29807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.997249][T29807] Call Trace: [ 505.000522][T29807] [ 505.003444][T29807] dump_stack_lvl+0xd6/0x122 [ 505.008038][T29807] dump_stack+0x11/0x1b 18:39:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000011000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 505.012232][T29807] should_fail+0x23c/0x250 [ 505.016649][T29807] __alloc_pages+0x102/0x330 [ 505.021297][T29807] alloc_pages_vma+0x67e/0x810 [ 505.026056][T29807] ? PageHuge+0x59/0xc0 [ 505.030300][T29807] new_page+0x121/0x170 [ 505.034540][T29807] migrate_pages+0x465/0x1810 [ 505.039272][T29807] ? do_mbind+0x760/0x760 [ 505.043606][T29807] ? remove_migration_ptes+0x90/0x90 [ 505.048993][T29807] do_mbind+0x5b7/0x760 [ 505.053266][T29807] __se_sys_mbind+0x151/0x410 [ 505.057926][T29807] __x64_sys_mbind+0x74/0x80 [ 505.062617][T29807] do_syscall_64+0x44/0xd0 [ 505.067021][T29807] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 505.072912][T29807] RIP: 0033:0x7f7e86279059 [ 505.077359][T29807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 505.097004][T29807] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 505.105433][T29807] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 505.113481][T29807] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 505.121436][T29807] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 505.129417][T29807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.137378][T29807] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 505.145430][T29807] [ 505.171567][T29816] FAULT_INJECTION: forcing a failure. [ 505.171567][T29816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 505.184893][T29816] CPU: 0 PID: 29816 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 505.195940][T29816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.205993][T29816] Call Trace: [ 505.209260][T29816] [ 505.212178][T29816] dump_stack_lvl+0xd6/0x122 [ 505.216794][T29816] dump_stack+0x11/0x1b [ 505.220950][T29816] should_fail+0x23c/0x250 [ 505.225355][T29816] __alloc_pages+0x102/0x330 [ 505.229932][T29816] alloc_pages_vma+0x67e/0x810 [ 505.234744][T29816] new_page+0x121/0x170 [ 505.238916][T29816] migrate_pages+0x465/0x1810 [ 505.243608][T29816] ? do_mbind+0x760/0x760 [ 505.247924][T29816] ? remove_migration_ptes+0x90/0x90 [ 505.253200][T29816] do_mbind+0x5b7/0x760 [ 505.257344][T29816] __se_sys_mbind+0x151/0x410 [ 505.262103][T29816] __x64_sys_mbind+0x74/0x80 [ 505.266693][T29816] do_syscall_64+0x44/0xd0 [ 505.271119][T29816] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 505.277085][T29816] RIP: 0033:0x7fb80e59e059 [ 505.281499][T29816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 505.301174][T29816] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 505.309690][T29816] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:39:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 22) [ 505.317731][T29816] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 505.325693][T29816] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 505.333658][T29816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.341620][T29816] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 505.349595][T29816] [ 505.360013][T29824] loop4: detected capacity change from 0 to 264192 18:39:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000012000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 505.366901][T29825] loop5: detected capacity change from 0 to 264192 18:39:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005bb0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:09 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 93) 18:39:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000014000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3d, 0x0, 0x6, 0x10000000002) [ 505.521138][T29830] FAULT_INJECTION: forcing a failure. [ 505.521138][T29830] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 505.534438][T29830] CPU: 0 PID: 29830 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 505.545456][T29830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.555519][T29830] Call Trace: [ 505.558818][T29830] [ 505.561744][T29830] dump_stack_lvl+0xd6/0x122 [ 505.566370][T29830] dump_stack+0x11/0x1b 18:39:09 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x26, 0x0, 0x0, 0x10000000002) 18:39:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000001000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 505.570526][T29830] should_fail+0x23c/0x250 [ 505.575005][T29830] __alloc_pages+0x102/0x330 [ 505.579593][T29830] alloc_pages_vma+0x67e/0x810 [ 505.584361][T29830] ? PageHuge+0x59/0xc0 [ 505.588517][T29830] new_page+0x121/0x170 [ 505.592670][T29830] migrate_pages+0x465/0x1810 [ 505.597357][T29830] ? do_mbind+0x760/0x760 [ 505.601744][T29830] ? remove_migration_ptes+0x90/0x90 [ 505.607033][T29830] do_mbind+0x5b7/0x760 [ 505.611239][T29830] __se_sys_mbind+0x151/0x410 [ 505.615932][T29830] __x64_sys_mbind+0x74/0x80 [ 505.620709][T29830] do_syscall_64+0x44/0xd0 [ 505.625176][T29830] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 505.631072][T29830] RIP: 0033:0x7f7e86279059 [ 505.635557][T29830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 505.655178][T29830] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 505.663618][T29830] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000016000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 23) [ 505.671586][T29830] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 505.679551][T29830] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 505.687602][T29830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.695568][T29830] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 505.703580][T29830] [ 505.754738][T29839] FAULT_INJECTION: forcing a failure. [ 505.754738][T29839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 505.759376][T29847] loop5: detected capacity change from 0 to 264192 [ 505.768084][T29839] CPU: 0 PID: 29839 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 505.785556][T29839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.795609][T29839] Call Trace: [ 505.798912][T29839] [ 505.801844][T29839] dump_stack_lvl+0xd6/0x122 [ 505.806444][T29839] dump_stack+0x11/0x1b [ 505.810628][T29839] should_fail+0x23c/0x250 [ 505.815050][T29839] __alloc_pages+0x102/0x330 [ 505.819642][T29839] alloc_pages_vma+0x67e/0x810 [ 505.824486][T29839] new_page+0x121/0x170 [ 505.828695][T29839] migrate_pages+0x465/0x1810 [ 505.833395][T29839] ? do_mbind+0x760/0x760 [ 505.837786][T29839] ? remove_migration_ptes+0x90/0x90 [ 505.843082][T29839] do_mbind+0x5b7/0x760 [ 505.847242][T29839] __se_sys_mbind+0x151/0x410 [ 505.851920][T29839] __x64_sys_mbind+0x74/0x80 [ 505.856511][T29839] do_syscall_64+0x44/0xd0 [ 505.860925][T29839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 505.866885][T29839] RIP: 0033:0x7fb80e59e059 [ 505.871291][T29839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 505.890896][T29839] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000002000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 505.899437][T29839] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 505.907403][T29839] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 505.915370][T29839] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 505.923418][T29839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.931465][T29839] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 505.939472][T29839] 18:39:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000018000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3e, 0x0, 0x6, 0x10000000002) [ 505.960066][T29850] loop4: detected capacity change from 0 to 264192 18:39:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000003000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 506.007636][T29852] FAULT_INJECTION: forcing a failure. [ 506.007636][T29852] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 506.020914][T29852] CPU: 0 PID: 29852 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 506.031996][T29852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.042052][T29852] Call Trace: [ 506.045329][T29852] [ 506.048251][T29852] dump_stack_lvl+0xd6/0x122 [ 506.052856][T29852] dump_stack+0x11/0x1b 18:39:09 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 94) [ 506.057044][T29852] should_fail+0x23c/0x250 [ 506.061461][T29852] __alloc_pages+0x102/0x330 [ 506.066052][T29852] alloc_pages_vma+0x67e/0x810 [ 506.070849][T29852] ? PageHuge+0x59/0xc0 [ 506.075081][T29852] new_page+0x121/0x170 [ 506.079233][T29852] migrate_pages+0x465/0x1810 [ 506.083909][T29852] ? do_mbind+0x760/0x760 [ 506.088237][T29852] ? remove_migration_ptes+0x90/0x90 [ 506.093606][T29852] do_mbind+0x5b7/0x760 [ 506.097867][T29852] __se_sys_mbind+0x151/0x410 [ 506.102561][T29852] __x64_sys_mbind+0x74/0x80 [ 506.107177][T29852] do_syscall_64+0x44/0xd0 [ 506.111650][T29852] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 506.117614][T29852] RIP: 0033:0x7f7e86279059 [ 506.122114][T29852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 506.141722][T29852] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 506.150138][T29852] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 18:39:09 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x27, 0x0, 0x0, 0x10000000002) 18:39:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000019000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 506.158110][T29852] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 506.166079][T29852] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 506.174075][T29852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.182585][T29852] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 506.190558][T29852] [ 506.224776][T29860] FAULT_INJECTION: forcing a failure. [ 506.224776][T29860] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 506.238075][T29860] CPU: 0 PID: 29860 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 506.249090][T29860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.256333][T29866] loop5: detected capacity change from 0 to 264192 [ 506.259182][T29860] Call Trace: [ 506.268953][T29860] [ 506.271877][T29860] dump_stack_lvl+0xd6/0x122 [ 506.276506][T29860] dump_stack+0x11/0x1b [ 506.280669][T29860] should_fail+0x23c/0x250 [ 506.285093][T29860] __alloc_pages+0x102/0x330 [ 506.289697][T29860] alloc_pages_vma+0x67e/0x810 [ 506.294467][T29860] new_page+0x121/0x170 [ 506.298683][T29860] migrate_pages+0x465/0x1810 [ 506.303368][T29860] ? do_mbind+0x760/0x760 [ 506.307719][T29860] ? remove_migration_ptes+0x90/0x90 [ 506.313062][T29860] do_mbind+0x5b7/0x760 [ 506.317217][T29860] __se_sys_mbind+0x151/0x410 18:39:10 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x41, 0x0, 0x6, 0x10000000002) [ 506.321897][T29860] __x64_sys_mbind+0x74/0x80 [ 506.326550][T29860] do_syscall_64+0x44/0xd0 [ 506.330995][T29860] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 506.336891][T29860] RIP: 0033:0x7fb80e59e059 [ 506.341332][T29860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 506.360938][T29860] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 24) 18:39:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 95) [ 506.369368][T29860] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 [ 506.377531][T29860] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 506.385547][T29860] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 506.393527][T29860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.401544][T29860] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 506.409516][T29860] 18:39:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000004000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000025000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 506.496286][T29873] loop4: detected capacity change from 0 to 264192 [ 506.510713][T29869] FAULT_INJECTION: forcing a failure. [ 506.510713][T29869] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 506.523987][T29869] CPU: 1 PID: 29869 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 506.535013][T29869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.545069][T29869] Call Trace: [ 506.548342][T29869] [ 506.551760][T29869] dump_stack_lvl+0xd6/0x122 [ 506.556356][T29869] dump_stack+0x11/0x1b [ 506.560564][T29869] should_fail+0x23c/0x250 [ 506.565038][T29869] __alloc_pages+0x102/0x330 [ 506.569625][T29869] alloc_pages_vma+0x67e/0x810 [ 506.574457][T29869] ? PageHuge+0x59/0xc0 [ 506.578617][T29869] new_page+0x121/0x170 [ 506.582834][T29869] migrate_pages+0x465/0x1810 [ 506.587515][T29869] ? do_mbind+0x760/0x760 18:39:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000005000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:10 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x28, 0x0, 0x0, 0x10000000002) [ 506.591852][T29869] ? remove_migration_ptes+0x90/0x90 [ 506.597217][T29869] do_mbind+0x5b7/0x760 [ 506.601378][T29869] __se_sys_mbind+0x151/0x410 [ 506.606058][T29869] __x64_sys_mbind+0x74/0x80 [ 506.610707][T29869] do_syscall_64+0x44/0xd0 [ 506.615189][T29869] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 506.621092][T29869] RIP: 0033:0x7f7e86279059 [ 506.625498][T29869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 506.645324][T29869] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 506.654058][T29869] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 506.662006][T29869] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 506.669960][T29869] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 506.677908][T29869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.685863][T29869] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 506.693829][T29869] [ 506.709398][T29878] FAULT_INJECTION: forcing a failure. [ 506.709398][T29878] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 506.722767][T29878] CPU: 0 PID: 29878 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 506.733786][T29878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.743835][T29878] Call Trace: [ 506.747102][T29878] [ 506.750029][T29878] dump_stack_lvl+0xd6/0x122 [ 506.754623][T29878] dump_stack+0x11/0x1b [ 506.758816][T29878] should_fail+0x23c/0x250 [ 506.763228][T29878] __alloc_pages+0x102/0x330 [ 506.767815][T29878] alloc_pages_vma+0x67e/0x810 [ 506.772598][T29878] new_page+0x121/0x170 [ 506.776742][T29878] migrate_pages+0x465/0x1810 [ 506.781418][T29878] ? do_mbind+0x760/0x760 [ 506.785796][T29878] ? remove_migration_ptes+0x90/0x90 [ 506.791086][T29878] do_mbind+0x5b7/0x760 [ 506.795323][T29878] __se_sys_mbind+0x151/0x410 [ 506.800045][T29878] __x64_sys_mbind+0x74/0x80 [ 506.804623][T29878] do_syscall_64+0x44/0xd0 [ 506.809092][T29878] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 506.814980][T29878] RIP: 0033:0x7fb80e59e059 [ 506.819378][T29878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 506.838981][T29878] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 506.847380][T29878] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059 18:39:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 25) 18:39:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000040000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 506.855402][T29878] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000 [ 506.863431][T29878] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002 [ 506.871403][T29878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.879405][T29878] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000 [ 506.887376][T29878] [ 506.896604][T29884] loop5: detected capacity change from 0 to 264192 18:39:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 96) 18:39:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000006000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000649000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 506.949466][T29890] loop4: detected capacity change from 0 to 264192 [ 507.011787][T29888] FAULT_INJECTION: forcing a failure. [ 507.011787][T29888] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 507.025091][T29888] CPU: 0 PID: 29888 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 507.036159][T29888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.046513][T29888] Call Trace: [ 507.049788][T29888] [ 507.052713][T29888] dump_stack_lvl+0xd6/0x122 [ 507.057315][T29888] dump_stack+0x11/0x1b [ 507.061481][T29888] should_fail+0x23c/0x250 [ 507.065960][T29888] __alloc_pages+0x102/0x330 [ 507.070573][T29888] alloc_pages_vma+0x67e/0x810 [ 507.075361][T29888] ? PageHuge+0x59/0xc0 [ 507.079518][T29888] new_page+0x121/0x170 [ 507.083667][T29888] migrate_pages+0x465/0x1810 [ 507.088340][T29888] ? do_mbind+0x760/0x760 [ 507.092677][T29888] ? remove_migration_ptes+0x90/0x90 [ 507.097964][T29888] do_mbind+0x5b7/0x760 [ 507.102169][T29888] __se_sys_mbind+0x151/0x410 [ 507.106840][T29888] __x64_sys_mbind+0x74/0x80 [ 507.111510][T29888] do_syscall_64+0x44/0xd0 [ 507.116026][T29888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 507.121908][T29888] RIP: 0033:0x7f7e86279059 [ 507.126304][T29888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 507.145894][T29888] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 507.154378][T29888] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:10 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x42, 0x0, 0x6, 0x10000000002) 18:39:10 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x29, 0x0, 0x0, 0x10000000002) 18:39:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 26) 18:39:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) [ 507.162360][T29888] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 507.170403][T29888] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 507.178365][T29888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 507.186327][T29888] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 507.194318][T29888] 18:39:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000007000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000005c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 507.319927][T29912] loop5: detected capacity change from 0 to 264192 [ 507.339021][T29904] FAULT_INJECTION: forcing a failure. [ 507.339021][T29904] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 507.352417][T29904] CPU: 0 PID: 29904 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 507.363462][T29904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.373519][T29904] Call Trace: [ 507.376796][T29904] [ 507.379727][T29904] dump_stack_lvl+0xd6/0x122 [ 507.383644][T29914] loop4: detected capacity change from 0 to 264192 [ 507.384327][T29904] dump_stack+0x11/0x1b [ 507.384356][T29904] should_fail+0x23c/0x250 [ 507.384376][T29904] __alloc_pages+0x102/0x330 [ 507.404025][T29904] alloc_pages_vma+0x67e/0x810 [ 507.408821][T29904] ? PageHuge+0x59/0xc0 [ 507.413011][T29904] new_page+0x121/0x170 [ 507.417205][T29904] migrate_pages+0x465/0x1810 [ 507.421894][T29904] ? do_mbind+0x760/0x760 [ 507.426375][T29904] ? remove_migration_ptes+0x90/0x90 [ 507.431696][T29904] do_mbind+0x5b7/0x760 [ 507.435860][T29904] __se_sys_mbind+0x151/0x410 [ 507.440554][T29904] __x64_sys_mbind+0x74/0x80 [ 507.445220][T29904] do_syscall_64+0x44/0xd0 [ 507.449637][T29904] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 507.455580][T29904] RIP: 0033:0x7f7e86279059 18:39:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000008000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:11 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2a, 0x0, 0x0, 0x10000000002) [ 507.459988][T29904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 507.479630][T29904] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 507.488045][T29904] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 507.496183][T29904] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 507.504183][T29904] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 507.512249][T29904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:39:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000060000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 507.520223][T29904] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 507.528209][T29904] 18:39:11 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x43, 0x0, 0x6, 0x10000000002) 18:39:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 27) 18:39:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000009000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2, 0x0, 0x0, 0x10000000002) 18:39:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000a000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 507.665240][T29929] loop4: detected capacity change from 0 to 264192 [ 507.685880][T29921] FAULT_INJECTION: forcing a failure. [ 507.685880][T29921] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 507.699180][T29921] CPU: 0 PID: 29921 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 507.710202][T29921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.720330][T29921] Call Trace: [ 507.723610][T29921] [ 507.726532][T29921] dump_stack_lvl+0xd6/0x122 [ 507.731223][T29921] dump_stack+0x11/0x1b [ 507.735417][T29921] should_fail+0x23c/0x250 [ 507.739823][T29921] __alloc_pages+0x102/0x330 [ 507.744417][T29921] alloc_pages_vma+0x67e/0x810 [ 507.749176][T29921] ? PageHuge+0x59/0xc0 [ 507.753374][T29921] new_page+0x121/0x170 [ 507.757517][T29921] migrate_pages+0x465/0x1810 [ 507.762281][T29921] ? do_mbind+0x760/0x760 [ 507.766620][T29921] ? remove_migration_ptes+0x90/0x90 [ 507.771935][T29921] do_mbind+0x5b7/0x760 [ 507.776084][T29921] __se_sys_mbind+0x151/0x410 [ 507.780770][T29921] __x64_sys_mbind+0x74/0x80 [ 507.785360][T29921] do_syscall_64+0x44/0xd0 [ 507.789764][T29921] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 507.795770][T29921] RIP: 0033:0x7f7e86279059 [ 507.800189][T29921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 507.819791][T29921] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 507.828188][T29921] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 507.836145][T29921] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 507.844110][T29921] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 507.852184][T29921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:39:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffff9e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 507.860215][T29921] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 507.868223][T29921] 18:39:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 28) 18:39:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x0, 0x10000000002) 18:39:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000b000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 507.936734][T29941] loop5: detected capacity change from 0 to 264192 18:39:11 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2b, 0x0, 0x0, 0x10000000002) 18:39:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffffef000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:11 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x44, 0x0, 0x6, 0x10000000002) 18:39:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x7, 0x0, 0x0, 0x10000000002) [ 508.041200][T29943] FAULT_INJECTION: forcing a failure. [ 508.041200][T29943] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.054874][T29943] CPU: 0 PID: 29943 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 508.065938][T29943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.075989][T29943] Call Trace: [ 508.079261][T29943] [ 508.082255][T29943] dump_stack_lvl+0xd6/0x122 [ 508.086910][T29943] dump_stack+0x11/0x1b [ 508.091081][T29943] should_fail+0x23c/0x250 [ 508.095502][T29943] __alloc_pages+0x102/0x330 [ 508.100088][T29943] alloc_pages_vma+0x67e/0x810 [ 508.104958][T29943] ? PageHuge+0x59/0xc0 [ 508.109114][T29943] new_page+0x121/0x170 [ 508.113306][T29943] migrate_pages+0x465/0x1810 [ 508.117995][T29943] ? do_mbind+0x760/0x760 [ 508.122373][T29943] ? remove_migration_ptes+0x90/0x90 [ 508.127670][T29943] do_mbind+0x5b7/0x760 [ 508.131890][T29943] __se_sys_mbind+0x151/0x410 [ 508.136607][T29943] __x64_sys_mbind+0x74/0x80 18:39:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x8, 0x0, 0x0, 0x10000000002) [ 508.141193][T29943] do_syscall_64+0x44/0xd0 [ 508.145636][T29943] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 508.152065][T29943] RIP: 0033:0x7f7e86279059 [ 508.156475][T29943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 508.176211][T29943] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff0000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 29) [ 508.184645][T29943] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 508.192620][T29943] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 508.200595][T29943] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 508.208576][T29943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 508.216643][T29943] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 508.224615][T29943] 18:39:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000d000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff5000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xc, 0x0, 0x0, 0x10000000002) [ 508.286612][T29960] loop4: detected capacity change from 0 to 264192 [ 508.343585][T29966] loop5: detected capacity change from 0 to 264192 [ 508.385075][T29967] FAULT_INJECTION: forcing a failure. [ 508.385075][T29967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.398331][T29967] CPU: 1 PID: 29967 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 508.409356][T29967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.419408][T29967] Call Trace: [ 508.422697][T29967] [ 508.425665][T29967] dump_stack_lvl+0xd6/0x122 [ 508.430306][T29967] dump_stack+0x11/0x1b [ 508.434595][T29967] should_fail+0x23c/0x250 [ 508.439086][T29967] __alloc_pages+0x102/0x330 [ 508.443675][T29967] alloc_pages_vma+0x67e/0x810 [ 508.448609][T29967] ? PageHuge+0x59/0xc0 [ 508.452799][T29967] new_page+0x121/0x170 [ 508.456953][T29967] migrate_pages+0x465/0x1810 [ 508.461707][T29967] ? do_mbind+0x760/0x760 [ 508.466117][T29967] ? remove_migration_ptes+0x90/0x90 [ 508.471476][T29967] do_mbind+0x5b7/0x760 [ 508.475635][T29967] __se_sys_mbind+0x151/0x410 [ 508.480358][T29967] __x64_sys_mbind+0x74/0x80 [ 508.484989][T29967] do_syscall_64+0x44/0xd0 [ 508.489453][T29967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 508.495424][T29967] RIP: 0033:0x7f7e86279059 [ 508.499848][T29967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 508.519540][T29967] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 508.527972][T29967] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 18:39:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 508.536024][T29967] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 508.543989][T29967] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 508.551955][T29967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 508.559925][T29967] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 508.567982][T29967] 18:39:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2c, 0x0, 0x0, 0x10000000002) 18:39:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffffe000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x45, 0x0, 0x6, 0x10000000002) 18:39:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 30) 18:39:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000f000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x12, 0x0, 0x0, 0x10000000002) 18:39:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007fffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000010000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 508.709036][T29985] loop5: detected capacity change from 0 to 264192 [ 508.725296][T29989] loop4: detected capacity change from 0 to 264192 [ 508.736218][T29982] FAULT_INJECTION: forcing a failure. [ 508.736218][T29982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.749527][T29982] CPU: 0 PID: 29982 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 508.760546][T29982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.770621][T29982] Call Trace: [ 508.773898][T29982] [ 508.776823][T29982] dump_stack_lvl+0xd6/0x122 [ 508.781443][T29982] dump_stack+0x11/0x1b [ 508.785600][T29982] should_fail+0x23c/0x250 [ 508.790018][T29982] __alloc_pages+0x102/0x330 [ 508.794665][T29982] alloc_pages_vma+0x67e/0x810 [ 508.799425][T29982] ? PageHuge+0x59/0xc0 [ 508.803587][T29982] new_page+0x121/0x170 [ 508.807803][T29982] migrate_pages+0x465/0x1810 [ 508.812486][T29982] ? do_mbind+0x760/0x760 [ 508.816813][T29982] ? remove_migration_ptes+0x90/0x90 [ 508.822102][T29982] do_mbind+0x5b7/0x760 [ 508.826341][T29982] __se_sys_mbind+0x151/0x410 [ 508.831026][T29982] __x64_sys_mbind+0x74/0x80 [ 508.835626][T29982] do_syscall_64+0x44/0xd0 [ 508.840048][T29982] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 508.845951][T29982] RIP: 0033:0x7f7e86279059 18:39:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x13, 0x0, 0x0, 0x10000000002) [ 508.850365][T29982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 508.869975][T29982] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 508.878390][T29982] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 508.886365][T29982] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 508.894357][T29982] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 18:39:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000009effffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x46, 0x0, 0x6, 0x10000000002) [ 508.902328][T29982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 508.910326][T29982] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 508.918352][T29982] 18:39:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 31) 18:39:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2d, 0x0, 0x0, 0x10000000002) 18:39:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000011000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x14, 0x0, 0x0, 0x10000000002) 18:39:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000efffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x47, 0x0, 0x6, 0x10000000002) [ 509.078741][T30016] loop5: detected capacity change from 0 to 264192 [ 509.081576][T30006] FAULT_INJECTION: forcing a failure. [ 509.081576][T30006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 509.098509][T30006] CPU: 1 PID: 30006 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 509.110056][T30006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.120106][T30006] Call Trace: [ 509.123375][T30006] [ 509.126316][T30006] dump_stack_lvl+0xd6/0x122 [ 509.130961][T30006] dump_stack+0x11/0x1b [ 509.135194][T30006] should_fail+0x23c/0x250 [ 509.139643][T30006] __alloc_pages+0x102/0x330 [ 509.144296][T30006] alloc_pages_vma+0x67e/0x810 [ 509.149088][T30006] ? PageHuge+0x59/0xc0 [ 509.153254][T30006] new_page+0x121/0x170 [ 509.157406][T30006] migrate_pages+0x465/0x1810 [ 509.162087][T30006] ? do_mbind+0x760/0x760 [ 509.166458][T30006] ? remove_migration_ptes+0x90/0x90 [ 509.171797][T30006] do_mbind+0x5b7/0x760 [ 509.175987][T30006] __se_sys_mbind+0x151/0x410 [ 509.180660][T30006] __x64_sys_mbind+0x74/0x80 [ 509.185250][T30006] do_syscall_64+0x44/0xd0 [ 509.190427][T30006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 509.196315][T30006] RIP: 0033:0x7f7e86279059 [ 509.200725][T30006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 509.220518][T30006] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000012000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f0ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 509.228951][T30006] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 509.236923][T30006] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 509.244899][T30006] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 509.252902][T30006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 509.260872][T30006] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 509.268915][T30006] 18:39:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x15, 0x0, 0x0, 0x10000000002) 18:39:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 32) 18:39:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000014000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 509.310350][T30022] loop4: detected capacity change from 0 to 264192 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f5ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x48, 0x0, 0x6, 0x10000000002) 18:39:13 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2e, 0x0, 0x0, 0x10000000002) 18:39:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000016000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 509.457108][T30027] FAULT_INJECTION: forcing a failure. [ 509.457108][T30027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 509.470405][T30027] CPU: 0 PID: 30027 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 509.481422][T30027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.491524][T30027] Call Trace: [ 509.494784][T30027] [ 509.497698][T30027] dump_stack_lvl+0xd6/0x122 [ 509.502282][T30027] dump_stack+0x11/0x1b [ 509.506509][T30027] should_fail+0x23c/0x250 [ 509.510913][T30027] __alloc_pages+0x102/0x330 [ 509.515551][T30027] alloc_pages_vma+0x67e/0x810 [ 509.520312][T30027] ? PageHuge+0x59/0xc0 [ 509.524507][T30027] new_page+0x121/0x170 [ 509.528648][T30027] migrate_pages+0x465/0x1810 [ 509.533342][T30027] ? do_mbind+0x760/0x760 [ 509.537661][T30027] ? remove_migration_ptes+0x90/0x90 [ 509.542960][T30027] do_mbind+0x5b7/0x760 [ 509.547102][T30027] __se_sys_mbind+0x151/0x410 [ 509.551832][T30027] __x64_sys_mbind+0x74/0x80 [ 509.556406][T30027] do_syscall_64+0x44/0xd0 [ 509.560866][T30027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 509.566821][T30027] RIP: 0033:0x7f7e86279059 [ 509.571230][T30027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 509.590970][T30027] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 509.599369][T30027] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x16, 0x0, 0x0, 0x10000000002) [ 509.607384][T30027] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 509.615374][T30027] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 509.623329][T30027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 509.631305][T30027] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 509.639301][T30027] 18:39:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 33) 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000feffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 509.691220][T30041] loop5: detected capacity change from 0 to 264192 [ 509.691244][T30039] loop4: detected capacity change from 0 to 264192 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x17, 0x0, 0x0, 0x10000000002) 18:39:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000018000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2f, 0x0, 0x0, 0x10000000002) 18:39:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x49, 0x0, 0x6, 0x10000000002) [ 509.807955][T30052] FAULT_INJECTION: forcing a failure. [ 509.807955][T30052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 509.821250][T30052] CPU: 0 PID: 30052 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 509.832287][T30052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.842461][T30052] Call Trace: [ 509.845732][T30052] [ 509.848651][T30052] dump_stack_lvl+0xd6/0x122 [ 509.853296][T30052] dump_stack+0x11/0x1b [ 509.857463][T30052] should_fail+0x23c/0x250 [ 509.861944][T30052] __alloc_pages+0x102/0x330 [ 509.866538][T30052] alloc_pages_vma+0x67e/0x810 [ 509.871307][T30052] ? PageHuge+0x59/0xc0 [ 509.875470][T30052] new_page+0x121/0x170 [ 509.879806][T30052] migrate_pages+0x465/0x1810 [ 509.884542][T30052] ? do_mbind+0x760/0x760 [ 509.888868][T30052] ? remove_migration_ptes+0x90/0x90 [ 509.894171][T30052] do_mbind+0x5b7/0x760 [ 509.898433][T30052] __se_sys_mbind+0x151/0x410 [ 509.903123][T30052] __x64_sys_mbind+0x74/0x80 [ 509.907710][T30052] do_syscall_64+0x44/0xd0 [ 509.912118][T30052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 509.918026][T30052] RIP: 0033:0x7f7e86279059 [ 509.922439][T30052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 509.942101][T30052] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 509.950564][T30052] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 18:39:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x18, 0x0, 0x0, 0x10000000002) [ 509.958530][T30052] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 509.966487][T30052] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 509.974486][T30052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 509.982548][T30052] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 509.990506][T30052] 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000010a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000019000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000020a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.019316][T30059] loop5: detected capacity change from 0 to 264192 [ 510.032785][T30060] loop4: detected capacity change from 0 to 264192 18:39:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000025000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 34) 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x19, 0x0, 0x0, 0x10000000002) 18:39:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4a, 0x0, 0x6, 0x10000000002) 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000040a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x30, 0x0, 0x0, 0x10000000002) 18:39:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000040000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.225232][T30083] loop5: detected capacity change from 0 to 264192 [ 510.246143][T30087] FAULT_INJECTION: forcing a failure. [ 510.246143][T30087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 510.259415][T30087] CPU: 1 PID: 30087 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 510.270437][T30087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.280487][T30087] Call Trace: [ 510.283754][T30087] [ 510.286671][T30087] dump_stack_lvl+0xd6/0x122 [ 510.291266][T30087] dump_stack+0x11/0x1b [ 510.295475][T30087] should_fail+0x23c/0x250 [ 510.299890][T30087] __alloc_pages+0x102/0x330 [ 510.304505][T30087] alloc_pages_vma+0x67e/0x810 [ 510.309255][T30087] ? PageHuge+0x59/0xc0 [ 510.313406][T30087] new_page+0x121/0x170 [ 510.317550][T30087] migrate_pages+0x465/0x1810 [ 510.322294][T30087] ? do_mbind+0x760/0x760 [ 510.326609][T30087] ? remove_migration_ptes+0x90/0x90 [ 510.331941][T30087] do_mbind+0x5b7/0x760 [ 510.336088][T30087] __se_sys_mbind+0x151/0x410 [ 510.340758][T30087] __x64_sys_mbind+0x74/0x80 [ 510.345338][T30087] do_syscall_64+0x44/0xd0 [ 510.349748][T30087] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 510.355672][T30087] RIP: 0033:0x7f7e86279059 [ 510.360086][T30087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 510.379787][T30087] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 510.388205][T30087] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 510.396208][T30087] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 510.404187][T30087] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 510.412145][T30087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a, 0x0, 0x0, 0x10000000002) 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.420153][T30087] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 510.428110][T30087] 18:39:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 35) 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000080a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000005c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.496683][T30099] loop4: detected capacity change from 0 to 264192 18:39:14 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x6a, 0x0, 0x6, 0x10000000002) 18:39:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000060000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.589864][T30100] FAULT_INJECTION: forcing a failure. [ 510.589864][T30100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 510.603198][T30100] CPU: 1 PID: 30100 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 510.614383][T30100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.624432][T30100] Call Trace: [ 510.627731][T30100] [ 510.630681][T30100] dump_stack_lvl+0xd6/0x122 [ 510.635341][T30100] dump_stack+0x11/0x1b 18:39:14 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x31, 0x0, 0x0, 0x10000000002) 18:39:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1b, 0x0, 0x0, 0x10000000002) 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.639495][T30100] should_fail+0x23c/0x250 [ 510.643934][T30100] __alloc_pages+0x102/0x330 [ 510.648599][T30100] alloc_pages_vma+0x67e/0x810 [ 510.653358][T30100] ? PageHuge+0x59/0xc0 [ 510.657522][T30100] new_page+0x121/0x170 [ 510.661681][T30100] migrate_pages+0x465/0x1810 [ 510.666463][T30100] ? do_mbind+0x760/0x760 [ 510.670791][T30100] ? remove_migration_ptes+0x90/0x90 [ 510.676120][T30100] do_mbind+0x5b7/0x760 [ 510.680305][T30100] __se_sys_mbind+0x151/0x410 [ 510.685097][T30100] __x64_sys_mbind+0x74/0x80 [ 510.689708][T30100] do_syscall_64+0x44/0xd0 [ 510.694128][T30100] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 510.700036][T30100] RIP: 0033:0x7f7e86279059 [ 510.704446][T30100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 510.724051][T30100] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 510.732519][T30100] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1c, 0x0, 0x0, 0x10000000002) 18:39:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 36) 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000d0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.740511][T30100] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 510.748567][T30100] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 510.756787][T30100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 510.764789][T30100] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 510.772856][T30100] 18:39:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 510.842054][T30130] loop5: detected capacity change from 0 to 264192 [ 510.894708][T30127] FAULT_INJECTION: forcing a failure. [ 510.894708][T30127] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 510.908074][T30127] CPU: 0 PID: 30127 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 510.919099][T30127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.929768][T30127] Call Trace: [ 510.933044][T30127] [ 510.935970][T30127] dump_stack_lvl+0xd6/0x122 [ 510.940629][T30127] dump_stack+0x11/0x1b 18:39:14 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x6b, 0x0, 0x6, 0x10000000002) 18:39:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1d, 0x0, 0x0, 0x10000000002) [ 510.944787][T30127] should_fail+0x23c/0x250 [ 510.949201][T30127] __alloc_pages+0x102/0x330 [ 510.953790][T30127] alloc_pages_vma+0x67e/0x810 [ 510.958585][T30127] ? PageHuge+0x59/0xc0 [ 510.962836][T30127] new_page+0x121/0x170 [ 510.966989][T30127] migrate_pages+0x465/0x1810 [ 510.971675][T30127] ? do_mbind+0x760/0x760 [ 510.976002][T30127] ? remove_migration_ptes+0x90/0x90 [ 510.981289][T30127] do_mbind+0x5b7/0x760 [ 510.985449][T30127] __se_sys_mbind+0x151/0x410 [ 510.990168][T30127] __x64_sys_mbind+0x74/0x80 [ 510.994796][T30127] do_syscall_64+0x44/0xd0 [ 510.999215][T30127] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.005121][T30127] RIP: 0033:0x7f7e86279059 [ 511.009531][T30127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 511.029254][T30127] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 511.037649][T30127] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 511.045620][T30127] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 511.053647][T30127] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 511.061735][T30127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 511.069707][T30127] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 511.077673][T30127] [ 511.106761][T30139] loop4: detected capacity change from 0 to 264192 [ 511.140595][ T2193] ================================================================== [ 511.148683][ T2193] BUG: KCSAN: data-race in __filemap_remove_folio / folio_mapping [ 511.156468][ T2193] [ 511.158764][ T2193] write to 0xffffea0004d580d8 of 8 bytes by task 30139 on cpu 0: [ 511.166718][ T2193] __filemap_remove_folio+0x1b7/0x2c0 [ 511.172088][ T2193] filemap_remove_folio+0x69/0x210 [ 511.177192][ T2193] truncate_inode_folio+0x14c/0x160 [ 511.182375][ T2193] truncate_inode_pages_range+0x6a2/0x8b0 [ 511.188135][ T2193] truncate_inode_pages+0x20/0x30 [ 511.193147][ T2193] set_blocksize+0x24e/0x270 [ 511.197715][ T2193] sb_set_blocksize+0x2c/0xa0 [ 511.202389][ T2193] fat_fill_super+0x135e/0x2af0 [ 511.207250][ T2193] msdos_fill_super+0x29/0x30 [ 511.212099][ T2193] mount_bdev+0x1e8/0x290 [ 511.216411][ T2193] msdos_mount+0x2d/0x40 [ 511.220631][ T2193] legacy_get_tree+0x70/0xc0 [ 511.225212][ T2193] vfs_get_tree+0x4a/0x1a0 [ 511.229669][ T2193] path_mount+0x11cf/0x1c40 [ 511.234149][ T2193] __se_sys_mount+0x24b/0x2f0 [ 511.238800][ T2193] __x64_sys_mount+0x63/0x70 [ 511.243377][ T2193] do_syscall_64+0x44/0xd0 [ 511.247768][ T2193] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.253640][ T2193] [ 511.255955][ T2193] read to 0xffffea0004d580d8 of 8 bytes by task 2193 on cpu 1: [ 511.263476][ T2193] folio_mapping+0x92/0x120 [ 511.267957][ T2193] __pagevec_lru_add_fn+0x81/0x380 [ 511.273047][ T2193] __pagevec_lru_add+0x1c3/0x270 [ 511.277960][ T2193] folio_add_lru+0x11a/0x160 [ 511.282525][ T2193] filemap_add_folio+0xf8/0x150 [ 511.287359][ T2193] page_cache_ra_unbounded+0x274/0x400 [ 511.292792][ T2193] force_page_cache_ra+0x1e6/0x220 [ 511.297880][ T2193] page_cache_sync_ra+0xcc/0xe0 [ 511.302707][ T2193] filemap_read+0x3ed/0x1430 [ 511.307275][ T2193] blkdev_read_iter+0x2cc/0x380 [ 511.312109][ T2193] vfs_read+0x66c/0x750 [ 511.316246][ T2193] ksys_read+0xd9/0x190 [ 511.320374][ T2193] __x64_sys_read+0x3e/0x50 [ 511.324860][ T2193] do_syscall_64+0x44/0xd0 [ 511.329249][ T2193] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.335126][ T2193] [ 511.337427][ T2193] value changed: 0xffff888101b93bf0 -> 0x0000000000000000 [ 511.344501][ T2193] [ 511.346797][ T2193] Reported by Kernel Concurrency Sanitizer on: [ 511.352927][ T2193] CPU: 1 PID: 2193 Comm: udevd Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 511.363056][ T2193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.373084][ T2193] ================================================================== 18:39:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x32, 0x0, 0x0, 0x10000000002) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1e, 0x0, 0x0, 0x10000000002) 18:39:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffff9e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 37) [ 511.406187][T30142] loop5: detected capacity change from 0 to 264192 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000100a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x500, 0x0, 0x6, 0x10000000002) 18:39:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000005bb000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000110a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 511.547571][T30156] loop4: detected capacity change from 0 to 264192 [ 511.552674][T30149] FAULT_INJECTION: forcing a failure. [ 511.552674][T30149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 511.567374][T30149] CPU: 1 PID: 30149 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 511.578402][T30149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.588454][T30149] Call Trace: [ 511.591722][T30149] [ 511.594708][T30149] dump_stack_lvl+0xd6/0x122 [ 511.599312][T30149] dump_stack+0x11/0x1b [ 511.603472][T30149] should_fail+0x23c/0x250 [ 511.607887][T30149] __alloc_pages+0x102/0x330 [ 511.612480][T30149] alloc_pages_vma+0x67e/0x810 [ 511.617245][T30149] ? PageHuge+0x59/0xc0 [ 511.621407][T30149] new_page+0x121/0x170 [ 511.625562][T30149] migrate_pages+0x465/0x1810 [ 511.630244][T30149] ? do_mbind+0x760/0x760 [ 511.634629][T30149] ? remove_migration_ptes+0x90/0x90 [ 511.639940][T30149] do_mbind+0x5b7/0x760 [ 511.644123][T30149] __se_sys_mbind+0x151/0x410 [ 511.648809][T30149] __x64_sys_mbind+0x74/0x80 [ 511.653426][T30149] do_syscall_64+0x44/0xd0 [ 511.657849][T30149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.663856][T30149] RIP: 0033:0x7f7e86279059 [ 511.668269][T30149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 511.688052][T30149] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x33, 0x0, 0x0, 0x10000000002) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000120a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000140a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x21, 0x0, 0x0, 0x10000000002) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000160a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000180a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 38) [ 511.696551][T30149] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 511.704523][T30149] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 511.712494][T30149] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 511.720526][T30149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 511.728495][T30149] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 511.736541][T30149] 18:39:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffffef000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000190a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 511.799839][T30175] loop5: detected capacity change from 0 to 264192 [ 511.865688][T30171] FAULT_INJECTION: forcing a failure. [ 511.865688][T30171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 511.878946][T30171] CPU: 0 PID: 30171 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 511.889974][T30171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.900029][T30171] Call Trace: [ 511.903312][T30171] [ 511.906236][T30171] dump_stack_lvl+0xd6/0x122 [ 511.910835][T30171] dump_stack+0x11/0x1b 18:39:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x600, 0x0, 0x6, 0x10000000002) 18:39:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x22, 0x0, 0x0, 0x10000000002) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000250a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 511.915027][T30171] should_fail+0x23c/0x250 [ 511.919453][T30171] __alloc_pages+0x102/0x330 [ 511.924054][T30171] alloc_pages_vma+0x67e/0x810 [ 511.928831][T30171] ? PageHuge+0x59/0xc0 [ 511.933041][T30171] new_page+0x121/0x170 [ 511.937239][T30171] migrate_pages+0x465/0x1810 [ 511.941895][T30182] loop4: detected capacity change from 0 to 264192 [ 511.941996][T30171] ? do_mbind+0x760/0x760 [ 511.952781][T30171] ? remove_migration_ptes+0x90/0x90 [ 511.958128][T30171] do_mbind+0x5b7/0x760 [ 511.962289][T30171] __se_sys_mbind+0x151/0x410 [ 511.967046][T30171] __x64_sys_mbind+0x74/0x80 [ 511.971641][T30171] do_syscall_64+0x44/0xd0 [ 511.976125][T30171] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.982127][T30171] RIP: 0033:0x7f7e86279059 [ 511.986624][T30171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 512.006247][T30171] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x34, 0x0, 0x0, 0x10000000002) 18:39:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff0000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000400a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 512.014728][T30171] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 512.022696][T30171] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 512.030731][T30171] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 512.038725][T30171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 512.046773][T30171] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 512.054745][T30171] 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000006490a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 39) 18:39:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff5000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x23, 0x0, 0x0, 0x10000000002) 18:39:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000005c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffffe000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 512.140358][T30197] loop4: detected capacity change from 0 to 264192 [ 512.166887][T30199] loop5: detected capacity change from 0 to 264192 18:39:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x700, 0x0, 0x6, 0x10000000002) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000600a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x35, 0x0, 0x0, 0x10000000002) 18:39:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007fffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x24, 0x0, 0x0, 0x10000000002) [ 512.315631][T30216] loop4: detected capacity change from 0 to 264192 [ 512.339083][T30210] FAULT_INJECTION: forcing a failure. [ 512.339083][T30210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 512.352391][T30210] CPU: 0 PID: 30210 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 512.363445][T30210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.373493][T30210] Call Trace: [ 512.376770][T30210] [ 512.379704][T30210] dump_stack_lvl+0xd6/0x122 [ 512.384361][T30210] dump_stack+0x11/0x1b [ 512.388590][T30210] should_fail+0x23c/0x250 [ 512.393087][T30210] __alloc_pages+0x102/0x330 [ 512.397676][T30210] alloc_pages_vma+0x67e/0x810 [ 512.402498][T30210] ? PageHuge+0x59/0xc0 [ 512.406714][T30210] new_page+0x121/0x170 [ 512.410873][T30210] migrate_pages+0x465/0x1810 [ 512.415598][T30210] ? do_mbind+0x760/0x760 [ 512.419941][T30210] ? remove_migration_ptes+0x90/0x90 [ 512.425277][T30210] do_mbind+0x5b7/0x760 [ 512.429468][T30210] __se_sys_mbind+0x151/0x410 [ 512.434147][T30210] __x64_sys_mbind+0x74/0x80 [ 512.438797][T30210] do_syscall_64+0x44/0xd0 [ 512.443210][T30210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 512.449121][T30210] RIP: 0033:0x7f7e86279059 18:39:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x25, 0x0, 0x0, 0x10000000002) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000007c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 512.453554][T30210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 512.473318][T30210] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 512.481774][T30210] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 512.489818][T30210] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 512.497790][T30210] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 512.505799][T30210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 512.513844][T30210] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 512.521836][T30210] 18:39:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 40) 18:39:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x26, 0x0, 0x0, 0x10000000002) 18:39:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000009effffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000800a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x36, 0x0, 0x0, 0x10000000002) [ 512.573620][T30232] loop5: detected capacity change from 0 to 264192 [ 512.673346][T30242] FAULT_INJECTION: forcing a failure. [ 512.673346][T30242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 512.686607][T30242] CPU: 1 PID: 30242 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 512.697640][T30242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.707697][T30242] Call Trace: [ 512.710973][T30242] [ 512.713902][T30242] dump_stack_lvl+0xd6/0x122 [ 512.718501][T30242] dump_stack+0x11/0x1b [ 512.722662][T30242] should_fail+0x23c/0x250 [ 512.727189][T30242] __alloc_pages+0x102/0x330 [ 512.731774][T30242] alloc_pages_vma+0x67e/0x810 [ 512.736538][T30242] ? PageHuge+0x59/0xc0 [ 512.740703][T30242] new_page+0x121/0x170 [ 512.744916][T30242] migrate_pages+0x465/0x1810 [ 512.749600][T30242] ? do_mbind+0x760/0x760 [ 512.753926][T30242] ? remove_migration_ptes+0x90/0x90 [ 512.759269][T30242] do_mbind+0x5b7/0x760 [ 512.763441][T30242] __se_sys_mbind+0x151/0x410 [ 512.768167][T30242] __x64_sys_mbind+0x74/0x80 [ 512.772760][T30242] do_syscall_64+0x44/0xd0 [ 512.777175][T30242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 512.783157][T30242] RIP: 0033:0x7f7e86279059 [ 512.787569][T30242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 512.807232][T30242] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 512.815728][T30242] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 18:39:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x900, 0x0, 0x6, 0x10000000002) 18:39:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000efffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffff9e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x27, 0x0, 0x0, 0x10000000002) 18:39:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x28, 0x0, 0x0, 0x10000000002) 18:39:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 41) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffef0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 512.823815][T30242] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 512.831812][T30242] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 512.839778][T30242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 512.847811][T30242] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 512.855812][T30242] 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff00a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f0ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x29, 0x0, 0x0, 0x10000000002) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff50a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 512.920671][T30260] loop4: detected capacity change from 0 to 264192 [ 512.963509][T30266] loop5: detected capacity change from 0 to 264192 [ 513.011507][T30259] FAULT_INJECTION: forcing a failure. [ 513.011507][T30259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 513.024844][T30259] CPU: 0 PID: 30259 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 513.035927][T30259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.046089][T30259] Call Trace: [ 513.049381][T30259] [ 513.052322][T30259] dump_stack_lvl+0xd6/0x122 [ 513.056985][T30259] dump_stack+0x11/0x1b [ 513.061224][T30259] should_fail+0x23c/0x250 [ 513.065720][T30259] __alloc_pages+0x102/0x330 [ 513.070313][T30259] alloc_pages_vma+0x67e/0x810 [ 513.075080][T30259] ? PageHuge+0x59/0xc0 [ 513.079295][T30259] new_page+0x121/0x170 [ 513.083464][T30259] migrate_pages+0x465/0x1810 [ 513.088148][T30259] ? do_mbind+0x760/0x760 [ 513.092486][T30259] ? remove_migration_ptes+0x90/0x90 [ 513.097778][T30259] do_mbind+0x5b7/0x760 [ 513.101942][T30259] __se_sys_mbind+0x151/0x410 [ 513.106720][T30259] __x64_sys_mbind+0x74/0x80 [ 513.111341][T30259] do_syscall_64+0x44/0xd0 [ 513.115766][T30259] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 513.121657][T30259] RIP: 0033:0x7f7e86279059 [ 513.126075][T30259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 513.145686][T30259] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 513.154122][T30259] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:16 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x37, 0x0, 0x0, 0x10000000002) [ 513.162095][T30259] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 513.170121][T30259] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 513.178097][T30259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 513.186095][T30259] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 513.194077][T30259] 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffffe0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xd00, 0x0, 0x6, 0x10000000002) 18:39:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f5ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2a, 0x0, 0x0, 0x10000000002) 18:39:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 42) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000007fffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000feffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 513.311590][T30287] loop4: detected capacity change from 0 to 264192 [ 513.340108][T30292] loop5: detected capacity change from 0 to 264192 [ 513.351827][T30280] FAULT_INJECTION: forcing a failure. [ 513.351827][T30280] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 513.365078][T30280] CPU: 1 PID: 30280 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 513.376321][T30280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.386374][T30280] Call Trace: [ 513.389705][T30280] [ 513.392628][T30280] dump_stack_lvl+0xd6/0x122 [ 513.397223][T30280] dump_stack+0x11/0x1b [ 513.401423][T30280] should_fail+0x23c/0x250 [ 513.405914][T30280] __alloc_pages+0x102/0x330 18:39:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xf00, 0x0, 0x6, 0x10000000002) [ 513.410521][T30280] alloc_pages_vma+0x67e/0x810 [ 513.415282][T30280] ? PageHuge+0x59/0xc0 [ 513.419444][T30280] new_page+0x121/0x170 [ 513.423657][T30280] migrate_pages+0x465/0x1810 [ 513.428343][T30280] ? do_mbind+0x760/0x760 [ 513.432796][T30280] ? remove_migration_ptes+0x90/0x90 [ 513.438081][T30280] do_mbind+0x5b7/0x760 [ 513.442310][T30280] __se_sys_mbind+0x151/0x410 [ 513.446991][T30280] __x64_sys_mbind+0x74/0x80 [ 513.451585][T30280] do_syscall_64+0x44/0xd0 [ 513.456004][T30280] entry_SYSCALL_64_after_hwframe+0x44/0xae 18:39:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2b, 0x0, 0x0, 0x10000000002) [ 513.461911][T30280] RIP: 0033:0x7f7e86279059 [ 513.466337][T30280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 513.485948][T30280] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 513.494366][T30280] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 513.502337][T30280] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 18:39:17 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x38, 0x0, 0x0, 0x10000000002) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 513.510313][T30280] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 513.518323][T30280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 513.526304][T30280] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 513.534281][T30280] 18:39:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000010a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 43) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000020a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2c, 0x0, 0x0, 0x10000000002) 18:39:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 513.621990][T30310] loop4: detected capacity change from 0 to 264192 [ 513.653639][T30306] loop5: detected capacity change from 0 to 264192 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000040a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 513.712549][T30313] FAULT_INJECTION: forcing a failure. [ 513.712549][T30313] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 513.725914][T30313] CPU: 1 PID: 30313 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 513.736943][T30313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.746994][T30313] Call Trace: [ 513.750270][T30313] [ 513.753199][T30313] dump_stack_lvl+0xd6/0x122 [ 513.757797][T30313] dump_stack+0x11/0x1b [ 513.761995][T30313] should_fail+0x23c/0x250 [ 513.766409][T30313] __alloc_pages+0x102/0x330 [ 513.770998][T30313] alloc_pages_vma+0x67e/0x810 [ 513.775821][T30313] ? PageHuge+0x59/0xc0 [ 513.780010][T30313] new_page+0x121/0x170 [ 513.784164][T30313] migrate_pages+0x465/0x1810 [ 513.788882][T30313] ? do_mbind+0x760/0x760 [ 513.793304][T30313] ? remove_migration_ptes+0x90/0x90 [ 513.798660][T30313] do_mbind+0x5b7/0x760 [ 513.802863][T30313] __se_sys_mbind+0x151/0x410 [ 513.807573][T30313] __x64_sys_mbind+0x74/0x80 [ 513.812160][T30313] do_syscall_64+0x44/0xd0 [ 513.816576][T30313] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 513.822492][T30313] RIP: 0033:0x7f7e86279059 [ 513.826920][T30313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 513.846612][T30313] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 513.855036][T30313] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1100, 0x0, 0x6, 0x10000000002) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2d, 0x0, 0x0, 0x10000000002) 18:39:17 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x39, 0x0, 0x0, 0x10000000002) 18:39:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 513.863005][T30313] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 513.871030][T30313] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 513.879058][T30313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 513.887080][T30313] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 513.895105][T30313] 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 44) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000080a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 514.039693][T30346] loop4: detected capacity change from 0 to 264192 [ 514.050971][T30342] loop5: detected capacity change from 0 to 264192 [ 514.103613][T30335] FAULT_INJECTION: forcing a failure. [ 514.103613][T30335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 514.116879][T30335] CPU: 1 PID: 30335 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 514.127901][T30335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.137958][T30335] Call Trace: [ 514.141301][T30335] [ 514.144230][T30335] dump_stack_lvl+0xd6/0x122 [ 514.148829][T30335] dump_stack+0x11/0x1b 18:39:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1200, 0x0, 0x6, 0x10000000002) 18:39:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2e, 0x0, 0x0, 0x10000000002) 18:39:17 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3a, 0x0, 0x0, 0x10000000002) [ 514.152991][T30335] should_fail+0x23c/0x250 [ 514.157407][T30335] __alloc_pages+0x102/0x330 [ 514.162069][T30335] alloc_pages_vma+0x67e/0x810 [ 514.166837][T30335] ? PageHuge+0x59/0xc0 [ 514.170998][T30335] new_page+0x121/0x170 [ 514.175164][T30335] migrate_pages+0x465/0x1810 [ 514.179879][T30335] ? do_mbind+0x760/0x760 [ 514.184225][T30335] ? remove_migration_ptes+0x90/0x90 [ 514.189591][T30335] do_mbind+0x5b7/0x760 [ 514.193756][T30335] __se_sys_mbind+0x151/0x410 [ 514.198574][T30335] __x64_sys_mbind+0x74/0x80 [ 514.203192][T30335] do_syscall_64+0x44/0xd0 [ 514.207613][T30335] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 514.213540][T30335] RIP: 0033:0x7f7e86279059 [ 514.217947][T30335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 514.237700][T30335] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 514.246121][T30335] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000080000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 45) [ 514.254103][T30335] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 514.262124][T30335] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 514.270096][T30335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 514.278062][T30335] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 514.286039][T30335] 18:39:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2f, 0x0, 0x0, 0x10000000002) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000d0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 514.359102][T30366] loop5: detected capacity change from 0 to 264192 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 514.449075][T30375] FAULT_INJECTION: forcing a failure. [ 514.449075][T30375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 514.462385][T30375] CPU: 0 PID: 30375 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 514.473416][T30375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.483574][T30375] Call Trace: [ 514.486848][T30375] [ 514.489716][T30378] loop4: detected capacity change from 0 to 264192 18:39:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1300, 0x0, 0x6, 0x10000000002) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 514.489766][T30375] dump_stack_lvl+0xd6/0x122 [ 514.500834][T30375] dump_stack+0x11/0x1b [ 514.504998][T30375] should_fail+0x23c/0x250 [ 514.509422][T30375] __alloc_pages+0x102/0x330 [ 514.514067][T30375] alloc_pages_vma+0x67e/0x810 [ 514.518833][T30375] ? PageHuge+0x59/0xc0 [ 514.523003][T30375] new_page+0x121/0x170 [ 514.527196][T30375] migrate_pages+0x465/0x1810 [ 514.531879][T30375] ? do_mbind+0x760/0x760 [ 514.536257][T30375] ? remove_migration_ptes+0x90/0x90 [ 514.541550][T30375] do_mbind+0x5b7/0x760 [ 514.545766][T30375] __se_sys_mbind+0x151/0x410 [ 514.550445][T30375] __x64_sys_mbind+0x74/0x80 [ 514.555039][T30375] do_syscall_64+0x44/0xd0 [ 514.559487][T30375] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 514.565389][T30375] RIP: 0033:0x7f7e86279059 [ 514.569809][T30375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 514.589573][T30375] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 514.598422][T30375] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 514.606407][T30375] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 514.614376][T30375] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 514.622338][T30375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 514.630558][T30375] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 514.638616][T30375] 18:39:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3b, 0x0, 0x0, 0x10000000002) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000100a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 46) 18:39:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x30, 0x0, 0x0, 0x10000000002) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000110a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000120a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 514.762102][T30399] loop5: detected capacity change from 0 to 264192 [ 514.766464][T30400] loop4: detected capacity change from 0 to 264192 [ 514.813632][T30394] FAULT_INJECTION: forcing a failure. [ 514.813632][T30394] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 514.826884][T30394] CPU: 0 PID: 30394 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 514.837909][T30394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.847960][T30394] Call Trace: [ 514.851272][T30394] [ 514.854214][T30394] dump_stack_lvl+0xd6/0x122 [ 514.858837][T30394] dump_stack+0x11/0x1b 18:39:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1400, 0x0, 0x6, 0x10000000002) [ 514.863037][T30394] should_fail+0x23c/0x250 [ 514.867506][T30394] __alloc_pages+0x102/0x330 [ 514.872170][T30394] alloc_pages_vma+0x67e/0x810 [ 514.876939][T30394] ? PageHuge+0x59/0xc0 [ 514.881100][T30394] new_page+0x121/0x170 [ 514.885445][T30394] migrate_pages+0x465/0x1810 [ 514.890194][T30394] ? do_mbind+0x760/0x760 [ 514.894525][T30394] ? remove_migration_ptes+0x90/0x90 [ 514.899995][T30394] do_mbind+0x5b7/0x760 [ 514.904238][T30394] __se_sys_mbind+0x151/0x410 [ 514.908919][T30394] __x64_sys_mbind+0x74/0x80 18:39:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x31, 0x0, 0x0, 0x10000000002) [ 514.913553][T30394] do_syscall_64+0x44/0xd0 [ 514.918070][T30394] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 514.924001][T30394] RIP: 0033:0x7f7e86279059 [ 514.928421][T30394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 514.948061][T30394] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 514.956480][T30394] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000140a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 514.964506][T30394] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 514.972524][T30394] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 514.980502][T30394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 514.988505][T30394] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 514.996521][T30394] 18:39:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3c, 0x0, 0x0, 0x10000000002) 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000160a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 47) 18:39:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x32, 0x0, 0x0, 0x10000000002) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000180a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000190a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 515.116220][T30428] loop5: detected capacity change from 0 to 264192 [ 515.150381][T30434] loop4: detected capacity change from 0 to 264192 [ 515.199684][T30425] FAULT_INJECTION: forcing a failure. [ 515.199684][T30425] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 515.212962][T30425] CPU: 1 PID: 30425 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 515.224088][T30425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.234150][T30425] Call Trace: [ 515.237421][T30425] [ 515.240388][T30425] dump_stack_lvl+0xd6/0x122 [ 515.245043][T30425] dump_stack+0x11/0x1b [ 515.249794][T30425] should_fail+0x23c/0x250 [ 515.254199][T30425] __alloc_pages+0x102/0x330 [ 515.258777][T30425] alloc_pages_vma+0x67e/0x810 [ 515.263572][T30425] ? PageHuge+0x59/0xc0 [ 515.267723][T30425] new_page+0x121/0x170 [ 515.271924][T30425] migrate_pages+0x465/0x1810 [ 515.276673][T30425] ? do_mbind+0x760/0x760 [ 515.281044][T30425] ? remove_migration_ptes+0x90/0x90 [ 515.286331][T30425] do_mbind+0x5b7/0x760 [ 515.290507][T30425] __se_sys_mbind+0x151/0x410 [ 515.295186][T30425] __x64_sys_mbind+0x74/0x80 [ 515.299766][T30425] do_syscall_64+0x44/0xd0 [ 515.304173][T30425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 515.310146][T30425] RIP: 0033:0x7f7e86279059 [ 515.314588][T30425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 515.334239][T30425] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000100000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1500, 0x0, 0x6, 0x10000000002) 18:39:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x33, 0x0, 0x0, 0x10000000002) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000250a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 515.342640][T30425] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 515.350639][T30425] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 515.358595][T30425] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 515.366550][T30425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 515.374504][T30425] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 515.382474][T30425] 18:39:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3d, 0x0, 0x0, 0x10000000002) 18:39:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 48) 18:39:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000400a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000005c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x34, 0x0, 0x0, 0x10000000002) 18:39:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000600a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 515.513087][T30457] loop5: detected capacity change from 0 to 264192 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000007c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 515.566331][T30463] loop4: detected capacity change from 0 to 264192 [ 515.578096][T30449] FAULT_INJECTION: forcing a failure. [ 515.578096][T30449] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 515.591469][T30449] CPU: 0 PID: 30449 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 515.602559][T30449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.612699][T30449] Call Trace: [ 515.616054][T30449] [ 515.618984][T30449] dump_stack_lvl+0xd6/0x122 [ 515.623585][T30449] dump_stack+0x11/0x1b [ 515.627865][T30449] should_fail+0x23c/0x250 [ 515.632318][T30449] __alloc_pages+0x102/0x330 [ 515.636934][T30449] alloc_pages_vma+0x67e/0x810 [ 515.641725][T30449] ? PageHuge+0x59/0xc0 [ 515.645895][T30449] new_page+0x121/0x170 [ 515.650103][T30449] migrate_pages+0x465/0x1810 [ 515.654795][T30449] ? do_mbind+0x760/0x760 [ 515.659175][T30449] ? remove_migration_ptes+0x90/0x90 [ 515.664512][T30449] do_mbind+0x5b7/0x760 [ 515.668680][T30449] __se_sys_mbind+0x151/0x410 [ 515.673356][T30449] __x64_sys_mbind+0x74/0x80 [ 515.677949][T30449] do_syscall_64+0x44/0xd0 [ 515.682362][T30449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 515.688264][T30449] RIP: 0033:0x7f7e86279059 [ 515.692678][T30449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 515.712292][T30449] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 515.720715][T30449] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059 [ 515.728691][T30449] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 515.736663][T30449] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002 [ 515.744690][T30449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 515.752665][T30449] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000 [ 515.760760][T30449] 18:39:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1600, 0x0, 0x6, 0x10000000002) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000800a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x35, 0x0, 0x0, 0x10000000002) 18:39:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3e, 0x0, 0x0, 0x10000000002) 18:39:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 49) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffff9e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000005bb0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 515.849827][T30481] loop4: detected capacity change from 0 to 264192 [ 515.881500][T30484] FAULT_INJECTION: forcing a failure. [ 515.881500][T30484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 515.894784][T30484] CPU: 0 PID: 30484 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 515.905808][T30484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.916021][T30484] Call Trace: [ 515.919309][T30484] [ 515.922254][T30484] dump_stack_lvl+0xd6/0x122 [ 515.926908][T30484] dump_stack+0x11/0x1b [ 515.931066][T30484] should_fail+0x23c/0x250 [ 515.935484][T30484] __alloc_pages+0x102/0x330 [ 515.940076][T30484] alloc_pages_vma+0x67e/0x810 [ 515.944848][T30484] new_page+0x121/0x170 18:39:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x41, 0x0, 0x0, 0x10000000002) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffef0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x36, 0x0, 0x0, 0x10000000002) [ 515.949080][T30484] migrate_pages+0x465/0x1810 [ 515.953823][T30484] ? do_mbind+0x760/0x760 [ 515.958171][T30484] ? remove_migration_ptes+0x90/0x90 [ 515.963554][T30484] do_mbind+0x5b7/0x760 [ 515.967844][T30484] __se_sys_mbind+0x151/0x410 [ 515.972605][T30484] __x64_sys_mbind+0x74/0x80 [ 515.977227][T30484] do_syscall_64+0x44/0xd0 [ 515.981699][T30484] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 515.987617][T30484] RIP: 0033:0x7f7e86279059 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff00a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 515.992038][T30484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 516.012534][T30484] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 516.021128][T30484] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 516.029214][T30484] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 516.037220][T30484] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 516.045564][T30484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 516.053543][T30484] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 516.061577][T30484] [ 516.090233][T30497] loop5: detected capacity change from 0 to 264192 18:39:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1700, 0x0, 0x6, 0x10000000002) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff50a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 50) 18:39:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x37, 0x0, 0x0, 0x10000000002) [ 516.141633][T30499] loop4: detected capacity change from 0 to 264192 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffffe0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000007fffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x42, 0x0, 0x0, 0x10000000002) [ 516.269110][T30514] FAULT_INJECTION: forcing a failure. [ 516.269110][T30514] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.282501][T30514] CPU: 1 PID: 30514 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 516.293549][T30514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.303647][T30514] Call Trace: [ 516.306954][T30514] [ 516.309891][T30514] dump_stack_lvl+0xd6/0x122 [ 516.314608][T30514] dump_stack+0x11/0x1b [ 516.318769][T30514] should_fail+0x23c/0x250 [ 516.323186][T30514] __alloc_pages+0x102/0x330 [ 516.327812][T30514] alloc_pages_vma+0x67e/0x810 [ 516.332581][T30514] ? PageHuge+0x59/0xc0 [ 516.336851][T30514] new_page+0x121/0x170 [ 516.341011][T30514] migrate_pages+0x465/0x1810 [ 516.345769][T30514] ? do_mbind+0x760/0x760 [ 516.348155][T30519] loop5: detected capacity change from 0 to 264192 [ 516.350126][T30514] ? remove_migration_ptes+0x90/0x90 [ 516.361908][T30514] do_mbind+0x5b7/0x760 [ 516.366104][T30514] __se_sys_mbind+0x151/0x410 [ 516.370847][T30514] __x64_sys_mbind+0x74/0x80 [ 516.375446][T30514] do_syscall_64+0x44/0xd0 [ 516.379867][T30514] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 516.385766][T30514] RIP: 0033:0x7f7e86279059 [ 516.390258][T30514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 516.409944][T30514] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x38, 0x0, 0x0, 0x10000000002) 18:39:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1800, 0x0, 0x6, 0x10000000002) [ 516.418388][T30514] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 516.426360][T30514] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 516.434345][T30514] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 516.442316][T30514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 516.450280][T30514] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 516.458308][T30514] 18:39:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 516.493034][T30525] loop4: detected capacity change from 0 to 264192 18:39:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 516.621751][T30535] loop5: detected capacity change from 0 to 264192 18:39:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 51) 18:39:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x39, 0x0, 0x0, 0x10000000002) 18:39:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:20 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x43, 0x0, 0x0, 0x10000000002) 18:39:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1900, 0x0, 0x6, 0x10000000002) 18:39:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 516.776470][T30544] loop4: detected capacity change from 0 to 264192 18:39:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3a, 0x0, 0x0, 0x10000000002) [ 516.847887][T30550] loop5: detected capacity change from 0 to 264192 [ 516.905130][T30548] FAULT_INJECTION: forcing a failure. [ 516.905130][T30548] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.918428][T30548] CPU: 0 PID: 30548 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0 [ 516.929533][T30548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.939587][T30548] Call Trace: [ 516.942866][T30548] [ 516.945800][T30548] dump_stack_lvl+0xd6/0x122 [ 516.950403][T30548] dump_stack+0x11/0x1b [ 516.954568][T30548] should_fail+0x23c/0x250 [ 516.959030][T30548] __alloc_pages+0x102/0x330 [ 516.963620][T30548] alloc_pages_vma+0x67e/0x810 [ 516.968386][T30548] ? PageHuge+0x59/0xc0 [ 516.972602][T30548] new_page+0x121/0x170 [ 516.976761][T30548] migrate_pages+0x465/0x1810 [ 516.981507][T30548] ? do_mbind+0x760/0x760 [ 516.985862][T30548] ? remove_migration_ptes+0x90/0x90 [ 516.991155][T30548] do_mbind+0x5b7/0x760 [ 516.995461][T30548] __se_sys_mbind+0x151/0x410 [ 517.000157][T30548] __x64_sys_mbind+0x74/0x80 18:39:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3b, 0x0, 0x0, 0x10000000002) [ 517.004853][T30548] do_syscall_64+0x44/0xd0 [ 517.009717][T30548] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 517.015649][T30548] RIP: 0033:0x7f7e86279059 [ 517.020318][T30548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 517.040206][T30548] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 18:39:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) [ 517.048730][T30548] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059 [ 517.056757][T30548] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000 [ 517.064733][T30548] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002 [ 517.072708][T30548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 517.080685][T30548] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000 [ 517.088665][T30548] 18:39:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 52) 18:39:21 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a00, 0x0, 0x6, 0x10000000002) 18:39:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0) 18:39:21 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x44, 0x0, 0x0, 0x10000000002) 18:39:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x3, &(0x7f00