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", 0x1000}], 0x8}}, {{&(0x7f0000004440)={0xa, 0x4e24, 0x6, @remote, 0x8001}, 0x1c, &(0x7f0000004580)=[{&(0x7f0000004480)="b344b987e96e8a6a38175460223d7800f920ed83739b71d043b247e29dba78", 0x1f}, {&(0x7f00000044c0)="43d3ad47434f3cd47e11ada6257c800b904f6a23da80ce0440b777fe8be3af26709ba71263a35bbe4d8961ac5880a4fb6db1e09d96dcc7961496780be3fd22c369ce688ff7d1a4f48d9ea2af121c5e9aa095c260e79b9c6bbec9ec3601c1f692693accd86b16e9ce6eefb4225026cd34aeeaa542dfd6d74d46360d6f1fecd410192066aaaa7a66f212632e91ebdf2b26f3cc5a4377af389db5e0914e9fab24b8c530176a323a0cf245a0911af8682f840ac96e391d", 0xb5}], 0x2}}, {{&(0x7f00000045c0)={0xa, 0x4e21, 0xffffffff, @empty, 0x6}, 0x1c, &(0x7f00000046c0)=[{&(0x7f0000004600)="f35d0237aedc9aa8aca89070882b5d9daeba684a0939d5f1fd956486360afb850c0dc09320c3e85618bb0b40c6bd1b3e414e0ec4a6d324ead907a0ac1d7eb4684db9e9e98b200970856edc84c9a798c588f71ec67ebd37c8a091470fff1fe49b0e4b52d6803b24b8f20dd13630c7f54375aeaafb907235dd818264f14dc4df31a6a10cb649f93f4c5475499c32508296bc", 0x91}], 0x1}}], 0x6, 0x8000)
socket$inet6(0xa, 0x3, 0x3) (async)
sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0xa2b}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="78000000000000002900000036000000670b0000000000000401010e7f22000200000000000000010000000900000000000000007f00000000000000f9fbfffffeffffffa00400000000000005000000000000df04020003040108050200fd05020009000000000014000000002e4e5ef5236adeae7e15ee947d000029000000430000000100010000000000"], 0x90}, 0x4008800) (async)
socket(0x0, 0x3, 0x0) (async)
socket(0x11, 0x800000003, 0x0) (async)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) (async)
getsockname$packet(r2, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) (async)
sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000010010200ca000000b0"], 0x140}}, 0x0) (async)
getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async)
socket$netlink(0x10, 0x3, 0x0) (async)
sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async)
setsockopt$sock_int(r4, 0x1, 0x2a, &(0x7f0000000140)=0x2, 0x4) (async)
socket$inet6_tcp(0xa, 0x1, 0x0) (async)
sendmmsg$inet6(r5, &(0x7f0000004700)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3f}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000240)="3e9e41a0e39c4e9771f622c619081a7200e2d1efab8b20408cc666039739d4520250daa705a005c38b6f1e29e60b34741d0cb53ee9ea35c8504d1e938463292314c5469377b83edb2d7bd8fc458542cadb93a83b06f0b3b8adb60314aeee0470e1e681ed1a31dfdae9e52dec5d3e72cc2be99bd5a6b64192f9bebd264cb6135fbc557179f0a9d7b4df9b968ed14e273178318a7d44646cc9ec08d9b232afa240c8c8e567e62f90aa024ae38921c16c99d65408", 0xb3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="232937c775a11432e0d233b6363849fbce786a2ea8c295bd8797bc61b1c12eb82a0b68f9b2a6b01f58c5b5cedd5cb1aa08a59e937cfc0d49d30a3060a8eec0ff80de8f943516973abf14158c9c94035c7b7fc099a572c1d68dfe409efd1ef7dbf2e5649fe12e5d68c36ac06dd12e033143f3c0a41ddbc2e8c3c280511d52dc56cbe72cd77570a5ec5e83c01f7e88888362cb1658122dd58f810559700822", 0x9e}, {&(0x7f0000001440)="ec9f7a3e406d583ca927f53a50822ea7c00d1f60fcd80f595fc61490ba6e878aefa8d1cf06116be92039c3c69a01316a4d58847ae2a2cf2bb95b63822986", 0x3e}, {&(0x7f0000001480)="e2844541688f2bda449dbc42736767e8d0d0b1f05376d5e2e6c2bd85983d1662f000f9edd5a5a5d8bf969ea90057d71e1442bdb65cf43444efa39a0df2f8334cd144d70992446894a0c1902c021358653beb86641f478c26c7d32074afef46035e8256c860856bb5e2c088e04fbaef81e6d0e73d5b073de6aea9f90dd5ad6f12c0", 0x81}, {&(0x7f0000001540)="0eaca245ec604e4642bf3005eea5e494ef46732e54b3ecb8401321bae208cddc57bcfab6c9bc108fa2e0058a9ac01c513231b425ca215defc80874179af4680f543b8bc2259a216b6370c9c828a207c9f7400bdbd41078d2683b59510d1cf9ff1e87a9aa1dbe762caef70c23239ff2ea2585aed54fa2de1c701063658174a296e5e7f15b05ab8ac0135c066890f7c894d55dbf7d7ea04bcfd14aecc95950e7b873e194f1f5c18b51ed6ccd9a896491c35c0c127c6a", 0xb5}], 0x5, &(0x7f0000001680)=[@flowinfo={{0x14, 0x29, 0xb, 0x10001}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', r3}}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}, @tclass={{0x14, 0x29, 0x43, 0x3ff}}], 0x70}}, {{&(0x7f0000001700)={0xa, 0x4e23, 0x481, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1de3}, 0x1c, &(0x7f0000002c00)=[{&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="64ae5533308b1aec3488332852003585b30bd9b9613d1c071b7fb7f594aa1a9a103b166e4e33989bfb3f5a43e69c7ae8c5bd1e5320b5ebddfa8ba23b6f1534ff96108e1f7427f0c30895b3116d46a573a02054c2bed8dc420c08457c4632c2d405a5c9981f9c116a2a3da8aa2eb9b1245864cb7f0a75adadfa47a24af08c955d1849c895e4fdfacbe52171532df3f75f19d5224d50c664f731ee116b3dbff7c8c3b972e24d98b729f745", 0xaa}, {&(0x7f0000002800)="fe02c2a46636e7f7784739f3b8f7a3e98cd1d4b60d3298fcba15f612f8086e858a7d6dd94f005ae2599ea64aecf03a990c2bc21967e42cfcef7605ce93361f987790d8a11096534943aa5872b77d93ea03939b602a707a61fa", 0x59}, {&(0x7f0000002880)="b6558e1735eaefcf6778e85085e8ada9855c4e324a2cc52a21fcbb5b23b7b31ca34c543fe48a7b73d5638774e8c33f89aa545bdae7ba1dd4d47f179f0f0e8299ffe74a7a59b99321ae1cb45c3894beefb7d98ab043d685295f37c1b069e70cb72c525bef13ada1b29b3bb8a910b4bbc495eba6dbbb99093c2d3f3d0b4f7982", 0x7f}, {&(0x7f0000002900)="45e43c7bfc0a3339e3fde583a2c71b866b17d00ae4ec991f50c6a889fd6dea1ec1e451ba0a7922e82e090f92cb5fab5b5c333fffafa8a85ac70954e97366660faabf6f4d650ab0b50b8c04cb88724c2567ce33ebeddc628a02a328c7d0ae60bf4ffc79a0843c2cc9f02ff8ca1b227080bc916ca8e0949d3787b737254ef4d5ba03e6f6007f9cd102944f6b60594a2e", 0x8f}, {&(0x7f00000029c0)="21f249ece309b70b446b95f2ba9d497b90cbe2f431bb049ff257dfa595881c7274f14e93199856c53e41aa8d98f19bf03c72eaa9f5cd40dd353107b756baaea69a031d4176e24d3f7625c84622e02c8be6c98990031899ffcc71028c6e21e70609adbddcc90989eb41abaffb1ed8d24256a45fc65a805ff3f72c740d35caff5b193c110c9853ad0aeea88c387b2df4b1bc43aa04415cdd28a2eb9605b26665f3a726bfb043ba08cb1a79bc0907568a15e46457147427653cb702e3ba09b0ff3654cc65aed2469a0987d0b1a9e39f525ac69304c2fe", 0xd5}, {&(0x7f0000002ac0)}, {&(0x7f0000002b00)="bebfcbfc0ef441643eae0e1688e621c1608560d9ba932e4c47ca852e00fe711907ec78a390b8cbb78dce6aff4e65627352539da2a7528ecb98ed3eeb10a9eab682e2f43656a653e449d85eb8f416f72573dbb52193024d935e296de2996f96b3620a2bdc9f84d8d2141a702f3a8960b1bd0de5d2e3908ad285ba5e33d22823cf4ea3711276b7acf4ab8cbe74bcb67f8ea6d8c361cb918520933f507e71af8134595079b3b9fc7378344671206f017ac673f57f445814ac5ec0284dafe69eac97431106de3787426d093c020c470fafa2c3580e5578a048d85aebfb64187fd63d52f4ae3145afeda08553b233b5b63994724a4e953cb150d799", 0xf9}], 0x8, &(0x7f0000002c80)=[@tclass={{0x14, 0x29, 0x43, 0x3}}, @dstopts_2292={{0x140, 0x29, 0x4, {0x2e, 0x24, '\x00', [@hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x20, {0x1, 0x6, 0x6, 0x1f00, [0x6, 0x36d0c970, 0x0]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x1, 0xd5, "6742daf6041aedd4bf77ba6bd5923f6a2e23efe114d87a98174131f1b0f72b8f1113c88db0be311995f398468d3ce3e13095b1241abfbe8b891d0d12d3a00375a417aebf9a9be3abe0db2abaf3d5d976b68e726a773ebd1689ebececa34199a02666915d66149524242ef435d5bcdf19392b9515bcb25a0ecc4bec6af02be61d6d02864f55a109321c2ea325de5b32edd4a3768c260c67f3ba243e91c40111d27122d601d8b9113b10e43f145f255e25a16474e6a6c32ed25c2bc6f087e90fb4fb06b3a52be12a47c93c49a9ae79c35d70ed95c032"}, @enc_lim={0x4, 0x1, 0x2}, @jumbo={0xc2, 0x4, 0x9}, @enc_lim={0x4, 0x1, 0x7f}, @pad1]}}}, @rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x8, 0x0, [@mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xf7b6}}, @flowinfo={{0x14, 0x29, 0xb, 0x40}}, @dstopts={{0x48, 0x29, 0x37, {0x9d, 0x5, '\x00', [@enc_lim={0x4, 0x1, 0x6}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x5b}, @ra={0x5, 0x2, 0x7}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x1, 0x2, 0x6, 0x4, [0x0]}}, @pad1]}}}], 0x208}}, {{0x0, 0x0, &(0x7f00000043c0)=[{&(0x7f0000002ec0)="1461f540f87e224393f626e378841e85735e390900d950883822503e43a70e2f855365bc19f8288beec9fefb37de31c0d8b652c63f010087b5682eb7a833d649b54adbb5962b36b44970f5bd5f2f9793b85847b713d4460aa5e545f165f2e2e69527f88822d6de80edfb6143fa6c2622a7a5a89e3d4881a2be5bd78385bd9c7b5fdfbe", 0x83}, {&(0x7f0000002f80)="d85c88b6d519ecc4070687c711ac624fa0ba15a04de29af9a548", 0x1a}, {&(0x7f0000002fc0)="2ab036f48aa7651f97abfd50bc857f1a40772fc5527fdeb7dcb35ef25c71a86d99c70716ed79dce935e3b853820ceec2b517da938c09e4ace1921c374f6b2753eb4d8188e70c1d937dce3f44489c946458db0e3ad57be774bfd31e061b1712d1cdacb9e953644cebcf9653d68d5b8ffa0c822a6fd23abe8637f64112ce43a478cffc981fddc41c0381d3f4cb28ee43dfefda270afb2bf23ea313e59ecc5bbc6232a26abbf35c8fdfe5451a9e4e88736064a18318daf6e3101b23f08dfea74e7c6be6080a1bc785fe7f1dfb089f98f036c5d30e40cfabd319cf4581bc7c", 0xdd}, {&(0x7f00000030c0)="c4cde06e5ffef048ab27fc4ac388c7d37981b2ab9d5d9a89463bc2c6e0bf99032291a263ffe074c6ef460fdf4b0c57db395577277c74b6191a9d5ea37b9eb0c7e47dc1d973cc423b28c9481e24838b0a8094eb078b55898caa30a2306cf1f5f902ff5a4fec019193aa22c2c56aef43e3dbae937900651f75df9ad60e8bcd6ac14588f1dbc8b5beb31c6db00384f0e4a9892c77ce1bbdfb4e55ad950cc0c22dc953efc16a55c49529c557209287a0c23617c5caebf9994d47b03798a7eeb4c70957f19bc5d59a828481b22ae2c2c86af260af203bc874fd", 0xd7}, {&(0x7f00000031c0)="bf9db2af7db359e2c3c6abd01dc6899f4276015ce1577d453690423d17c341262c2a8df3feac50bdfc9a2f98aacf50ad77419533167717c5cd6724c82ca7f1dffd45ff0d637d69a4b867f50e5257e976d3557e38075117f6d7ac09e526662be129f5757304dffd0f34f81478d5fa1487c4814b20464f042cfe6397cea3c6c1e566c47e0442e87e9b6c488f422aa2786f38a8b73402a25c529f14648d4e732ea3c80aee73cc6d9412a31e216584b621ddea92940ae8aa38754d445ba66d9b667a5f0c742c5d7d7090436448f7a631310d001818ae84e2e02d834d", 0xda}, {&(0x7f00000032c0)="77bbe18f6ffdaef3ae84994eb1f8162dcb15ef7ce04383181fe4652c7140bc0e4257a0b846f9d59a379e199873a01460cd9997b04cf942aa8936835296016a5654bdcab210b9a6d5b053166414555e41989736f25519d1d2ee8777c8f7c522d64ee2354b439d519549198181c1c4b4a811", 0x71}, {&(0x7f0000003340)="4ccd726ec81eedbc925dd81e6e7ada04d1fccdb573371f00f3738fe3a68426e9c98e65aac9b30c5003a4e891a43f95434146fbf80b1ce59b5e6188174feebd30294c45d7bb6931460aa529cc70de3b35196851372533feb69ff5d9533dba3d831416454f06c20c3a1f92d87f9e548080663145d2cc27f94ec1109ee295", 0x7d}, {&(0x7f00000033c0)="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", 0x1000}], 0x8}}, {{&(0x7f0000004440)={0xa, 0x4e24, 0x6, @remote, 0x8001}, 0x1c, &(0x7f0000004580)=[{&(0x7f0000004480)="b344b987e96e8a6a38175460223d7800f920ed83739b71d043b247e29dba78", 0x1f}, {&(0x7f00000044c0)="43d3ad47434f3cd47e11ada6257c800b904f6a23da80ce0440b777fe8be3af26709ba71263a35bbe4d8961ac5880a4fb6db1e09d96dcc7961496780be3fd22c369ce688ff7d1a4f48d9ea2af121c5e9aa095c260e79b9c6bbec9ec3601c1f692693accd86b16e9ce6eefb4225026cd34aeeaa542dfd6d74d46360d6f1fecd410192066aaaa7a66f212632e91ebdf2b26f3cc5a4377af389db5e0914e9fab24b8c530176a323a0cf245a0911af8682f840ac96e391d", 0xb5}], 0x2}}, {{&(0x7f00000045c0)={0xa, 0x4e21, 0xffffffff, @empty, 0x6}, 0x1c, &(0x7f00000046c0)=[{&(0x7f0000004600)="f35d0237aedc9aa8aca89070882b5d9daeba684a0939d5f1fd956486360afb850c0dc09320c3e85618bb0b40c6bd1b3e414e0ec4a6d324ead907a0ac1d7eb4684db9e9e98b200970856edc84c9a798c588f71ec67ebd37c8a091470fff1fe49b0e4b52d6803b24b8f20dd13630c7f54375aeaafb907235dd818264f14dc4df31a6a10cb649f93f4c5475499c32508296bc", 0x91}], 0x1}}], 0x6, 0x8000) (async)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1)
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000010000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1)
socket$inet6(0xa, 0x3, 0x3) (async)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1) (async)
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 454.375879][T27340] loop5: detected capacity change from 0 to 264192
[ 454.406672][T27349] loop4: detected capacity change from 0 to 264192
18:38:18 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0), 0xfffffd77}, 0x1)
18:38:18 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000005bb00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 1:
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0xffffffff)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18}}], 0x30}, 0x0)
18:38:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000010000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0xffffffff)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18}}], 0x30}, 0x0)
[ 454.608046][T27363] loop5: detected capacity change from 0 to 264192
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0xffffffff)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18}}], 0x30}, 0x0)
18:38:18 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 454.697928][T27378] loop4: detected capacity change from 0 to 264192
[ 454.780148][T27383] loop5: detected capacity change from 0 to 264192
18:38:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x1, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@dstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x8001}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x9, 0x1, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x48}, 0x40000)
18:38:18 executing program 1:
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x1, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@dstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x8001}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x9, 0x1, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x48}, 0x40000)
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x1, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@dstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x8001}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x9, 0x1, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x48}, 0x40000)
[ 454.960844][T27395] loop5: detected capacity change from 0 to 264192
18:38:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0)
sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3)
r2 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18)
socket$inet6(0xa, 0x6, 0x3257)
sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c)
setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88)
sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88)
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 455.037773][T27404] loop4: detected capacity change from 0 to 264192
18:38:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 455.080206][T27409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=27409 comm=syz-executor.0
18:38:18 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0)
sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3)
r2 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18)
socket$inet6(0xa, 0x6, 0x3257)
sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c)
setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88)
sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88)
socket$netlink(0x10, 0x3, 0x0) (async)
sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async)
sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0) (async)
socket$inet6(0xa, 0x3, 0x3) (async)
openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18) (async)
socket$inet6(0xa, 0x6, 0x3257) (async)
sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c) (async)
setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) (async)
sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0) (async)
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88) (async)
18:38:18 executing program 1:
syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000080000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 455.182026][T27419] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=27419 comm=syz-executor.0
[ 455.206002][T27420] loop1: detected capacity change from 0 to 264192
[ 455.216668][T27422] loop5: detected capacity change from 0 to 264192
18:38:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:18 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0)
sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3)
r2 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18)
socket$inet6(0xa, 0x6, 0x3257)
sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c)
setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88)
sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88)
socket$netlink(0x10, 0x3, 0x0) (async)
sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async)
sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x430, 0x3f3, 0x10, 0x70bd27, 0x25dfdbfd, {0x3, 0x0, 0x5, [0x0, 0x7f, 0x3, 0x4, 0x27e7, 0x6, 0x0, 0x3, 0x7, 0x8b, 0x3, 0xce, 0x1ff, 0x80000001, 0x0, 0x80, 0x0, 0x101, 0x0, 0x4, 0x8, 0x40, 0x3978, 0x8001, 0x80000000, 0x9, 0x3, 0x3f, 0x7fffffff, 0x8, 0x3, 0x9, 0xc1d, 0xfffffdd4, 0x7f, 0x40, 0x18c, 0x1f, 0x0, 0x2, 0x200, 0x2, 0x0, 0x7fffffff, 0x5, 0x5, 0x4, 0x5, 0x3, 0x1, 0x10000, 0x7333, 0xff, 0x4, 0x1ff, 0x7fffffff, 0x1, 0x101, 0x9, 0xfffffffb, 0x8, 0x6, 0x8, 0x20], [0x0, 0x3, 0x7fffffff, 0x1df, 0x1, 0x7fffffff, 0x8b3, 0x2, 0xe6d5, 0x499, 0x401, 0x80, 0x6, 0x0, 0x10000, 0x7e00000, 0x2, 0x3, 0x200, 0xfffffffa, 0x62, 0xea3, 0xffffffc0, 0x2, 0x101, 0xb5, 0xfffff653, 0x3, 0x100, 0x40, 0x3, 0xb4d, 0xb62b, 0x1, 0x3, 0xf5, 0x10001, 0x5, 0x101, 0xce33, 0x8b2, 0x507, 0x1f, 0x6, 0x7, 0x4, 0x6e, 0x1, 0x1ff, 0x5, 0x70000, 0x7f, 0x8001, 0x749, 0x7f, 0x101, 0x9, 0x200, 0x3, 0x2, 0x6, 0x2, 0x20], [0x9, 0xffffff81, 0x400, 0x4, 0x101, 0x0, 0x6, 0x7f, 0x7ff, 0x91e, 0x5, 0x1, 0x401, 0xfffff281, 0x800, 0x3, 0x6, 0x3f, 0x6, 0x6, 0x2, 0x6, 0x101, 0x20, 0x5, 0x10001, 0x2, 0x0, 0x9f8, 0x1000, 0x7, 0xfffffffd, 0x9, 0xd03, 0x6, 0x1, 0xffffff01, 0xb8d, 0x9, 0x7fff, 0x1000, 0x0, 0x9, 0x2, 0x6, 0x5502, 0x8000, 0x1, 0x0, 0x8, 0x80000001, 0x1, 0x401, 0x7f, 0x5, 0x3ff, 0x8, 0x5, 0x4, 0x4, 0x40, 0x5, 0x1000, 0x192f], [0x4, 0x7, 0x9, 0x4, 0xca, 0x263, 0x400, 0x2, 0x1000, 0x7, 0x1, 0x2, 0x2, 0x4, 0x80000001, 0x3135, 0x5, 0x5, 0x7f, 0x0, 0x3, 0x1, 0x5, 0x20, 0x4, 0x2, 0x4, 0xffffff6c, 0x3, 0x4, 0x1, 0x0, 0x85, 0x4, 0x3, 0x8, 0x5628, 0x2ca316c5, 0x7, 0x2, 0x1ff, 0x2, 0x5, 0x401, 0x1, 0x3, 0x6, 0x1, 0x7, 0x8, 0x8, 0xfd, 0xffff, 0x9, 0x8, 0x800, 0x3, 0x7ff, 0x2eb, 0xc3, 0x4, 0xfff, 0x6681, 0x1], 0xf, ['\x00', '\x00', '\x00', '^\x8b{^}.$}\xa3+\x00', '\x00']}, ["", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4054}, 0x0) (async)
socket$inet6(0xa, 0x3, 0x3) (async)
openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x60, 0x8}, 0x18) (async)
socket$inet6(0xa, 0x6, 0x3257) (async)
sendto$inet6(r1, &(0x7f0000000380)="42437c59edb88ea03ca745d79e7fb63b6583802f05cd4087533fb75b03a5f73a2da8bf4653e5ed178e9849faab95184e7b3909b9ae2167d87979687e20c2215d93f7ec63c2eb28501203c18dad923d4f65beeb800d27dc534ed0509d380aba0aa12d634ef8706570433776f4859aa3cbe095e1aae1349035f7fa516bbe1b0450ec06002b12ca28e770773eeeadfdf6840d25cde281ba793971becae4794510f580f7eea840e66f4c8e4c90f7c6c5d5c64f632d931f1be917b48a6c556cc8d8707dfb8efcc0", 0xc5, 0x24004040, &(0x7f0000000080)={0xa, 0x4e20, 0x3a7, @loopback, 0x2}, 0x1c) (async)
setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000140)={0x200, {{0xa, 0x4e24, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) (async)
sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4010000}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xff}}}], 0x30}, 0x0) (async)
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x81, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}}}, 0x88) (async)
18:38:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 455.274706][T27435] loop4: detected capacity change from 0 to 264192
18:38:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 1:
syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 455.328723][T27443] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=27443 comm=syz-executor.0
18:38:19 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:19 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:19 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0)
sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000)
recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c)
18:38:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000080000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 1:
syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 455.504523][T27468] loop5: detected capacity change from 0 to 264192
18:38:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 455.568886][T27474] loop1: detected capacity change from 0 to 264192
18:38:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 455.614118][T27478] loop4: detected capacity change from 0 to 264192
18:38:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 455.774445][T27491] loop5: detected capacity change from 0 to 264192
18:38:20 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0)
sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000) (async)
recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c)
18:38:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000100000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:20 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 456.311940][T27494] loop4: detected capacity change from 0 to 264192
[ 456.318582][T27500] loop1: detected capacity change from 0 to 264192
[ 456.318734][T27498] loop5: detected capacity change from 0 to 264192
18:38:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:20 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:20 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 456.465897][T27513] loop4: detected capacity change from 0 to 264192
[ 456.466718][T27514] loop1: detected capacity change from 0 to 264192
[ 456.500876][ T1913] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[ 456.584897][T27518] loop5: detected capacity change from 0 to 264192
18:38:20 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x3)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0)
sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000)
recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c)
socket$inet6(0xa, 0x3, 0x3) (async)
sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)}, 0x0) (async)
sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="a49179659b19afef36d522d6bcca916d11d466c110daa19aef25619f238c2a65d7e21d069d166937f8d1ee67149a11dc5e3f09931c68e39eda29da74c5f77d5a0bc9974b99554a2b6b11f11bb8b869cc1aaf8b0dbff7223389480c8fee90b532f66ef689ed85a7b7dfde9323e416079d6a2598d874e04f65f1ae7e170488554c8922ae485235ff70a8be74d5104eb1481fa86f7729bf173c62e1ffd69efe6f1798bf61f84f26", 0xa6}], 0x1, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xcd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x48}, 0x4000) (async)
recvfrom$inet6(r0, &(0x7f0000000000)=""/72, 0x48, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @local, 0x3}, 0x1c) (async)
18:38:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:20 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 457.186758][T27527] loop1: detected capacity change from 0 to 264192
[ 457.187128][T27528] loop4: detected capacity change from 0 to 264192
[ 457.204884][T27532] loop5: detected capacity change from 0 to 264192
18:38:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000100000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:21 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:21 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:21 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:21 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 457.349407][T27550] FAT-fs (loop1): bogus number of reserved sectors
[ 457.356058][T27550] FAT-fs (loop1): Can't find a valid FAT filesystem
[ 457.365330][T27545] loop4: detected capacity change from 0 to 264192
18:38:21 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:21 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:21 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:21 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:21 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:21 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:21 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:21 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 458.044468][T27561] loop4: detected capacity change from 0 to 264192
[ 458.055941][T27558] FAT-fs (loop1): bogus number of reserved sectors
[ 458.062489][T27558] FAT-fs (loop1): Can't find a valid FAT filesystem
[ 458.071309][T27564] loop5: detected capacity change from 0 to 264192
18:38:21 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:21 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:21 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 458.186001][T27573] loop4: detected capacity change from 0 to 264192
18:38:21 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006490000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 458.423023][T27587] loop4: detected capacity change from 0 to 264192
[ 458.429774][T27586] FAT-fs (loop1): bogus number of reserved sectors
[ 458.436299][T27586] FAT-fs (loop1): Can't find a valid FAT filesystem
[ 458.441503][T27589] loop5: detected capacity change from 0 to 264192
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 458.605249][T27607] loop4: detected capacity change from 0 to 264192
18:38:22 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 458.813108][T27615] loop4: detected capacity change from 0 to 264192
[ 458.820023][T27618] loop5: detected capacity change from 0 to 264192
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffff9e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffffef0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 4:
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff00000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:22 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 4:
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:22 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff50000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 459.196252][T27641] loop5: detected capacity change from 0 to 264192
18:38:22 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffff9e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffffe0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 4:
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005bb0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 459.389049][T27666] loop1: detected capacity change from 0 to 264192
[ 459.419512][T27666] FAT-fs (loop1): bogus number of reserved sectors
[ 459.426067][T27666] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:23 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100007fffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000ffffffef0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100009effffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 459.582592][T27676] loop4: detected capacity change from 0 to 264192
[ 459.590022][T27674] loop1: detected capacity change from 0 to 264192
[ 459.596795][T27675] loop5: detected capacity change from 0 to 264192
[ 459.611868][T27674] FAT-fs (loop1): bogus number of reserved sectors
[ 459.618454][T27674] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff00000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000efffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffff50000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 0:
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 459.770112][T27692] loop1: detected capacity change from 0 to 264192
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f0ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 459.828060][T27692] FAT-fs (loop1): bogus number of reserved sectors
[ 459.830886][T27698] loop4: detected capacity change from 0 to 264192
[ 459.834658][T27692] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:23 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000fffffffe0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f5ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100007fffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000feffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 459.980978][T27713] loop5: detected capacity change from 0 to 264192
18:38:23 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100009effffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000010000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 460.073438][T27721] loop1: detected capacity change from 0 to 264192
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000efffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 460.130210][T27721] FAT-fs (loop1): bogus number of reserved sectors
[ 460.136803][T27721] FAT-fs (loop1): Can't find a valid FAT filesystem
[ 460.137792][T27725] loop4: detected capacity change from 0 to 264192
18:38:23 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:23 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f0ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:23 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000f5ffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 460.316172][T27739] loop1: detected capacity change from 0 to 264192
[ 460.347650][T27739] FAT-fs (loop1): bogus number of reserved sectors
[ 460.354249][T27739] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 460.377587][T27742] loop5: detected capacity change from 0 to 264192
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000feffffff0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000010000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 460.482639][T27752] loop4: detected capacity change from 0 to 264192
18:38:24 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 460.648485][T27763] loop1: detected capacity change from 0 to 264192
[ 460.662840][T27763] FAT-fs (loop1): bogus number of reserved sectors
[ 460.669348][T27763] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 460.714958][T27772] loop4: detected capacity change from 0 to 264192
[ 460.737598][T27774] loop5: detected capacity change from 0 to 264192
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 460.932935][T27787] loop1: detected capacity change from 0 to 264192
[ 460.947927][T27787] FAT-fs (loop1): bogus number of reserved sectors
[ 460.954564][T27787] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:24 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000b00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.027562][T27794] loop4: detected capacity change from 0 to 264192
18:38:24 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.101336][T27803] loop5: detected capacity change from 0 to 264192
18:38:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:24 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:24 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000d00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.214380][T27808] FAT-fs (loop4): bogus number of reserved sectors
[ 461.220948][T27808] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 461.232776][T27815] loop1: detected capacity change from 0 to 264192
[ 461.272036][T27815] FAT-fs (loop1): bogus number of reserved sectors
[ 461.278746][T27815] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:25 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000f00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.420999][T27825] loop5: detected capacity change from 0 to 264192
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.493992][T27834] loop1: detected capacity change from 0 to 264192
[ 461.517712][T27837] FAT-fs (loop4): bogus number of reserved sectors
[ 461.524315][T27837] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.547223][T27834] FAT-fs (loop1): bogus number of reserved sectors
[ 461.553875][T27834] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:25 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000b00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0)
r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.708619][T27854] FAT-fs (loop4): bogus number of reserved sectors
[ 461.715180][T27854] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 461.720784][T27856] loop1: detected capacity change from 0 to 264192
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000d00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.767802][T27856] FAT-fs (loop1): bogus number of reserved sectors
[ 461.774413][T27856] FAT-fs (loop1): Can't find a valid FAT filesystem
[ 461.782725][T27863] loop5: detected capacity change from 0 to 264192
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 461.815420][ T2193] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000f00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 0:
r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0)
getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
socket$inet6(0xa, 0x3, 0x3)
18:38:25 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.012782][T27884] loop1: detected capacity change from 0 to 264192
18:38:25 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0)
r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000002500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000004000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.057674][T27889] loop5: detected capacity change from 0 to 264192
[ 462.076701][T27884] FAT-fs (loop1): bogus number of reserved sectors
[ 462.083320][T27884] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:25 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:25 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001200000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000064900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:25 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 462.296536][T27908] loop1: detected capacity change from 0 to 264192
[ 462.310046][T27908] FAT-fs (loop1): bogus number of reserved sectors
[ 462.316620][T27908] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001400000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000005c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.347370][T27913] loop5: detected capacity change from 0 to 264192
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001600000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000006000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001800000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000007c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000001900000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000008000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.606347][T27936] loop1: detected capacity change from 0 to 264192
[ 462.608223][T27939] loop4: detected capacity change from 0 to 264192
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000002500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.647645][T27939] FAT-fs (loop4): bogus number of reserved sectors
[ 462.649388][T27936] FAT-fs (loop1): invalid media value (0x00)
[ 462.654209][T27939] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 462.666825][T27936] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:26 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000004000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffff9e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.716276][T27947] loop5: detected capacity change from 0 to 264192
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000005c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.789427][T27953] loop4: detected capacity change from 0 to 264192
[ 462.798146][T27953] FAT-fs (loop4): bogus number of reserved sectors
[ 462.804727][T27953] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffef00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0)
r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4)
r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0)
syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd=r2, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)="8037ea1d83ecfff664c9c625e388e67156ea3021693421f7eaf10f681ffc0769af92e722b272af72ecb87de7716b7d83fe4bcee6251b8addfbb3871cbf135b27d8ea96cfb63e1449d938c21147fb9bf4ab39b4886273bbea0af395d4ea168b1b", 0x60}, {&(0x7f0000000480)="0c2b8933724984213ab323932520803d48db6a8eb34ceef3bd808b4085c8743e9ff72b8f3188b648a64c8cfe5d56e4725fc74f45db92aa1b13d817c1fbc54052a1d6c430a80426f3f5af9a00609b8b98a018866a5955fddbe4480a4c004b83953e16e177fd6bff708e4142b4e545420db7c040e08f99900323b223f9e8d3090be22d383c1f06543b33a393c9af53", 0x8e}, {&(0x7f0000000380)="4c21679626c2d1fd68c9b8b2a4634a4de13d86f554643751dd693c0351e27011a7effd6ee57c2df3149626749a3f5c85cba130780906a1400a5de8eefc65ee99e8e347f469a135ff9075f546027ac4056b2e", 0x52}, {&(0x7f0000000540)="70d201eff1171fb67bace0d0e66fe3d0f54416a222f896587e917c1e048b49e95ae39864453dd29c9bb16018042fd8d9eda13508519a2c3b20b20d6cc4357497bb7b3d1468bfba97c53dd683ddf057f678c35962f5a0b026734a6ef492df3981906cc7bade00f4f47f310d6333a8a3e63e4792f964274564f2d715026eb77fb63582096328e20d0827ead83d44156857a92b002c9d0a012755b9cfa2a9663a1208984b7ca436f3f63fc49d2da4f7166bf654858168a488a2138f21eb51672f1409add63497a03e173bcd78f90b29f95ee8558d47fff0a4fe", 0xd8}, {&(0x7f0000000180)="87f4", 0x2}, {&(0x7f0000000640)="08b8a026ddd2ccc72392435945e79510031c043ede5ab19d1f8c7c5ff69562e6b8ddde51d872102e6768f08ff5038b73fe8b5cdfeaa49e3b768e0707a9d106b3873359607b5abba8a0792c70ca3e40d24bce9f826e38d3a787b13c7bedd0ede50576d5a851d6bc67ee4345338d4573bc72260af16157b27818", 0x79}, {0x0}], 0x7, 0x10, 0x0, {0x2, r3}}, 0x401)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x80}, 0x1, {0x0, r3}}, 0x8000)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000006000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 462.914836][T27966] loop1: detected capacity change from 0 to 264192
[ 462.947299][T27966] FAT-fs (loop1): invalid media value (0x00)
[ 462.953399][T27966] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 462.983789][T27970] loop5: detected capacity change from 0 to 264192
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffffe00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000007c00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.053252][T27977] loop4: detected capacity change from 0 to 264192
[ 463.091105][T27977] FAT-fs (loop4): bogus number of reserved sectors
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007fffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000008000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.097766][T27977] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:26 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:26 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
18:38:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffff9e00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:26 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 463.227474][T27993] loop1: detected capacity change from 0 to 264192
[ 463.256063][T27993] FAT-fs (loop1): invalid media value (0x00)
[ 463.262122][T27993] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000005bb00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000300000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.278945][T27998] loop5: detected capacity change from 0 to 264192
[ 463.306718][T28001] loop4: detected capacity change from 0 to 264192
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffef00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.390971][T28001] FAT-fs (loop4): bogus number of reserved sectors
[ 463.397516][T28001] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:27 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffff500000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.492163][T28018] loop1: detected capacity change from 0 to 264192
[ 463.529204][T28018] FAT-fs (loop1): invalid media value (0x00)
[ 463.535260][T28018] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:27 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000fffffffe00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.586922][T28027] loop5: detected capacity change from 0 to 264192
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000700000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007fffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.640575][T28034] loop4: detected capacity change from 0 to 264192
[ 463.657444][T28034] FAT-fs (loop4): bogus number of reserved sectors
[ 463.664029][T28034] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:27 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000ffffffff00000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
[ 463.759597][T28042] loop1: detected capacity change from 0 to 264192
[ 463.788344][T28042] FAT-fs (loop1): invalid media value (0x00)
[ 463.794385][T28042] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:27 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.855761][T28053] loop4: detected capacity change from 0 to 264192
[ 463.876006][T28053] FAT-fs (loop4): bogus number of reserved sectors
[ 463.882575][T28053] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000a00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000300000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 463.908679][T28057] loop5: detected capacity change from 0 to 264192
18:38:27 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000b00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.020475][T28066] loop4: detected capacity change from 0 to 264192
[ 464.055896][T28066] FAT-fs (loop4): bogus number of reserved sectors
[ 464.062479][T28066] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:27 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0)
r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4)
r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0)
syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd=r2, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)="8037ea1d83ecfff664c9c625e388e67156ea3021693421f7eaf10f681ffc0769af92e722b272af72ecb87de7716b7d83fe4bcee6251b8addfbb3871cbf135b27d8ea96cfb63e1449d938c21147fb9bf4ab39b4886273bbea0af395d4ea168b1b", 0x60}, {&(0x7f0000000480)="0c2b8933724984213ab323932520803d48db6a8eb34ceef3bd808b4085c8743e9ff72b8f3188b648a64c8cfe5d56e4725fc74f45db92aa1b13d817c1fbc54052a1d6c430a80426f3f5af9a00609b8b98a018866a5955fddbe4480a4c004b83953e16e177fd6bff708e4142b4e545420db7c040e08f99900323b223f9e8d3090be22d383c1f06543b33a393c9af53", 0x8e}, {&(0x7f0000000380)="4c21679626c2d1fd68c9b8b2a4634a4de13d86f554643751dd693c0351e27011a7effd6ee57c2df3149626749a3f5c85cba130780906a1400a5de8eefc65ee99e8e347f469a135ff9075f546027ac4056b2e", 0x52}, {&(0x7f0000000540)="70d201eff1171fb67bace0d0e66fe3d0f54416a222f896587e917c1e048b49e95ae39864453dd29c9bb16018042fd8d9eda13508519a2c3b20b20d6cc4357497bb7b3d1468bfba97c53dd683ddf057f678c35962f5a0b026734a6ef492df3981906cc7bade00f4f47f310d6333a8a3e63e4792f964274564f2d715026eb77fb63582096328e20d0827ead83d44156857a92b002c9d0a012755b9cfa2a9663a1208984b7ca436f3f63fc49d2da4f7166bf654858168a488a2138f21eb51672f1409add63497a03e173bcd78f90b29f95ee8558d47fff0a4fe", 0xd8}, {&(0x7f0000000180)="87f4", 0x2}, {&(0x7f0000000640)="08b8a026ddd2ccc72392435945e79510031c043ede5ab19d1f8c7c5ff69562e6b8ddde51d872102e6768f08ff5038b73fe8b5cdfeaa49e3b768e0707a9d106b3873359607b5abba8a0792c70ca3e40d24bce9f826e38d3a787b13c7bedd0ede50576d5a851d6bc67ee4345338d4573bc72260af16157b27818", 0x79}, {0x0}], 0x7, 0x10, 0x0, {0x2, r3}}, 0x401)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x80}, 0x1, {0x0, r3}}, 0x8000)
r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:27 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:27 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.103405][T28073] loop1: detected capacity change from 0 to 264192
[ 464.159151][T28073] FAT-fs (loop1): invalid media value (0x00)
[ 464.165327][T28073] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:28 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0)
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000d00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:28 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000440), 0x0, 0x6}, {&(0x7f0000000340)="f6a78d46a3a665f2e8da91b0e5c26965f3e742fe27129afb210dbbc6d5f574fee937305abfa5cfa2f817f9fb8d06ff685e060992c5f9737357d56bfb149c403f1b26065ef990063cb5b2701eb9cde1eed7c49bca1105817ab50ddfb5ec0968a69c2881bd86b0f0b40c84fc7d0af74a8833468526a26fa5ca8958", 0x7a}, {0x0}, {0x0}], 0x4000, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0)
r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)='Q', 0x0}, 0x48)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4)
r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0)
syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd=r2, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)="8037ea1d83ecfff664c9c625e388e67156ea3021693421f7eaf10f681ffc0769af92e722b272af72ecb87de7716b7d83fe4bcee6251b8addfbb3871cbf135b27d8ea96cfb63e1449d938c21147fb9bf4ab39b4886273bbea0af395d4ea168b1b", 0x60}, {&(0x7f0000000480)="0c2b8933724984213ab323932520803d48db6a8eb34ceef3bd808b4085c8743e9ff72b8f3188b648a64c8cfe5d56e4725fc74f45db92aa1b13d817c1fbc54052a1d6c430a80426f3f5af9a00609b8b98a018866a5955fddbe4480a4c004b83953e16e177fd6bff708e4142b4e545420db7c040e08f99900323b223f9e8d3090be22d383c1f06543b33a393c9af53", 0x8e}, {&(0x7f0000000380)="4c21679626c2d1fd68c9b8b2a4634a4de13d86f554643751dd693c0351e27011a7effd6ee57c2df3149626749a3f5c85cba130780906a1400a5de8eefc65ee99e8e347f469a135ff9075f546027ac4056b2e", 0x52}, {&(0x7f0000000540)="70d201eff1171fb67bace0d0e66fe3d0f54416a222f896587e917c1e048b49e95ae39864453dd29c9bb16018042fd8d9eda13508519a2c3b20b20d6cc4357497bb7b3d1468bfba97c53dd683ddf057f678c35962f5a0b026734a6ef492df3981906cc7bade00f4f47f310d6333a8a3e63e4792f964274564f2d715026eb77fb63582096328e20d0827ead83d44156857a92b002c9d0a012755b9cfa2a9663a1208984b7ca436f3f63fc49d2da4f7166bf654858168a488a2138f21eb51672f1409add63497a03e173bcd78f90b29f95ee8558d47fff0a4fe", 0xd8}, {&(0x7f0000000180)="87f4", 0x2}, {&(0x7f0000000640)="08b8a026ddd2ccc72392435945e79510031c043ede5ab19d1f8c7c5ff69562e6b8ddde51d872102e6768f08ff5038b73fe8b5cdfeaa49e3b768e0707a9d106b3873359607b5abba8a0792c70ca3e40d24bce9f826e38d3a787b13c7bedd0ede50576d5a851d6bc67ee4345338d4573bc72260af16157b27818", 0x79}, {0x0}], 0x7, 0x10, 0x0, {0x2, r3}}, 0x401)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x80}, 0x1, {0x0, r3}}, 0x8000)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 464.309963][T28088] loop4: detected capacity change from 0 to 264192
[ 464.324115][T28088] FAT-fs (loop4): bogus number of reserved sectors
[ 464.327768][T28090] loop1: detected capacity change from 0 to 264192
[ 464.330687][T28088] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 464.347466][T28090] FAT-fs (loop1): bogus number of FAT sectors
[ 464.353598][T28090] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000700000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000e00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.406731][T28097] loop5: detected capacity change from 0 to 264192
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000f00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:28 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0)
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 1)
[ 464.569907][T28112] loop1: detected capacity change from 0 to 264192
[ 464.598667][T28112] FAT-fs (loop1): bogus number of FAT sectors
[ 464.604955][T28112] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:28 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000a00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001100000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.614941][T28114] loop5: detected capacity change from 0 to 264192
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000b00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.652325][T28121] loop4: detected capacity change from 0 to 264192
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.709599][T28121] FAT-fs (loop4): bogus number of reserved sectors
[ 464.716133][T28121] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 464.743000][T28117] FAULT_INJECTION: forcing a failure.
[ 464.743000][T28117] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[ 464.756259][T28117] CPU: 1 PID: 28117 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 464.767279][T28117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 464.777333][T28117] Call Trace:
[ 464.780610][T28117]
[ 464.783537][T28117] dump_stack_lvl+0xd6/0x122
[ 464.788173][T28117] dump_stack+0x11/0x1b
[ 464.792383][T28117] should_fail+0x23c/0x250
[ 464.796810][T28117] __alloc_pages+0x102/0x330
[ 464.801403][T28117] alloc_pages_vma+0x67e/0x810
[ 464.806230][T28117] new_page+0x121/0x170
[ 464.810386][T28117] migrate_pages+0x465/0x1810
[ 464.815147][T28117] ? mbind_range+0x846/0x8d0
[ 464.819772][T28117] ? do_mbind+0x760/0x760
[ 464.824151][T28117] do_mbind+0x5b7/0x760
[ 464.828343][T28117] __se_sys_mbind+0x151/0x410
[ 464.833021][T28117] __x64_sys_mbind+0x74/0x80
[ 464.837675][T28117] do_syscall_64+0x44/0xd0
[ 464.842128][T28117] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 464.848024][T28117] RIP: 0033:0x7fb80e59e059
[ 464.852433][T28117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 464.872069][T28117] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 464.880485][T28117] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 464.888452][T28117] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 464.896469][T28117] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
18:38:28 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0)
18:38:28 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 464.904435][T28117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 464.912406][T28117] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 464.920421][T28117]
[ 464.937245][T28135] loop1: detected capacity change from 0 to 264192
[ 464.948478][T28135] FAT-fs (loop1): bogus number of FAT sectors
18:38:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 2)
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000d00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.954600][T28135] FAT-fs (loop1): Can't find a valid FAT filesystem
18:38:28 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 464.992279][T28138] loop5: detected capacity change from 0 to 264192
[ 465.104490][T28148] FAULT_INJECTION: forcing a failure.
[ 465.104490][T28148] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 465.117896][T28148] CPU: 0 PID: 28148 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 465.129015][T28148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 465.139072][T28148] Call Trace:
[ 465.142349][T28148]
[ 465.145279][T28148] dump_stack_lvl+0xd6/0x122
[ 465.149882][T28148] dump_stack+0x11/0x1b
18:38:28 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:28 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000e00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:28 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0)
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:28 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 1)
[ 465.154054][T28148] should_fail+0x23c/0x250
[ 465.158480][T28148] __alloc_pages+0x102/0x330
[ 465.163071][T28148] alloc_pages_vma+0x67e/0x810
[ 465.167923][T28148] new_page+0x121/0x170
[ 465.172157][T28148] migrate_pages+0x465/0x1810
[ 465.176955][T28148] ? do_mbind+0x760/0x760
[ 465.181351][T28148] ? remove_migration_ptes+0x90/0x90
[ 465.186644][T28148] do_mbind+0x5b7/0x760
[ 465.190806][T28148] __se_sys_mbind+0x151/0x410
[ 465.195504][T28148] __x64_sys_mbind+0x74/0x80
[ 465.200105][T28148] do_syscall_64+0x44/0xd0
[ 465.204664][T28148] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 465.210569][T28148] RIP: 0033:0x7fb80e59e059
[ 465.214990][T28148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 465.234735][T28148] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 465.241349][T28151] loop4: detected capacity change from 0 to 264192
[ 465.243206][T28148] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 465.243222][T28148] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 465.243235][T28148] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 465.271126][T28151] FAT-fs (loop4): bogus number of reserved sectors
[ 465.273591][T28148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 465.280154][T28151] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 465.288085][T28148] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 465.302625][T28148]
18:38:29 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:29 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 3)
18:38:29 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000f00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 465.311057][T28153] loop1: detected capacity change from 0 to 264192
[ 465.333089][T28156] loop5: detected capacity change from 0 to 264192
18:38:29 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:29 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 465.436168][T28167] FAULT_INJECTION: forcing a failure.
[ 465.436168][T28167] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 465.449438][T28167] CPU: 0 PID: 28167 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 465.460529][T28167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 465.470638][T28167] Call Trace:
[ 465.473917][T28167]
[ 465.476853][T28167] dump_stack_lvl+0xd6/0x122
[ 465.481528][T28167] dump_stack+0x11/0x1b
[ 465.485694][T28167] should_fail+0x23c/0x250
[ 465.486438][T28170] loop4: detected capacity change from 0 to 264192
[ 465.490195][T28167] __alloc_pages+0x102/0x330
[ 465.490220][T28167] alloc_pages_vma+0x67e/0x810
[ 465.490242][T28167] new_page+0x121/0x170
[ 465.510411][T28167] migrate_pages+0x465/0x1810
[ 465.515104][T28167] ? do_mbind+0x760/0x760
[ 465.519604][T28167] ? remove_migration_ptes+0x90/0x90
[ 465.520784][T28170] FAT-fs (loop4): bogus number of reserved sectors
[ 465.524966][T28167] do_mbind+0x5b7/0x760
[ 465.531519][T28170] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 465.542283][T28167] __se_sys_mbind+0x151/0x410
[ 465.547074][T28167] __x64_sys_mbind+0x74/0x80
[ 465.551683][T28167] do_syscall_64+0x44/0xd0
[ 465.556157][T28167] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 465.562090][T28167] RIP: 0033:0x7fb80e59e059
[ 465.566498][T28167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 465.586140][T28167] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 465.595078][T28167] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 465.603109][T28167] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 465.611083][T28167] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 465.619339][T28167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 465.627308][T28167] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 465.635283][T28167]
[ 465.641386][T28168] FAULT_INJECTION: forcing a failure.
[ 465.641386][T28168] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 465.654640][T28168] CPU: 1 PID: 28168 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 465.665701][T28168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 465.675761][T28168] Call Trace:
[ 465.679037][T28168]
[ 465.681968][T28168] dump_stack_lvl+0xd6/0x122
[ 465.686606][T28168] dump_stack+0x11/0x1b
[ 465.690840][T28168] should_fail+0x23c/0x250
[ 465.695266][T28168] __alloc_pages+0x102/0x330
[ 465.700823][T28168] alloc_pages_vma+0x67e/0x810
[ 465.705598][T28168] new_page+0x121/0x170
[ 465.709803][T28168] migrate_pages+0x465/0x1810
[ 465.714558][T28168] ? mbind_range+0x846/0x8d0
[ 465.719314][T28168] ? do_mbind+0x760/0x760
[ 465.723652][T28168] do_mbind+0x5b7/0x760
[ 465.727834][T28168] __se_sys_mbind+0x151/0x410
[ 465.732555][T28168] __x64_sys_mbind+0x74/0x80
18:38:29 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:29 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 4)
[ 465.737171][T28168] do_syscall_64+0x44/0xd0
[ 465.742653][T28168] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 465.748664][T28168] RIP: 0033:0x7f0d68981059
[ 465.753079][T28168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 465.772848][T28168] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:29 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 2)
[ 465.781359][T28168] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059
[ 465.792949][T28168] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 465.802423][T28168] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002
[ 465.810584][T28168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 465.818585][T28168] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000
[ 465.826593][T28168]
[ 465.862553][T28175] FAULT_INJECTION: forcing a failure.
[ 465.862553][T28175] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 465.876329][T28175] CPU: 1 PID: 28175 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 465.887472][T28175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 465.897702][T28175] Call Trace:
[ 465.901531][T28175]
[ 465.904573][T28175] dump_stack_lvl+0xd6/0x122
18:38:29 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000002500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:29 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 465.909243][T28175] dump_stack+0x11/0x1b
[ 465.913409][T28175] should_fail+0x23c/0x250
[ 465.917834][T28175] __alloc_pages+0x102/0x330
[ 465.922432][T28175] alloc_pages_vma+0x67e/0x810
[ 465.927248][T28175] new_page+0x121/0x170
[ 465.931483][T28175] migrate_pages+0x465/0x1810
[ 465.936321][T28175] ? do_mbind+0x760/0x760
[ 465.940682][T28175] ? remove_migration_ptes+0x90/0x90
[ 465.946028][T28175] do_mbind+0x5b7/0x760
[ 465.950325][T28175] __se_sys_mbind+0x151/0x410
[ 465.954245][T28181] loop4: detected capacity change from 0 to 264192
[ 465.955009][T28175] __x64_sys_mbind+0x74/0x80
[ 465.955033][T28175] do_syscall_64+0x44/0xd0
[ 465.955093][T28175] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 465.976527][T28175] RIP: 0033:0x7fb80e59e059
[ 465.980894][T28181] FAT-fs (loop4): bogus number of reserved sectors
[ 465.980949][T28175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 465.980970][T28175] RSP: 002b:00007fb80d714168 EFLAGS: 00000246
[ 465.987470][T28181] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 466.007380][T28175] ORIG_RAX: 00000000000000ed
[ 466.007390][T28175] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 466.007403][T28175] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 466.040761][T28175] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 466.048797][T28175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
18:38:29 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0)
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:29 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001100000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 466.056778][T28175] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 466.064754][T28175]
18:38:29 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 5)
18:38:29 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000005c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 466.104220][T28185] loop5: detected capacity change from 0 to 264192
18:38:29 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001200000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 466.152743][T28190] loop1: detected capacity change from 0 to 264192
[ 466.216641][T28194] FAULT_INJECTION: forcing a failure.
[ 466.216641][T28194] name failslab, interval 1, probability 0, space 0, times 0
[ 466.229617][T28194] CPU: 1 PID: 28194 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 466.240737][T28194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 466.250834][T28194] Call Trace:
[ 466.254112][T28194]
[ 466.257035][T28194] dump_stack_lvl+0xd6/0x122
[ 466.261632][T28194] dump_stack+0x11/0x1b
[ 466.266148][T28194] should_fail+0x23c/0x250
[ 466.270675][T28194] ? mempool_alloc_slab+0x16/0x20
[ 466.275880][T28194] __should_failslab+0x81/0x90
[ 466.280785][T28194] should_failslab+0x5/0x20
[ 466.285353][T28194] kmem_cache_alloc+0x4f/0x320
[ 466.290131][T28194] mempool_alloc_slab+0x16/0x20
[ 466.294989][T28194] ? mempool_free+0x130/0x130
[ 466.299696][T28194] mempool_alloc+0x9d/0x310
[ 466.304202][T28194] ? __rcu_read_unlock+0x45/0x290
[ 466.309351][T28194] ? __this_cpu_preempt_check+0x18/0x20
[ 466.314999][T28194] bio_alloc_bioset+0xcc/0x560
[ 466.319853][T28194] submit_bh_wbc+0x133/0x320
[ 466.324512][T28194] __block_write_full_page+0x648/0xa10
[ 466.329984][T28194] ? mark_buffer_write_io_error+0x180/0x180
[ 466.336304][T28194] ? fat_block_truncate_page+0x30/0x30
[ 466.341811][T28194] ? fat_block_truncate_page+0x30/0x30
[ 466.347356][T28194] block_write_full_page+0x1f0/0x210
[ 466.352657][T28194] fat_writepage+0x20/0x30
[ 466.357261][T28194] move_to_new_page+0x2f6/0x520
[ 466.362215][T28194] ? remove_migration_ptes+0x90/0x90
[ 466.367917][T28194] migrate_pages+0xdec/0x1810
[ 466.372774][T28194] ? do_mbind+0x760/0x760
[ 466.377112][T28194] do_mbind+0x5b7/0x760
[ 466.381311][T28194] __se_sys_mbind+0x151/0x410
[ 466.385989][T28194] __x64_sys_mbind+0x74/0x80
[ 466.390653][T28194] do_syscall_64+0x44/0xd0
[ 466.395206][T28194] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 466.401176][T28194] RIP: 0033:0x7f0d68981059
[ 466.406022][T28194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 466.425633][T28194] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 466.434424][T28194] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059
[ 466.442668][T28194] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 466.450677][T28194] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002
[ 466.458795][T28194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 466.467028][T28194] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000
[ 466.474991][T28194]
[ 466.481421][T28197] FAULT_INJECTION: forcing a failure.
[ 466.481421][T28197] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 466.495174][T28197] CPU: 0 PID: 28197 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 466.506298][T28197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 466.516352][T28197] Call Trace:
[ 466.519639][T28197]
[ 466.522588][T28197] dump_stack_lvl+0xd6/0x122
[ 466.527260][T28197] dump_stack+0x11/0x1b
[ 466.531445][T28197] should_fail+0x23c/0x250
[ 466.535988][T28197] __alloc_pages+0x102/0x330
[ 466.540588][T28197] alloc_pages_vma+0x67e/0x810
[ 466.545414][T28197] new_page+0x121/0x170
[ 466.549608][T28197] migrate_pages+0x465/0x1810
[ 466.554292][T28197] ? do_mbind+0x760/0x760
[ 466.558638][T28197] ? remove_migration_ptes+0x90/0x90
[ 466.563931][T28197] do_mbind+0x5b7/0x760
18:38:30 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:30 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000006000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:30 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 3)
[ 466.568256][T28197] __se_sys_mbind+0x151/0x410
[ 466.572975][T28197] __x64_sys_mbind+0x74/0x80
[ 466.577692][T28197] do_syscall_64+0x44/0xd0
[ 466.582193][T28197] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 466.588452][T28197] RIP: 0033:0x7fb80e59e059
[ 466.592885][T28197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 466.602078][T28202] loop4: detected capacity change from 0 to 264192
[ 466.612700][T28197] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 466.612745][T28197] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 466.612760][T28197] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 466.642504][T28202] FAT-fs (loop4): invalid media value (0x00)
[ 466.643860][T28197] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 466.643877][T28197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
18:38:30 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 6)
18:38:30 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001400000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 466.643897][T28197] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 466.649895][T28202] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 466.657815][T28197]
18:38:30 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:30 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001600000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 466.764341][T28211] loop5: detected capacity change from 0 to 264192
[ 466.796282][T28205] FAULT_INJECTION: forcing a failure.
[ 466.796282][T28205] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 466.809675][T28205] CPU: 1 PID: 28205 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 466.820828][T28205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 466.830900][T28205] Call Trace:
[ 466.834236][T28205]
[ 466.837159][T28205] dump_stack_lvl+0xd6/0x122
[ 466.841756][T28205] dump_stack+0x11/0x1b
[ 466.845936][T28205] should_fail+0x23c/0x250
[ 466.850444][T28205] __alloc_pages+0x102/0x330
[ 466.855045][T28205] alloc_pages_vma+0x67e/0x810
[ 466.859888][T28205] new_page+0x121/0x170
[ 466.864148][T28205] migrate_pages+0x465/0x1810
[ 466.868834][T28205] ? do_mbind+0x760/0x760
[ 466.873162][T28205] ? remove_migration_ptes+0x90/0x90
[ 466.878456][T28205] do_mbind+0x5b7/0x760
[ 466.882614][T28205] __se_sys_mbind+0x151/0x410
[ 466.887308][T28205] __x64_sys_mbind+0x74/0x80
[ 466.892202][T28205] do_syscall_64+0x44/0xd0
[ 466.896621][T28205] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 466.902528][T28205] RIP: 0033:0x7fb80e59e059
[ 466.906944][T28205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 466.926609][T28205] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 466.935138][T28205] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 466.943120][T28205] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 466.951106][T28205] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 466.959078][T28205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 466.967049][T28205] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 466.975036][T28205]
[ 466.985024][T28211] FAULT_INJECTION: forcing a failure.
[ 466.985024][T28211] name failslab, interval 1, probability 0, space 0, times 0
[ 466.997683][T28211] CPU: 0 PID: 28211 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 467.008849][T28211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 467.018924][T28211] Call Trace:
[ 467.022188][T28211]
[ 467.025103][T28211] dump_stack_lvl+0xd6/0x122
[ 467.029730][T28211] dump_stack+0x11/0x1b
[ 467.033948][T28211] should_fail+0x23c/0x250
[ 467.038514][T28211] ? mempool_alloc_slab+0x16/0x20
[ 467.043542][T28211] __should_failslab+0x81/0x90
[ 467.048320][T28211] should_failslab+0x5/0x20
[ 467.053518][T28211] kmem_cache_alloc+0x4f/0x320
[ 467.058272][T28211] mempool_alloc_slab+0x16/0x20
[ 467.063217][T28211] ? mempool_free+0x130/0x130
[ 467.067895][T28211] mempool_alloc+0x9d/0x310
[ 467.072381][T28211] ? submit_bio_noacct+0x49f/0x4e0
[ 467.077475][T28211] bio_alloc_bioset+0xcc/0x560
[ 467.082299][T28211] submit_bh_wbc+0x133/0x320
[ 467.086950][T28211] __block_write_full_page+0x648/0xa10
[ 467.092467][T28211] ? mark_buffer_write_io_error+0x180/0x180
[ 467.098437][T28211] ? fat_block_truncate_page+0x30/0x30
[ 467.104625][T28211] ? fat_block_truncate_page+0x30/0x30
[ 467.110224][T28211] block_write_full_page+0x1f0/0x210
[ 467.115541][T28211] fat_writepage+0x20/0x30
[ 467.119961][T28211] move_to_new_page+0x2f6/0x520
[ 467.124828][T28211] ? remove_migration_ptes+0x90/0x90
[ 467.130134][T28211] migrate_pages+0xdec/0x1810
[ 467.134861][T28211] ? do_mbind+0x760/0x760
[ 467.139205][T28211] do_mbind+0x5b7/0x760
[ 467.143378][T28211] __se_sys_mbind+0x151/0x410
[ 467.148118][T28211] __x64_sys_mbind+0x74/0x80
[ 467.152714][T28211] do_syscall_64+0x44/0xd0
[ 467.157158][T28211] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 467.163097][T28211] RIP: 0033:0x7f0d68981059
[ 467.167507][T28211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 467.187219][T28211] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 467.195613][T28211] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 467.203595][T28211] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
18:38:30 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0)
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:30 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:30 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 7)
18:38:30 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001800000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 467.211671][T28211] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
[ 467.219898][T28211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 467.228147][T28211] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 467.236105][T28211]
18:38:31 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 467.351207][T28219] FAULT_INJECTION: forcing a failure.
[ 467.351207][T28219] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 467.364539][T28219] CPU: 1 PID: 28219 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 467.375567][T28219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 467.385629][T28219] Call Trace:
[ 467.388932][T28219]
[ 467.391906][T28219] dump_stack_lvl+0xd6/0x122
[ 467.396513][T28219] dump_stack+0x11/0x1b
[ 467.400677][T28219] should_fail+0x23c/0x250
[ 467.405178][T28219] __alloc_pages+0x102/0x330
[ 467.409776][T28219] alloc_pages_vma+0x67e/0x810
[ 467.414554][T28219] new_page+0x121/0x170
[ 467.418793][T28219] migrate_pages+0x465/0x1810
[ 467.423508][T28219] ? do_mbind+0x760/0x760
[ 467.427857][T28219] ? remove_migration_ptes+0x90/0x90
[ 467.433315][T28219] do_mbind+0x5b7/0x760
[ 467.437497][T28219] __se_sys_mbind+0x151/0x410
[ 467.442180][T28219] __x64_sys_mbind+0x74/0x80
[ 467.445275][T28227] loop4: detected capacity change from 0 to 264192
[ 467.446772][T28219] do_syscall_64+0x44/0xd0
[ 467.446795][T28219] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 467.463561][T28219] RIP: 0033:0x7fb80e59e059
[ 467.467979][T28219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 467.472617][T28227] FAT-fs (loop4): invalid media value (0x00)
[ 467.487740][T28219] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:31 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:31 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 4)
18:38:31 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000001900000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 467.487764][T28219] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 467.487776][T28219] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 467.487790][T28219] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 467.493776][T28227] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 467.502142][T28219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 467.502157][T28219] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 467.548628][T28219]
18:38:31 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 467.588479][T28230] loop1: detected capacity change from 0 to 264192
18:38:31 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000002500000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 467.631540][T28235] loop5: detected capacity change from 0 to 264192
18:38:31 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 8)
18:38:31 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000004906000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 467.733068][T28242] FAULT_INJECTION: forcing a failure.
[ 467.733068][T28242] name failslab, interval 1, probability 0, space 0, times 0
[ 467.745928][T28242] CPU: 1 PID: 28242 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 467.756958][T28242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 467.767006][T28242] Call Trace:
[ 467.770280][T28242]
[ 467.773200][T28242] dump_stack_lvl+0xd6/0x122
[ 467.777800][T28242] dump_stack+0x11/0x1b
[ 467.781954][T28242] should_fail+0x23c/0x250
[ 467.786515][T28242] ? mempool_alloc_slab+0x16/0x20
[ 467.791541][T28242] __should_failslab+0x81/0x90
[ 467.796303][T28242] should_failslab+0x5/0x20
[ 467.800813][T28242] kmem_cache_alloc+0x4f/0x320
[ 467.805627][T28242] mempool_alloc_slab+0x16/0x20
[ 467.810474][T28242] ? mempool_free+0x130/0x130
[ 467.815163][T28242] mempool_alloc+0x9d/0x310
[ 467.819714][T28242] ? submit_bio_noacct+0x49f/0x4e0
[ 467.824832][T28242] bio_alloc_bioset+0xcc/0x560
[ 467.829654][T28242] submit_bh_wbc+0x133/0x320
[ 467.835899][T28242] __block_write_full_page+0x648/0xa10
[ 467.841458][T28242] ? mark_buffer_write_io_error+0x180/0x180
[ 467.847467][T28242] ? fat_block_truncate_page+0x30/0x30
[ 467.852971][T28242] ? fat_block_truncate_page+0x30/0x30
[ 467.858444][T28242] block_write_full_page+0x1f0/0x210
[ 467.863771][T28242] fat_writepage+0x20/0x30
[ 467.868253][T28242] move_to_new_page+0x2f6/0x520
[ 467.873180][T28242] ? remove_migration_ptes+0x90/0x90
[ 467.878468][T28242] migrate_pages+0xdec/0x1810
[ 467.883154][T28242] ? do_mbind+0x760/0x760
[ 467.887573][T28242] do_mbind+0x5b7/0x760
[ 467.891730][T28242] __se_sys_mbind+0x151/0x410
[ 467.896446][T28242] __x64_sys_mbind+0x74/0x80
[ 467.901035][T28242] do_syscall_64+0x44/0xd0
[ 467.905483][T28242] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 467.911377][T28242] RIP: 0033:0x7f0d68981059
[ 467.915825][T28242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 467.935614][T28242] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 467.944028][T28242] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059
[ 467.952040][T28242] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 467.960022][T28242] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002
[ 467.968070][T28242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 467.976020][T28242] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000
[ 467.984060][T28242]
[ 468.005410][T28249] FAULT_INJECTION: forcing a failure.
[ 468.005410][T28249] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 468.018845][T28249] CPU: 0 PID: 28249 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 468.029958][T28249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 468.040007][T28249] Call Trace:
[ 468.043283][T28249]
[ 468.046206][T28249] dump_stack_lvl+0xd6/0x122
[ 468.050801][T28249] dump_stack+0x11/0x1b
[ 468.055035][T28249] should_fail+0x23c/0x250
[ 468.059456][T28249] __alloc_pages+0x102/0x330
[ 468.064122][T28249] alloc_pages_vma+0x67e/0x810
[ 468.068961][T28249] new_page+0x121/0x170
[ 468.073131][T28249] migrate_pages+0x465/0x1810
[ 468.077822][T28249] ? do_mbind+0x760/0x760
[ 468.082189][T28249] ? remove_migration_ptes+0x90/0x90
[ 468.087492][T28249] do_mbind+0x5b7/0x760
[ 468.091650][T28249] __se_sys_mbind+0x151/0x410
[ 468.096330][T28249] __x64_sys_mbind+0x74/0x80
[ 468.100923][T28249] do_syscall_64+0x44/0xd0
[ 468.105348][T28249] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 468.111261][T28249] RIP: 0033:0x7fb80e59e059
[ 468.115732][T28249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 468.135317][T28249] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 468.143736][T28249] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
18:38:31 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:31 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:31 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:31 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000005c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:31 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 5)
[ 468.151708][T28249] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 468.159755][T28249] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 468.167726][T28249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 468.175678][T28249] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 468.183634][T28249]
18:38:31 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 9)
[ 468.218858][T28255] loop4: detected capacity change from 0 to 264192
[ 468.239017][T28257] loop5: detected capacity change from 0 to 264192
[ 468.239103][T28255] FAT-fs (loop4): invalid media value (0x00)
[ 468.251614][T28255] FAT-fs (loop4): Can't find a valid FAT filesystem
18:38:32 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:32 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000006000000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 468.280983][ T2093] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[ 468.304391][T28259] loop1: detected capacity change from 0 to 264192
[ 468.313775][ T2093] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
18:38:32 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 468.323831][ T2093] Buffer I/O error on dev loop1, logical block 33008, async page read
[ 468.384436][T28269] FAULT_INJECTION: forcing a failure.
[ 468.384436][T28269] name failslab, interval 1, probability 0, space 0, times 0
[ 468.397245][T28269] CPU: 1 PID: 28269 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 468.408275][T28269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 468.418327][T28269] Call Trace:
[ 468.421775][T28269]
[ 468.424723][T28269] dump_stack_lvl+0xd6/0x122
[ 468.429317][T28269] dump_stack+0x11/0x1b
[ 468.433523][T28269] should_fail+0x23c/0x250
[ 468.437935][T28269] ? mempool_alloc_slab+0x16/0x20
[ 468.442959][T28269] __should_failslab+0x81/0x90
[ 468.447779][T28269] should_failslab+0x5/0x20
[ 468.452281][T28269] kmem_cache_alloc+0x4f/0x320
[ 468.457075][T28269] mempool_alloc_slab+0x16/0x20
[ 468.461951][T28269] ? mempool_free+0x130/0x130
[ 468.466704][T28269] mempool_alloc+0x9d/0x310
[ 468.471264][T28269] ? submit_bio_noacct+0x49f/0x4e0
[ 468.476372][T28269] bio_alloc_bioset+0xcc/0x560
[ 468.481138][T28269] submit_bh_wbc+0x133/0x320
[ 468.485793][T28269] __block_write_full_page+0x648/0xa10
[ 468.491260][T28269] ? mark_buffer_write_io_error+0x180/0x180
[ 468.497155][T28269] ? fat_block_truncate_page+0x30/0x30
[ 468.502684][T28269] ? fat_block_truncate_page+0x30/0x30
[ 468.508194][T28269] block_write_full_page+0x1f0/0x210
[ 468.513606][T28269] fat_writepage+0x20/0x30
[ 468.518037][T28269] move_to_new_page+0x2f6/0x520
[ 468.522954][T28269] ? remove_migration_ptes+0x90/0x90
[ 468.528246][T28269] migrate_pages+0xdec/0x1810
[ 468.532991][T28269] ? do_mbind+0x760/0x760
[ 468.537320][T28269] do_mbind+0x5b7/0x760
[ 468.541474][T28269] __se_sys_mbind+0x151/0x410
[ 468.546151][T28269] __x64_sys_mbind+0x74/0x80
[ 468.550741][T28269] do_syscall_64+0x44/0xd0
[ 468.555243][T28269] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 468.561200][T28269] RIP: 0033:0x7f0d68981059
[ 468.565648][T28269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 468.585279][T28269] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 468.593695][T28269] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059
[ 468.601656][T28269] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 468.609619][T28269] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002
[ 468.617721][T28269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 468.625866][T28269] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000
[ 468.634036][T28269]
[ 468.649120][T28266] FAULT_INJECTION: forcing a failure.
[ 468.649120][T28266] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 468.662439][T28266] CPU: 0 PID: 28266 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 468.673506][T28266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
18:38:32 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007c00000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:32 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 6)
18:38:32 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 468.683804][T28266] Call Trace:
[ 468.687282][T28266]
[ 468.690203][T28266] dump_stack_lvl+0xd6/0x122
[ 468.694805][T28266] dump_stack+0x11/0x1b
[ 468.699030][T28266] should_fail+0x23c/0x250
[ 468.703454][T28266] __alloc_pages+0x102/0x330
[ 468.708100][T28266] alloc_pages_vma+0x67e/0x810
[ 468.712880][T28266] new_page+0x121/0x170
[ 468.717132][T28266] migrate_pages+0x465/0x1810
[ 468.721821][T28266] ? do_mbind+0x760/0x760
[ 468.724172][T28273] loop4: detected capacity change from 0 to 264192
[ 468.726172][T28266] ? remove_migration_ptes+0x90/0x90
[ 468.726203][T28266] do_mbind+0x5b7/0x760
[ 468.733729][T28273] FAT-fs (loop4): invalid media value (0x00)
[ 468.738054][T28266] __se_sys_mbind+0x151/0x410
[ 468.738080][T28266] __x64_sys_mbind+0x74/0x80
[ 468.742314][T28273] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 468.748228][T28266] do_syscall_64+0x44/0xd0
[ 468.768409][T28266] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 468.774474][T28266] RIP: 0033:0x7fb80e59e059
[ 468.778972][T28266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 468.798654][T28266] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 468.807047][T28266] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 468.815180][T28266] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 468.823233][T28266] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 468.831196][T28266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 468.839231][T28266] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 468.847262][T28266]
[ 468.880134][ T1913] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[ 468.919732][T28278] loop5: detected capacity change from 0 to 264192
18:38:32 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:32 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:32 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 10)
18:38:32 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:32 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 469.026457][T28278] FAULT_INJECTION: forcing a failure.
[ 469.026457][T28278] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 469.039972][T28278] CPU: 0 PID: 28278 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 469.051099][T28278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 469.061287][T28278] Call Trace:
[ 469.064566][T28278]
[ 469.067492][T28278] dump_stack_lvl+0xd6/0x122
[ 469.070765][T28284] loop4: detected capacity change from 0 to 264192
[ 469.072093][T28278] dump_stack+0x11/0x1b
[ 469.072122][T28278] should_fail+0x23c/0x250
[ 469.072142][T28278] __alloc_pages+0x102/0x330
[ 469.091886][T28278] alloc_pages_vma+0x67e/0x810
[ 469.096661][T28278] new_page+0x121/0x170
[ 469.098760][T28284] FAT-fs (loop4): invalid media value (0x00)
[ 469.100843][T28278] migrate_pages+0x465/0x1810
[ 469.106852][T28284] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 469.111604][T28278] ? do_mbind+0x760/0x760
[ 469.122521][T28278] ? remove_migration_ptes+0x90/0x90
[ 469.127973][T28278] do_mbind+0x5b7/0x760
[ 469.132135][T28278] __se_sys_mbind+0x151/0x410
[ 469.136827][T28278] __x64_sys_mbind+0x74/0x80
[ 469.141421][T28278] do_syscall_64+0x44/0xd0
[ 469.145845][T28278] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 469.151834][T28278] RIP: 0033:0x7f0d68981059
[ 469.156473][T28278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:32 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 469.176205][T28278] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 469.184618][T28278] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 469.192974][T28278] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 469.201031][T28278] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
[ 469.209330][T28278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 469.217306][T28278] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 469.225463][T28278]
[ 469.235115][T28281] FAULT_INJECTION: forcing a failure.
[ 469.235115][T28281] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 469.248708][T28281] CPU: 1 PID: 28281 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 469.260082][T28281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 469.270587][T28281] Call Trace:
[ 469.274023][T28281]
[ 469.277033][T28281] dump_stack_lvl+0xd6/0x122
[ 469.281992][T28281] dump_stack+0x11/0x1b
[ 469.286816][T28281] should_fail+0x23c/0x250
[ 469.291250][T28281] __alloc_pages+0x102/0x330
[ 469.296168][T28281] alloc_pages_vma+0x67e/0x810
[ 469.300941][T28281] new_page+0x121/0x170
[ 469.305669][T28281] migrate_pages+0x465/0x1810
[ 469.310435][T28281] ? do_mbind+0x760/0x760
[ 469.314775][T28281] ? remove_migration_ptes+0x90/0x90
[ 469.320087][T28281] do_mbind+0x5b7/0x760
[ 469.324433][T28281] __se_sys_mbind+0x151/0x410
[ 469.329106][T28281] __x64_sys_mbind+0x74/0x80
[ 469.333697][T28281] do_syscall_64+0x44/0xd0
[ 469.338384][T28281] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 469.344427][T28281] RIP: 0033:0x7fb80e59e059
[ 469.348844][T28281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 469.368932][T28281] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:33 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 7)
18:38:33 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 469.377871][T28281] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 469.386230][T28281] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 469.395089][T28281] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 469.403147][T28281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 469.411125][T28281] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 469.419524][T28281]
18:38:33 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 11)
18:38:33 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:33 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:33 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000bb05000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 469.523962][T28301] loop1: detected capacity change from 0 to 264192
[ 469.555759][T28303] loop5: detected capacity change from 0 to 264192
[ 469.616190][T28300] FAULT_INJECTION: forcing a failure.
[ 469.616190][T28300] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 469.629565][T28300] CPU: 1 PID: 28300 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 469.640585][T28300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 469.650694][T28300] Call Trace:
[ 469.653983][T28300]
[ 469.656899][T28300] dump_stack_lvl+0xd6/0x122
[ 469.661516][T28300] dump_stack+0x11/0x1b
[ 469.665725][T28300] should_fail+0x23c/0x250
[ 469.670171][T28300] __alloc_pages+0x102/0x330
[ 469.674749][T28300] alloc_pages_vma+0x67e/0x810
[ 469.679515][T28300] new_page+0x121/0x170
[ 469.683699][T28300] migrate_pages+0x465/0x1810
[ 469.688520][T28300] ? do_mbind+0x760/0x760
[ 469.692843][T28300] ? remove_migration_ptes+0x90/0x90
[ 469.698130][T28300] do_mbind+0x5b7/0x760
[ 469.702457][T28300] __se_sys_mbind+0x151/0x410
[ 469.707137][T28300] __x64_sys_mbind+0x74/0x80
[ 469.711900][T28300] do_syscall_64+0x44/0xd0
[ 469.716337][T28300] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 469.722401][T28300] RIP: 0033:0x7fb80e59e059
[ 469.726943][T28300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 469.746764][T28300] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 469.755242][T28300] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:33 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:33 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:33 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 12)
[ 469.763285][T28300] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 469.771328][T28300] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 469.779370][T28300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 469.787415][T28300] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 469.795466][T28300]
[ 469.837469][T28303] FAULT_INJECTION: forcing a failure.
[ 469.837469][T28303] name failslab, interval 1, probability 0, space 0, times 0
[ 469.850116][T28303] CPU: 1 PID: 28303 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 469.861139][T28303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 469.871197][T28303] Call Trace:
[ 469.874474][T28303]
[ 469.877411][T28303] dump_stack_lvl+0xd6/0x122
[ 469.882182][T28303] dump_stack+0x11/0x1b
18:38:33 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:33 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 469.886345][T28303] should_fail+0x23c/0x250
[ 469.890955][T28303] ? mempool_alloc_slab+0x16/0x20
[ 469.895987][T28303] __should_failslab+0x81/0x90
[ 469.900760][T28303] should_failslab+0x5/0x20
[ 469.905331][T28303] kmem_cache_alloc+0x4f/0x320
[ 469.910225][T28303] mempool_alloc_slab+0x16/0x20
[ 469.915151][T28303] ? mempool_free+0x130/0x130
[ 469.919829][T28303] mempool_alloc+0x9d/0x310
[ 469.924406][T28303] ? __rcu_read_unlock+0x45/0x290
[ 469.929431][T28303] ? __this_cpu_preempt_check+0x18/0x20
[ 469.935072][T28303] bio_alloc_bioset+0xcc/0x560
[ 469.939925][T28303] submit_bh_wbc+0x133/0x320
[ 469.944545][T28303] __block_write_full_page+0x648/0xa10
[ 469.950098][T28303] ? mark_buffer_write_io_error+0x180/0x180
[ 469.955998][T28303] ? fat_block_truncate_page+0x30/0x30
[ 469.961710][T28303] ? fat_block_truncate_page+0x30/0x30
[ 469.967158][T28318] loop4: detected capacity change from 0 to 264192
[ 469.967172][T28303] block_write_full_page+0x1f0/0x210
[ 469.974465][T28318] FAT-fs (loop4): invalid media value (0x00)
[ 469.979029][T28303] fat_writepage+0x20/0x30
[ 469.979058][T28303] move_to_new_page+0x2f6/0x520
[ 469.985032][T28318] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 469.989399][T28303] ? remove_migration_ptes+0x90/0x90
[ 470.006089][T28303] migrate_pages+0xdec/0x1810
[ 470.010849][T28303] ? do_mbind+0x760/0x760
[ 470.015159][T28303] ? remove_migration_ptes+0x90/0x90
[ 470.020431][T28303] do_mbind+0x5b7/0x760
[ 470.024651][T28303] __se_sys_mbind+0x151/0x410
[ 470.029465][T28303] __x64_sys_mbind+0x74/0x80
[ 470.034054][T28303] do_syscall_64+0x44/0xd0
[ 470.038463][T28303] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 470.044442][T28303] RIP: 0033:0x7f0d68981059
[ 470.048844][T28303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 470.068432][T28303] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 470.076853][T28303] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 470.084890][T28303] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 470.092968][T28303] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
[ 470.101011][T28303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 470.109005][T28303] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 470.117005][T28303]
[ 470.127045][T28314] FAULT_INJECTION: forcing a failure.
[ 470.127045][T28314] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 470.140670][T28314] CPU: 0 PID: 28314 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 470.151774][T28314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 470.161827][T28314] Call Trace:
[ 470.165103][T28314]
[ 470.168289][T28314] dump_stack_lvl+0xd6/0x122
[ 470.172947][T28314] dump_stack+0x11/0x1b
[ 470.177110][T28314] should_fail+0x23c/0x250
[ 470.181529][T28314] __alloc_pages+0x102/0x330
[ 470.186135][T28314] alloc_pages_vma+0x67e/0x810
[ 470.190995][T28314] new_page+0x121/0x170
[ 470.195222][T28314] migrate_pages+0x465/0x1810
[ 470.196937][T28323] loop1: detected capacity change from 0 to 264192
[ 470.199939][T28314] ? do_mbind+0x760/0x760
[ 470.199975][T28314] ? remove_migration_ptes+0x90/0x90
[ 470.200003][T28314] do_mbind+0x5b7/0x760
[ 470.220202][T28314] __se_sys_mbind+0x151/0x410
[ 470.224892][T28314] __x64_sys_mbind+0x74/0x80
[ 470.229517][T28314] do_syscall_64+0x44/0xd0
[ 470.233936][T28314] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 470.239891][T28314] RIP: 0033:0x7fb80e59e059
[ 470.244351][T28314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 470.263955][T28314] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 470.272475][T28314] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 470.280519][T28314] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
18:38:34 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 8)
18:38:34 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 470.288486][T28314] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 470.296558][T28314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 470.304524][T28314] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 470.312617][T28314]
18:38:34 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:34 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 13)
[ 470.339896][ T1913] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
18:38:34 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:34 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:34 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 470.427215][T28332] loop5: detected capacity change from 0 to 264192
[ 470.480005][T28336] loop4: detected capacity change from 0 to 264192
[ 470.490014][T28336] FAT-fs (loop4): bogus number of FAT sectors
[ 470.496198][T28336] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 470.524295][T28330] FAULT_INJECTION: forcing a failure.
[ 470.524295][T28330] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 470.537570][T28330] CPU: 1 PID: 28330 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 470.548595][T28330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 470.558788][T28330] Call Trace:
[ 470.562129][T28330]
[ 470.565057][T28330] dump_stack_lvl+0xd6/0x122
[ 470.569660][T28330] dump_stack+0x11/0x1b
[ 470.573868][T28330] should_fail+0x23c/0x250
[ 470.578861][T28330] __alloc_pages+0x102/0x330
[ 470.583452][T28330] alloc_pages_vma+0x67e/0x810
[ 470.588323][T28330] new_page+0x121/0x170
[ 470.592553][T28330] migrate_pages+0x465/0x1810
[ 470.597239][T28330] ? do_mbind+0x760/0x760
[ 470.601736][T28330] ? remove_migration_ptes+0x90/0x90
[ 470.607065][T28330] do_mbind+0x5b7/0x760
[ 470.611242][T28330] __se_sys_mbind+0x151/0x410
[ 470.615947][T28330] __x64_sys_mbind+0x74/0x80
18:38:34 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 470.620693][T28330] do_syscall_64+0x44/0xd0
[ 470.625126][T28330] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 470.631022][T28330] RIP: 0033:0x7fb80e59e059
[ 470.635492][T28330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 470.655097][T28330] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 470.663514][T28330] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 470.671556][T28330] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 470.679516][T28330] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 470.687484][T28330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 470.695437][T28330] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 470.703414][T28330]
[ 470.725900][T28341] FAULT_INJECTION: forcing a failure.
[ 470.725900][T28341] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 470.739219][T28341] CPU: 0 PID: 28341 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 470.750284][T28341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 470.760434][T28341] Call Trace:
[ 470.763784][T28341]
[ 470.766829][T28341] dump_stack_lvl+0xd6/0x122
[ 470.771466][T28341] dump_stack+0x11/0x1b
18:38:34 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 14)
18:38:34 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 470.775628][T28341] should_fail+0x23c/0x250
[ 470.780055][T28341] __alloc_pages+0x102/0x330
[ 470.784733][T28341] alloc_pages_vma+0x67e/0x810
[ 470.789505][T28341] new_page+0x121/0x170
[ 470.793687][T28341] migrate_pages+0x465/0x1810
[ 470.798419][T28341] ? do_mbind+0x760/0x760
[ 470.802770][T28341] ? remove_migration_ptes+0x90/0x90
[ 470.808136][T28341] do_mbind+0x5b7/0x760
[ 470.812328][T28341] __se_sys_mbind+0x151/0x410
[ 470.817012][T28341] __x64_sys_mbind+0x74/0x80
[ 470.821643][T28341] do_syscall_64+0x44/0xd0
18:38:34 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 470.826095][T28341] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 470.831999][T28341] RIP: 0033:0x7f0d68981059
[ 470.836495][T28341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 470.856104][T28341] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 470.864668][T28341] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059
[ 470.872645][T28341] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 470.880709][T28341] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002
[ 470.883572][T28350] loop4: detected capacity change from 0 to 264192
[ 470.888722][T28341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 470.903198][T28341] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000
[ 470.911889][T28341]
18:38:34 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 470.924195][T28350] FAT-fs (loop4): bogus number of FAT sectors
[ 470.930326][T28350] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 470.942480][T28354] loop1: detected capacity change from 0 to 264192
[ 470.957573][T28352] FAULT_INJECTION: forcing a failure.
[ 470.957573][T28352] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 470.970933][T28352] CPU: 0 PID: 28352 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 470.982054][T28352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 470.992122][T28352] Call Trace:
[ 470.995401][T28352]
[ 470.998392][T28352] dump_stack_lvl+0xd6/0x122
[ 471.003026][T28352] dump_stack+0x11/0x1b
[ 471.007231][T28352] should_fail+0x23c/0x250
[ 471.011756][T28352] __alloc_pages+0x102/0x330
[ 471.016565][T28352] alloc_pages_vma+0x67e/0x810
[ 471.021355][T28352] new_page+0x121/0x170
18:38:34 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 9)
18:38:34 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 471.025647][T28352] migrate_pages+0x465/0x1810
[ 471.030416][T28352] ? do_mbind+0x760/0x760
[ 471.034851][T28352] ? remove_migration_ptes+0x90/0x90
[ 471.040143][T28352] do_mbind+0x5b7/0x760
[ 471.044337][T28352] __se_sys_mbind+0x151/0x410
[ 471.049012][T28352] __x64_sys_mbind+0x74/0x80
[ 471.053605][T28352] do_syscall_64+0x44/0xd0
[ 471.058073][T28352] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 471.064073][T28352] RIP: 0033:0x7fb80e59e059
[ 471.068483][T28352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 471.088956][T28352] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 471.097436][T28352] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 471.105588][T28352] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 471.113552][T28352] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
18:38:34 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:34 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 15)
[ 471.122261][T28352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 471.130307][T28352] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 471.138375][T28352]
18:38:34 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:34 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:34 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:34 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 471.222982][T28366] loop1: detected capacity change from 0 to 264192
[ 471.224568][T28367] loop5: detected capacity change from 0 to 264192
[ 471.307401][T28377] loop4: detected capacity change from 0 to 264192
[ 471.309222][T28369] FAULT_INJECTION: forcing a failure.
[ 471.309222][T28369] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 471.327293][T28369] CPU: 1 PID: 28369 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 471.332142][T28377] FAT-fs (loop4): bogus number of FAT sectors
[ 471.338508][T28369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 471.338522][T28369] Call Trace:
[ 471.338534][T28369]
[ 471.338540][T28369] dump_stack_lvl+0xd6/0x122
[ 471.344608][T28377] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 471.354723][T28369] dump_stack+0x11/0x1b
[ 471.354753][T28369] should_fail+0x23c/0x250
[ 471.381071][T28369] __alloc_pages+0x102/0x330
[ 471.385707][T28369] alloc_pages_vma+0x67e/0x810
[ 471.390477][T28369] new_page+0x121/0x170
[ 471.394659][T28369] migrate_pages+0x465/0x1810
[ 471.399380][T28369] ? do_mbind+0x760/0x760
[ 471.403694][T28369] ? remove_migration_ptes+0x90/0x90
[ 471.409009][T28369] do_mbind+0x5b7/0x760
[ 471.413167][T28369] __se_sys_mbind+0x151/0x410
[ 471.417843][T28369] __x64_sys_mbind+0x74/0x80
[ 471.422465][T28369] do_syscall_64+0x44/0xd0
[ 471.426883][T28369] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 471.432850][T28369] RIP: 0033:0x7fb80e59e059
[ 471.437258][T28369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 471.456862][T28369] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 471.465286][T28369] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 471.473255][T28369] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 471.481245][T28369] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 471.489275][T28369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 471.497244][T28369] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 471.505230][T28369]
[ 471.510679][T28367] FAULT_INJECTION: forcing a failure.
[ 471.510679][T28367] name failslab, interval 1, probability 0, space 0, times 0
[ 471.523486][T28367] CPU: 0 PID: 28367 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 471.534504][T28367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 471.545068][T28367] Call Trace:
[ 471.548364][T28367]
[ 471.551279][T28367] dump_stack_lvl+0xd6/0x122
[ 471.556030][T28367] dump_stack+0x11/0x1b
[ 471.560220][T28367] should_fail+0x23c/0x250
[ 471.564719][T28367] ? mempool_alloc_slab+0x16/0x20
[ 471.569767][T28367] __should_failslab+0x81/0x90
[ 471.574611][T28367] should_failslab+0x5/0x20
[ 471.579155][T28367] kmem_cache_alloc+0x4f/0x320
[ 471.584209][T28367] mempool_alloc_slab+0x16/0x20
[ 471.589279][T28367] ? mempool_free+0x130/0x130
[ 471.593973][T28367] mempool_alloc+0x9d/0x310
[ 471.598559][T28367] ? submit_bio_noacct+0x49f/0x4e0
[ 471.603671][T28367] bio_alloc_bioset+0xcc/0x560
[ 471.608496][T28367] submit_bh_wbc+0x133/0x320
[ 471.613137][T28367] __block_write_full_page+0x648/0xa10
[ 471.618590][T28367] ? mark_buffer_write_io_error+0x180/0x180
[ 471.624557][T28367] ? fat_block_truncate_page+0x30/0x30
[ 471.630016][T28367] ? fat_block_truncate_page+0x30/0x30
[ 471.635501][T28367] block_write_full_page+0x1f0/0x210
[ 471.641266][T28367] fat_writepage+0x20/0x30
[ 471.645704][T28367] move_to_new_page+0x2f6/0x520
[ 471.650562][T28367] ? remove_migration_ptes+0x90/0x90
[ 471.655989][T28367] migrate_pages+0xdec/0x1810
[ 471.660665][T28367] ? do_mbind+0x760/0x760
[ 471.665059][T28367] ? remove_migration_ptes+0x90/0x90
[ 471.670334][T28367] do_mbind+0x5b7/0x760
[ 471.674476][T28367] __se_sys_mbind+0x151/0x410
[ 471.679140][T28367] __x64_sys_mbind+0x74/0x80
[ 471.683852][T28367] do_syscall_64+0x44/0xd0
[ 471.688343][T28367] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 471.694431][T28367] RIP: 0033:0x7f0d68981059
[ 471.698830][T28367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 471.718667][T28367] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 471.727470][T28367] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 471.736057][T28367] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 471.744019][T28367] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
[ 471.752158][T28367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
18:38:35 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 16)
18:38:35 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:35 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:35 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 471.760113][T28367] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 471.768150][T28367]
[ 471.881692][T28390] loop1: detected capacity change from 0 to 264192
[ 471.889653][T28383] FAULT_INJECTION: forcing a failure.
[ 471.889653][T28383] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 471.902901][T28383] CPU: 1 PID: 28383 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 471.914159][T28383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 471.924252][T28383] Call Trace:
[ 471.927531][T28383]
[ 471.930457][T28383] dump_stack_lvl+0xd6/0x122
[ 471.935065][T28383] dump_stack+0x11/0x1b
[ 471.939306][T28383] should_fail+0x23c/0x250
[ 471.943784][T28383] __alloc_pages+0x102/0x330
[ 471.948377][T28383] alloc_pages_vma+0x67e/0x810
[ 471.953142][T28383] new_page+0x121/0x170
[ 471.957352][T28383] migrate_pages+0x465/0x1810
[ 471.962046][T28383] ? do_mbind+0x760/0x760
[ 471.966385][T28383] ? remove_migration_ptes+0x90/0x90
[ 471.971685][T28383] do_mbind+0x5b7/0x760
[ 471.975910][T28383] __se_sys_mbind+0x151/0x410
[ 471.980626][T28383] __x64_sys_mbind+0x74/0x80
[ 471.985238][T28383] do_syscall_64+0x44/0xd0
[ 471.989658][T28383] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 471.995656][T28383] RIP: 0033:0x7fb80e59e059
[ 472.000074][T28383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 472.019777][T28383] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:35 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 10)
18:38:35 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:35 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0)
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 472.028235][T28383] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 472.036300][T28383] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 472.044278][T28383] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 472.052245][T28383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 472.060303][T28383] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 472.068363][T28383]
18:38:35 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 17)
18:38:35 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:35 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000040000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:35 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 472.088554][T28394] loop4: detected capacity change from 0 to 264192
18:38:35 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000649000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:35 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 472.158418][T28404] loop1: detected capacity change from 0 to 264192
[ 472.158438][T28405] loop5: detected capacity change from 0 to 264192
18:38:35 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 472.230607][T28397] FAULT_INJECTION: forcing a failure.
[ 472.230607][T28397] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 472.244000][T28397] CPU: 0 PID: 28397 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 472.255027][T28397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 472.265289][T28397] Call Trace:
[ 472.268566][T28397]
[ 472.271580][T28397] dump_stack_lvl+0xd6/0x122
[ 472.276253][T28397] dump_stack+0x11/0x1b
[ 472.280424][T28397] should_fail+0x23c/0x250
[ 472.284877][T28397] __alloc_pages+0x102/0x330
[ 472.289472][T28397] alloc_pages_vma+0x67e/0x810
[ 472.294240][T28397] new_page+0x121/0x170
[ 472.298443][T28397] migrate_pages+0x465/0x1810
[ 472.303339][T28397] ? do_mbind+0x760/0x760
[ 472.307754][T28397] ? remove_migration_ptes+0x90/0x90
[ 472.313081][T28397] do_mbind+0x5b7/0x760
[ 472.317242][T28397] __se_sys_mbind+0x151/0x410
[ 472.321919][T28397] __x64_sys_mbind+0x74/0x80
[ 472.326509][T28397] do_syscall_64+0x44/0xd0
[ 472.330944][T28397] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 472.336835][T28397] RIP: 0033:0x7fb80e59e059
[ 472.341239][T28397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 472.361014][T28397] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 472.369569][T28397] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 472.377674][T28397] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 472.385895][T28397] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 472.393908][T28397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 472.402005][T28397] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 472.410079][T28397]
[ 472.415800][T28405] FAULT_INJECTION: forcing a failure.
[ 472.415800][T28405] name failslab, interval 1, probability 0, space 0, times 0
[ 472.428671][T28405] CPU: 1 PID: 28405 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 472.439782][T28405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 472.449942][T28405] Call Trace:
[ 472.453223][T28405]
[ 472.456152][T28405] dump_stack_lvl+0xd6/0x122
[ 472.460768][T28405] dump_stack+0x11/0x1b
[ 472.464964][T28405] should_fail+0x23c/0x250
[ 472.469406][T28405] ? mempool_alloc_slab+0x16/0x20
[ 472.474513][T28405] __should_failslab+0x81/0x90
[ 472.479399][T28405] should_failslab+0x5/0x20
[ 472.483957][T28405] kmem_cache_alloc+0x4f/0x320
[ 472.488733][T28405] mempool_alloc_slab+0x16/0x20
[ 472.493699][T28405] ? mempool_free+0x130/0x130
[ 472.498465][T28405] mempool_alloc+0x9d/0x310
[ 472.503058][T28405] ? submit_bio_noacct+0x49f/0x4e0
[ 472.508185][T28405] bio_alloc_bioset+0xcc/0x560
[ 472.512959][T28405] submit_bh_wbc+0x133/0x320
[ 472.522768][T28405] __block_write_full_page+0x648/0xa10
[ 472.528239][T28405] ? mark_buffer_write_io_error+0x180/0x180
[ 472.534134][T28405] ? fat_block_truncate_page+0x30/0x30
[ 472.539644][T28405] ? fat_block_truncate_page+0x30/0x30
[ 472.545150][T28405] block_write_full_page+0x1f0/0x210
[ 472.550440][T28405] fat_writepage+0x20/0x30
[ 472.554987][T28405] move_to_new_page+0x2f6/0x520
[ 472.560042][T28405] ? remove_migration_ptes+0x90/0x90
[ 472.565329][T28405] migrate_pages+0xdec/0x1810
[ 472.570035][T28405] ? do_mbind+0x760/0x760
[ 472.574368][T28405] ? remove_migration_ptes+0x90/0x90
18:38:36 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 18)
[ 472.579831][T28405] do_mbind+0x5b7/0x760
[ 472.584005][T28405] __se_sys_mbind+0x151/0x410
[ 472.589031][T28405] __x64_sys_mbind+0x74/0x80
[ 472.593617][T28405] do_syscall_64+0x44/0xd0
[ 472.598118][T28405] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 472.604081][T28405] RIP: 0033:0x7f0d68981059
[ 472.608696][T28405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:36 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0)
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 472.628467][T28405] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 472.636883][T28405] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 472.645016][T28405] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 472.652981][T28405] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
[ 472.661031][T28405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 472.668981][T28405] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 472.676938][T28405]
[ 472.703957][T28415] FAULT_INJECTION: forcing a failure.
[ 472.703957][T28415] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 472.717410][T28415] CPU: 1 PID: 28415 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 472.727095][T28417] loop1: detected capacity change from 0 to 264192
[ 472.728436][T28415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 472.728449][T28415] Call Trace:
[ 472.728455][T28415]
[ 472.751229][T28415] dump_stack_lvl+0xd6/0x122
[ 472.755831][T28415] dump_stack+0x11/0x1b
[ 472.760021][T28415] should_fail+0x23c/0x250
[ 472.764507][T28415] __alloc_pages+0x102/0x330
[ 472.769097][T28415] alloc_pages_vma+0x67e/0x810
[ 472.773940][T28415] new_page+0x121/0x170
[ 472.778097][T28415] migrate_pages+0x465/0x1810
[ 472.782806][T28415] ? do_mbind+0x760/0x760
[ 472.787169][T28415] ? remove_migration_ptes+0x90/0x90
[ 472.792704][T28415] do_mbind+0x5b7/0x760
[ 472.797039][T28415] __se_sys_mbind+0x151/0x410
18:38:36 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 11)
18:38:36 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:36 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 472.801740][T28415] __x64_sys_mbind+0x74/0x80
[ 472.806348][T28415] do_syscall_64+0x44/0xd0
[ 472.810884][T28415] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 472.816972][T28415] RIP: 0033:0x7fb80e59e059
[ 472.821390][T28415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 472.841047][T28415] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:36 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:36 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 472.849477][T28415] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 472.857545][T28415] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 472.865506][T28415] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 472.873466][T28415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 472.881423][T28415] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 472.889454][T28415]
18:38:36 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 19)
18:38:36 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:36 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 472.929166][T28425] loop4: detected capacity change from 0 to 264192
[ 472.977671][T28429] loop1: detected capacity change from 0 to 264192
[ 472.992169][T28431] loop5: detected capacity change from 0 to 264192
18:38:36 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:36 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:36 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 473.089958][T28438] FAULT_INJECTION: forcing a failure.
[ 473.089958][T28438] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 473.103218][T28438] CPU: 1 PID: 28438 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 473.114252][T28438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 473.124405][T28438] Call Trace:
[ 473.127757][T28438]
[ 473.130675][T28438] dump_stack_lvl+0xd6/0x122
[ 473.135259][T28438] dump_stack+0x11/0x1b
[ 473.139481][T28438] should_fail+0x23c/0x250
[ 473.143922][T28438] __alloc_pages+0x102/0x330
[ 473.148511][T28438] alloc_pages_vma+0x67e/0x810
[ 473.153285][T28438] new_page+0x121/0x170
[ 473.157511][T28438] migrate_pages+0x465/0x1810
[ 473.162190][T28438] ? do_mbind+0x760/0x760
[ 473.166625][T28438] ? remove_migration_ptes+0x90/0x90
[ 473.172015][T28438] do_mbind+0x5b7/0x760
[ 473.176335][T28438] __se_sys_mbind+0x151/0x410
[ 473.181017][T28438] __x64_sys_mbind+0x74/0x80
[ 473.185673][T28438] do_syscall_64+0x44/0xd0
[ 473.190105][T28438] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 473.196034][T28438] RIP: 0033:0x7f0d68981059
[ 473.200449][T28438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 473.220097][T28438] RSP: 002b:00007f0d67ad6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 473.228529][T28438] RAX: ffffffffffffffda RBX: 00007f0d68a94030 RCX: 00007f0d68981059
[ 473.236606][T28438] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 473.244578][T28438] RBP: 00007f0d67ad61d0 R08: 0000000000000006 R09: 0000010000000002
[ 473.252544][T28438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 473.260592][T28438] R13: 00007ffffb4ad59f R14: 00007f0d67ad6300 R15: 0000000000022000
[ 473.268698][T28438]
[ 473.275896][T28437] FAULT_INJECTION: forcing a failure.
[ 473.275896][T28437] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 473.289254][T28437] CPU: 0 PID: 28437 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 473.294043][T28445] loop1: detected capacity change from 0 to 264192
[ 473.300307][T28437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 473.300320][T28437] Call Trace:
[ 473.300327][T28437]
[ 473.300334][T28437] dump_stack_lvl+0xd6/0x122
[ 473.327825][T28437] dump_stack+0x11/0x1b
[ 473.332010][T28437] should_fail+0x23c/0x250
[ 473.336437][T28437] __alloc_pages+0x102/0x330
18:38:37 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0)
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 473.341030][T28437] alloc_pages_vma+0x67e/0x810
[ 473.345805][T28437] new_page+0x121/0x170
[ 473.349975][T28437] migrate_pages+0x465/0x1810
[ 473.354663][T28437] ? do_mbind+0x760/0x760
[ 473.358995][T28437] ? remove_migration_ptes+0x90/0x90
[ 473.364352][T28437] do_mbind+0x5b7/0x760
[ 473.368559][T28437] __se_sys_mbind+0x151/0x410
[ 473.373368][T28437] __x64_sys_mbind+0x74/0x80
[ 473.378052][T28437] do_syscall_64+0x44/0xd0
[ 473.382553][T28437] entry_SYSCALL_64_after_hwframe+0x44/0xae
18:38:37 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 12)
[ 473.388491][T28437] RIP: 0033:0x7fb80e59e059
[ 473.392901][T28437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 473.412870][T28437] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 473.421408][T28437] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 473.429441][T28437] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
18:38:37 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:37 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 473.437671][T28437] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 473.445653][T28437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 473.453831][T28437] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 473.461887][T28437]
18:38:37 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:37 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 20)
18:38:37 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:37 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000300000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 473.542633][T28454] loop1: detected capacity change from 0 to 264192
[ 473.573834][T28459] loop5: detected capacity change from 0 to 264192
18:38:37 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 473.597600][T28463] FAULT_INJECTION: forcing a failure.
[ 473.597600][T28463] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 473.610933][T28463] CPU: 1 PID: 28463 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 473.622040][T28463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 473.625403][T28465] loop4: detected capacity change from 0 to 264192
[ 473.632191][T28463] Call Trace:
[ 473.632200][T28463]
[ 473.632206][T28463] dump_stack_lvl+0xd6/0x122
[ 473.632236][T28463] dump_stack+0x11/0x1b
[ 473.653641][T28463] should_fail+0x23c/0x250
[ 473.658225][T28463] __alloc_pages+0x102/0x330
[ 473.663077][T28463] alloc_pages_vma+0x67e/0x810
[ 473.667857][T28463] new_page+0x121/0x170
[ 473.672033][T28463] migrate_pages+0x465/0x1810
[ 473.676846][T28463] ? do_mbind+0x760/0x760
[ 473.681450][T28463] ? remove_migration_ptes+0x90/0x90
[ 473.686837][T28463] do_mbind+0x5b7/0x760
[ 473.691014][T28463] __se_sys_mbind+0x151/0x410
[ 473.695709][T28463] __x64_sys_mbind+0x74/0x80
[ 473.700318][T28463] do_syscall_64+0x44/0xd0
[ 473.704777][T28463] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 473.711548][T28463] RIP: 0033:0x7fb80e59e059
[ 473.716076][T28463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 473.735921][T28463] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 473.744384][T28463] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 473.752438][T28463] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 473.760440][T28463] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 473.768411][T28463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 473.776407][T28463] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 473.784390][T28463]
18:38:37 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:37 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:37 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 21)
18:38:37 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 473.809912][T28469] FAULT_INJECTION: forcing a failure.
[ 473.809912][T28469] name failslab, interval 1, probability 0, space 0, times 0
[ 473.822751][T28469] CPU: 1 PID: 28469 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 473.833911][T28469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 473.844043][T28469] Call Trace:
[ 473.847321][T28469]
[ 473.850258][T28469] dump_stack_lvl+0xd6/0x122
[ 473.854973][T28469] dump_stack+0x11/0x1b
[ 473.859174][T28469] should_fail+0x23c/0x250
[ 473.863597][T28469] ? mempool_alloc_slab+0x16/0x20
[ 473.868628][T28469] __should_failslab+0x81/0x90
[ 473.873475][T28469] should_failslab+0x5/0x20
[ 473.877999][T28469] kmem_cache_alloc+0x4f/0x320
[ 473.882804][T28469] mempool_alloc_slab+0x16/0x20
[ 473.887763][T28469] ? mempool_free+0x130/0x130
[ 473.892440][T28469] mempool_alloc+0x9d/0x310
[ 473.896996][T28469] ? __rcu_read_unlock+0x45/0x290
[ 473.902024][T28469] ? __this_cpu_preempt_check+0x18/0x20
[ 473.907582][T28469] bio_alloc_bioset+0xcc/0x560
[ 473.912393][T28469] submit_bh_wbc+0x133/0x320
[ 473.916994][T28469] __block_write_full_page+0x648/0xa10
[ 473.922480][T28469] ? mark_buffer_write_io_error+0x180/0x180
[ 473.928380][T28469] ? fat_block_truncate_page+0x30/0x30
[ 473.933848][T28469] ? fat_block_truncate_page+0x30/0x30
[ 473.939374][T28469] block_write_full_page+0x1f0/0x210
[ 473.944686][T28469] fat_writepage+0x20/0x30
[ 473.949086][T28469] move_to_new_page+0x2f6/0x520
[ 473.953986][T28469] ? remove_migration_ptes+0x90/0x90
[ 473.959313][T28469] migrate_pages+0xdec/0x1810
[ 473.964004][T28469] ? do_mbind+0x760/0x760
[ 473.968347][T28469] ? remove_migration_ptes+0x90/0x90
[ 473.973619][T28469] do_mbind+0x5b7/0x760
[ 473.977802][T28469] __se_sys_mbind+0x151/0x410
[ 473.982464][T28469] __x64_sys_mbind+0x74/0x80
[ 473.987107][T28469] do_syscall_64+0x44/0xd0
[ 473.991569][T28469] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 473.997538][T28469] RIP: 0033:0x7f0d68981059
[ 474.001937][T28469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 474.021813][T28469] RSP: 002b:00007f0d67ab5168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 474.030211][T28469] RAX: ffffffffffffffda RBX: 00007f0d68a94100 RCX: 00007f0d68981059
[ 474.038193][T28469] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 474.046174][T28469] RBP: 00007f0d67ab51d0 R08: 0000000000000006 R09: 0000010000000002
[ 474.054172][T28469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 474.062190][T28469] R13: 00007ffffb4ad59f R14: 00007f0d67ab5300 R15: 0000000000022000
[ 474.070152][T28469]
[ 474.091705][T28473] FAULT_INJECTION: forcing a failure.
[ 474.091705][T28473] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 474.105069][T28473] CPU: 1 PID: 28473 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 474.116090][T28473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 474.126171][T28473] Call Trace:
[ 474.129587][T28473]
[ 474.132507][T28473] dump_stack_lvl+0xd6/0x122
[ 474.137288][T28473] dump_stack+0x11/0x1b
[ 474.141497][T28473] should_fail+0x23c/0x250
[ 474.145925][T28473] __alloc_pages+0x102/0x330
[ 474.150520][T28473] alloc_pages_vma+0x67e/0x810
[ 474.155283][T28473] new_page+0x121/0x170
[ 474.159447][T28473] migrate_pages+0x465/0x1810
[ 474.164130][T28473] ? do_mbind+0x760/0x760
[ 474.168728][T28473] ? remove_migration_ptes+0x90/0x90
[ 474.174151][T28473] do_mbind+0x5b7/0x760
[ 474.178326][T28473] __se_sys_mbind+0x151/0x410
[ 474.183000][T28473] __x64_sys_mbind+0x74/0x80
[ 474.187590][T28473] do_syscall_64+0x44/0xd0
[ 474.192027][T28473] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 474.197980][T28473] RIP: 0033:0x7fb80e59e059
18:38:37 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 13)
18:38:37 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 474.202410][T28473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 474.222044][T28473] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 474.230589][T28473] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 474.238582][T28473] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 474.246589][T28473] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 474.254547][T28473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 474.262505][T28473] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 474.270563][T28473]
[ 474.297602][T28479] loop4: detected capacity change from 0 to 264192
18:38:38 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:38 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 22)
18:38:38 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 474.311989][T28480] loop1: detected capacity change from 0 to 264192
[ 474.341281][T28484] loop5: detected capacity change from 0 to 264192
18:38:38 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000040000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:38 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:38 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 474.461450][T28484] FAULT_INJECTION: forcing a failure.
[ 474.461450][T28484] name failslab, interval 1, probability 0, space 0, times 0
[ 474.474133][T28484] CPU: 1 PID: 28484 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 474.485161][T28484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 474.495217][T28484] Call Trace:
[ 474.498492][T28484]
[ 474.501421][T28484] dump_stack_lvl+0xd6/0x122
[ 474.506015][T28484] dump_stack+0x11/0x1b
[ 474.510207][T28484] should_fail+0x23c/0x250
[ 474.514730][T28484] ? mempool_alloc_slab+0x16/0x20
[ 474.519752][T28484] __should_failslab+0x81/0x90
[ 474.524540][T28484] should_failslab+0x5/0x20
[ 474.529082][T28484] kmem_cache_alloc+0x4f/0x320
[ 474.533906][T28484] mempool_alloc_slab+0x16/0x20
[ 474.538750][T28484] ? mempool_free+0x130/0x130
[ 474.543417][T28484] mempool_alloc+0x9d/0x310
[ 474.547915][T28484] ? submit_bio_noacct+0x49f/0x4e0
[ 474.553026][T28484] bio_alloc_bioset+0xcc/0x560
[ 474.557849][T28484] submit_bh_wbc+0x133/0x320
[ 474.562508][T28484] __block_write_full_page+0x648/0xa10
[ 474.568059][T28484] ? mark_buffer_write_io_error+0x180/0x180
[ 474.574029][T28484] ? fat_block_truncate_page+0x30/0x30
[ 474.579539][T28484] ? fat_block_truncate_page+0x30/0x30
[ 474.585000][T28484] block_write_full_page+0x1f0/0x210
[ 474.590318][T28484] fat_writepage+0x20/0x30
[ 474.594740][T28484] move_to_new_page+0x2f6/0x520
[ 474.599634][T28484] ? remove_migration_ptes+0x90/0x90
[ 474.604948][T28484] migrate_pages+0xdec/0x1810
[ 474.609646][T28484] ? do_mbind+0x760/0x760
[ 474.614186][T28484] ? remove_migration_ptes+0x90/0x90
[ 474.619519][T28484] do_mbind+0x5b7/0x760
[ 474.623677][T28484] __se_sys_mbind+0x151/0x410
[ 474.628353][T28484] __x64_sys_mbind+0x74/0x80
[ 474.632973][T28484] do_syscall_64+0x44/0xd0
[ 474.637388][T28484] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 474.643279][T28484] RIP: 0033:0x7f0d68981059
18:38:38 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 474.647681][T28484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 474.667307][T28484] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 474.675715][T28484] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 474.683665][T28484] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 474.691619][T28484] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
[ 474.699602][T28484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:38:38 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000700000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:38 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 474.707646][T28484] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 474.715773][T28484]
[ 474.737977][T28498] FAULT_INJECTION: forcing a failure.
[ 474.737977][T28498] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 474.751272][T28498] CPU: 1 PID: 28498 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 474.762296][T28498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 474.767456][T28504] loop1: detected capacity change from 0 to 264192
[ 474.772346][T28498] Call Trace:
[ 474.772354][T28498]
[ 474.772361][T28498] dump_stack_lvl+0xd6/0x122
[ 474.789640][T28498] dump_stack+0x11/0x1b
[ 474.793801][T28498] should_fail+0x23c/0x250
[ 474.798217][T28498] __alloc_pages+0x102/0x330
[ 474.802812][T28498] alloc_pages_vma+0x67e/0x810
[ 474.807651][T28498] new_page+0x121/0x170
[ 474.811807][T28498] migrate_pages+0x465/0x1810
[ 474.816515][T28498] ? do_mbind+0x760/0x760
[ 474.820954][T28498] ? remove_migration_ptes+0x90/0x90
[ 474.826287][T28498] do_mbind+0x5b7/0x760
[ 474.830449][T28498] __se_sys_mbind+0x151/0x410
[ 474.835126][T28498] __x64_sys_mbind+0x74/0x80
[ 474.839764][T28498] do_syscall_64+0x44/0xd0
[ 474.844185][T28498] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 474.850174][T28498] RIP: 0033:0x7fb80e59e059
18:38:38 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:38 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 14)
[ 474.854584][T28498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 474.874189][T28498] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 474.882607][T28498] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 474.890595][T28498] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 474.898559][T28498] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
18:38:38 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 474.906516][T28498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 474.914466][T28498] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 474.922424][T28498]
18:38:38 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:38 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 23)
18:38:38 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 474.961828][T28510] loop4: detected capacity change from 0 to 264192
[ 474.982474][T28512] loop5: detected capacity change from 0 to 264192
18:38:38 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 475.083871][T28512] FAULT_INJECTION: forcing a failure.
[ 475.083871][T28512] name failslab, interval 1, probability 0, space 0, times 0
[ 475.096661][T28512] CPU: 1 PID: 28512 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 475.098435][T28524] loop1: detected capacity change from 0 to 264192
[ 475.107679][T28512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 475.107693][T28512] Call Trace:
[ 475.107699][T28512]
[ 475.107706][T28512] dump_stack_lvl+0xd6/0x122
[ 475.135202][T28512] dump_stack+0x11/0x1b
[ 475.139363][T28512] should_fail+0x23c/0x250
[ 475.143836][T28512] ? mempool_alloc_slab+0x16/0x20
[ 475.148855][T28512] __should_failslab+0x81/0x90
[ 475.153631][T28512] should_failslab+0x5/0x20
[ 475.158138][T28512] kmem_cache_alloc+0x4f/0x320
[ 475.162982][T28512] mempool_alloc_slab+0x16/0x20
[ 475.167931][T28512] ? mempool_free+0x130/0x130
[ 475.172613][T28512] mempool_alloc+0x9d/0x310
[ 475.177120][T28512] ? submit_bio_noacct+0x49f/0x4e0
[ 475.182231][T28512] bio_alloc_bioset+0xcc/0x560
[ 475.187025][T28512] submit_bh_wbc+0x133/0x320
[ 475.191620][T28512] __block_write_full_page+0x648/0xa10
[ 475.197088][T28512] ? mark_buffer_write_io_error+0x180/0x180
[ 475.202987][T28512] ? fat_block_truncate_page+0x30/0x30
[ 475.208470][T28512] ? fat_block_truncate_page+0x30/0x30
[ 475.214067][T28512] block_write_full_page+0x1f0/0x210
[ 475.219372][T28512] fat_writepage+0x20/0x30
[ 475.224000][T28512] move_to_new_page+0x2f6/0x520
[ 475.228950][T28512] ? remove_migration_ptes+0x90/0x90
18:38:38 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 475.234278][T28512] migrate_pages+0xdec/0x1810
[ 475.238974][T28512] ? do_mbind+0x760/0x760
[ 475.243300][T28512] ? remove_migration_ptes+0x90/0x90
[ 475.248650][T28512] do_mbind+0x5b7/0x760
[ 475.252807][T28512] __se_sys_mbind+0x151/0x410
[ 475.257559][T28512] __x64_sys_mbind+0x74/0x80
[ 475.262193][T28512] do_syscall_64+0x44/0xd0
[ 475.266617][T28512] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 475.272611][T28512] RIP: 0033:0x7f0d68981059
[ 475.277030][T28512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 475.296615][T28512] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 475.305127][T28512] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 475.313149][T28512] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 475.321242][T28512] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
18:38:39 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 475.329192][T28512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 475.337319][T28512] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 475.345286][T28512]
[ 475.368554][T28520] FAULT_INJECTION: forcing a failure.
[ 475.368554][T28520] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 475.381898][T28520] CPU: 0 PID: 28520 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 475.392986][T28520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 475.403043][T28520] Call Trace:
[ 475.406307][T28520]
[ 475.409225][T28520] dump_stack_lvl+0xd6/0x122
[ 475.413812][T28520] dump_stack+0x11/0x1b
[ 475.417959][T28520] should_fail+0x23c/0x250
[ 475.422396][T28520] __alloc_pages+0x102/0x330
[ 475.427031][T28520] alloc_pages_vma+0x67e/0x810
[ 475.431785][T28520] new_page+0x121/0x170
[ 475.435928][T28520] migrate_pages+0x465/0x1810
[ 475.440598][T28520] ? do_mbind+0x760/0x760
[ 475.444926][T28520] ? remove_migration_ptes+0x90/0x90
[ 475.450201][T28520] do_mbind+0x5b7/0x760
[ 475.454400][T28520] __se_sys_mbind+0x151/0x410
[ 475.459065][T28520] __x64_sys_mbind+0x74/0x80
[ 475.463640][T28520] do_syscall_64+0x44/0xd0
[ 475.468049][T28520] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 475.473933][T28520] RIP: 0033:0x7fb80e59e059
[ 475.478344][T28520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 475.498068][T28520] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 475.506554][T28520] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 475.514561][T28520] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 475.522576][T28520] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 475.530559][T28520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 475.538593][T28520] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 475.546641][T28520]
18:38:39 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002) (fail_nth: 15)
18:38:39 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000a00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:39 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:39 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000005bb000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:39 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 24)
18:38:39 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000b00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 475.631035][T28536] loop5: detected capacity change from 0 to 264192
[ 475.669688][T28539] loop4: detected capacity change from 0 to 264192
[ 475.682689][T28540] FAULT_INJECTION: forcing a failure.
[ 475.682689][T28540] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 475.695945][T28540] CPU: 1 PID: 28540 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 475.706965][T28540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 475.717134][T28540] Call Trace:
[ 475.720413][T28540]
[ 475.723412][T28540] dump_stack_lvl+0xd6/0x122
[ 475.728084][T28540] dump_stack+0x11/0x1b
[ 475.732244][T28540] should_fail+0x23c/0x250
[ 475.736845][T28540] __alloc_pages+0x102/0x330
[ 475.741441][T28540] alloc_pages_vma+0x67e/0x810
[ 475.746210][T28540] new_page+0x121/0x170
[ 475.750455][T28540] migrate_pages+0x465/0x1810
[ 475.755155][T28540] ? do_mbind+0x760/0x760
[ 475.759547][T28540] ? remove_migration_ptes+0x90/0x90
[ 475.764836][T28540] do_mbind+0x5b7/0x760
[ 475.769007][T28540] __se_sys_mbind+0x151/0x410
[ 475.773689][T28540] __x64_sys_mbind+0x74/0x80
[ 475.778302][T28540] do_syscall_64+0x44/0xd0
[ 475.782786][T28540] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 475.788732][T28540] RIP: 0033:0x7fb80e59e059
[ 475.793144][T28540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 475.800511][T28543] loop1: detected capacity change from 0 to 264192
[ 475.812742][T28540] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 475.812779][T28540] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 475.812791][T28540] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 475.812805][T28540] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 475.851631][T28540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 475.859662][T28540] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 475.867632][T28540]
[ 475.873089][T28536] FAULT_INJECTION: forcing a failure.
18:38:39 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:39 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 25)
[ 475.873089][T28536] name failslab, interval 1, probability 0, space 0, times 0
[ 475.885966][T28536] CPU: 0 PID: 28536 Comm: syz-executor.5 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 475.896984][T28536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 475.907036][T28536] Call Trace:
[ 475.910312][T28536]
[ 475.913238][T28536] dump_stack_lvl+0xd6/0x122
[ 475.917882][T28536] dump_stack+0x11/0x1b
[ 475.922061][T28536] should_fail+0x23c/0x250
[ 475.926477][T28536] ? mempool_alloc_slab+0x16/0x20
[ 475.931510][T28536] __should_failslab+0x81/0x90
[ 475.936309][T28536] should_failslab+0x5/0x20
[ 475.940881][T28536] kmem_cache_alloc+0x4f/0x320
[ 475.945647][T28536] mempool_alloc_slab+0x16/0x20
[ 475.950521][T28536] ? mempool_free+0x130/0x130
[ 475.955211][T28536] mempool_alloc+0x9d/0x310
[ 475.959715][T28536] ? submit_bio_noacct+0x49f/0x4e0
[ 475.964834][T28536] bio_alloc_bioset+0xcc/0x560
[ 475.969607][T28536] submit_bh_wbc+0x133/0x320
[ 475.974200][T28536] __block_write_full_page+0x648/0xa10
[ 475.979686][T28536] ? mark_buffer_write_io_error+0x180/0x180
[ 475.985589][T28536] ? fat_block_truncate_page+0x30/0x30
[ 475.991047][T28536] ? fat_block_truncate_page+0x30/0x30
[ 475.996573][T28536] block_write_full_page+0x1f0/0x210
[ 476.001872][T28536] fat_writepage+0x20/0x30
[ 476.006310][T28536] move_to_new_page+0x2f6/0x520
[ 476.011171][T28536] ? remove_migration_ptes+0x90/0x90
[ 476.016524][T28536] migrate_pages+0xdec/0x1810
[ 476.021273][T28536] ? do_mbind+0x760/0x760
[ 476.025648][T28536] ? remove_migration_ptes+0x90/0x90
[ 476.030941][T28536] do_mbind+0x5b7/0x760
[ 476.035095][T28536] __se_sys_mbind+0x151/0x410
[ 476.039776][T28536] __x64_sys_mbind+0x74/0x80
[ 476.044368][T28536] do_syscall_64+0x44/0xd0
[ 476.048796][T28536] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 476.054721][T28536] RIP: 0033:0x7f0d68981059
[ 476.059163][T28536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:39 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:39 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 476.078786][T28536] RSP: 002b:00007f0d67af7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 476.087334][T28536] RAX: ffffffffffffffda RBX: 00007f0d68a93f60 RCX: 00007f0d68981059
[ 476.095337][T28536] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 476.103332][T28536] RBP: 00007f0d67af71d0 R08: 0000000000000006 R09: 0000010000000002
[ 476.111330][T28536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 476.119282][T28536] R13: 00007ffffb4ad59f R14: 00007f0d67af7300 R15: 0000000000022000
[ 476.127298][T28536]
[ 476.153696][T28550] FAULT_INJECTION: forcing a failure.
[ 476.153696][T28550] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 476.167026][T28550] CPU: 1 PID: 28550 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 476.178105][T28550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 476.188158][T28550] Call Trace:
[ 476.191428][T28550]
[ 476.194387][T28550] dump_stack_lvl+0xd6/0x122
[ 476.199083][T28550] dump_stack+0x11/0x1b
[ 476.203265][T28550] should_fail+0x23c/0x250
[ 476.207675][T28550] __alloc_pages+0x102/0x330
[ 476.212419][T28550] alloc_pages_vma+0x67e/0x810
[ 476.217170][T28550] new_page+0x121/0x170
[ 476.221364][T28550] migrate_pages+0x465/0x1810
[ 476.226042][T28550] ? do_mbind+0x760/0x760
[ 476.230354][T28550] ? remove_migration_ptes+0x90/0x90
[ 476.235718][T28550] do_mbind+0x5b7/0x760
[ 476.239916][T28550] __se_sys_mbind+0x151/0x410
[ 476.244596][T28550] __x64_sys_mbind+0x74/0x80
[ 476.249170][T28550] do_syscall_64+0x44/0xd0
[ 476.253569][T28550] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 476.259526][T28550] RIP: 0033:0x7fb80e59e059
[ 476.263934][T28550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 476.283563][T28550] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 476.291969][T28550] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
18:38:40 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 476.299923][T28550] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 476.307890][T28550] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 476.315856][T28550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 476.323812][T28550] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 476.331829][T28550]
18:38:40 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 476.368054][T28553] loop4: detected capacity change from 0 to 264192
[ 476.392235][T28556] loop1: detected capacity change from 0 to 264192
18:38:40 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:40 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000d00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:40 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 26)
18:38:40 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000300000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:40 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:40 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 476.535341][T28567] loop4: detected capacity change from 0 to 264192
18:38:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:40 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 476.634416][T28574] loop5: detected capacity change from 0 to 264192
[ 476.635173][T28566] FAULT_INJECTION: forcing a failure.
[ 476.635173][T28566] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 476.654185][T28566] CPU: 0 PID: 28566 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 476.665262][T28566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 476.675313][T28566] Call Trace:
[ 476.678590][T28566]
[ 476.681541][T28566] dump_stack_lvl+0xd6/0x122
[ 476.686184][T28566] dump_stack+0x11/0x1b
[ 476.690347][T28566] should_fail+0x23c/0x250
[ 476.694763][T28566] __alloc_pages+0x102/0x330
[ 476.699374][T28566] alloc_pages_vma+0x67e/0x810
[ 476.704151][T28566] new_page+0x121/0x170
[ 476.708326][T28566] migrate_pages+0x465/0x1810
[ 476.713113][T28566] ? do_mbind+0x760/0x760
[ 476.717440][T28566] ? remove_migration_ptes+0x90/0x90
[ 476.722728][T28566] do_mbind+0x5b7/0x760
[ 476.726886][T28566] __se_sys_mbind+0x151/0x410
[ 476.731576][T28566] __x64_sys_mbind+0x74/0x80
[ 476.736183][T28566] do_syscall_64+0x44/0xd0
[ 476.740599][T28566] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 476.746577][T28566] RIP: 0033:0x7fb80e59e059
[ 476.750994][T28566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 476.770599][T28566] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 476.779110][T28566] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 476.787063][T28566] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 476.795027][T28566] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 476.802985][T28566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 476.811058][T28566] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 476.819032][T28566]
18:38:40 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000f00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:40 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 476.840431][T28577] loop4: detected capacity change from 0 to 264192
18:38:40 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 27)
[ 476.888287][T28581] loop1: detected capacity change from 0 to 264192
[ 477.009383][T28585] FAULT_INJECTION: forcing a failure.
[ 477.009383][T28585] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 477.022702][T28585] CPU: 0 PID: 28585 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 477.033854][T28585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 477.043908][T28585] Call Trace:
[ 477.047181][T28585]
[ 477.050163][T28585] dump_stack_lvl+0xd6/0x122
[ 477.054764][T28585] dump_stack+0x11/0x1b
18:38:40 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x0, 0x0, 0x6, 0x10000000002)
18:38:40 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:40 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 477.058922][T28585] should_fail+0x23c/0x250
[ 477.063396][T28585] __alloc_pages+0x102/0x330
[ 477.068006][T28585] alloc_pages_vma+0x67e/0x810
[ 477.072773][T28585] new_page+0x121/0x170
[ 477.076927][T28585] migrate_pages+0x465/0x1810
[ 477.081657][T28585] ? do_mbind+0x760/0x760
[ 477.083670][T28589] loop4: detected capacity change from 0 to 264192
[ 477.086003][T28585] ? remove_migration_ptes+0x90/0x90
[ 477.086032][T28585] do_mbind+0x5b7/0x760
[ 477.101944][T28585] __se_sys_mbind+0x151/0x410
[ 477.106623][T28585] __x64_sys_mbind+0x74/0x80
[ 477.111285][T28585] do_syscall_64+0x44/0xd0
[ 477.115746][T28585] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 477.121710][T28585] RIP: 0033:0x7fb80e59e059
[ 477.126123][T28585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 477.145733][T28585] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:40 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:40 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 28)
[ 477.154158][T28585] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 477.162116][T28585] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 477.170071][T28585] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 477.178023][T28585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 477.185979][T28585] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 477.194003][T28585]
18:38:40 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:40 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000700000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 477.286001][T28601] loop5: detected capacity change from 0 to 264192
[ 477.286714][T28599] loop4: detected capacity change from 0 to 264192
[ 477.303148][T28604] FAULT_INJECTION: forcing a failure.
[ 477.303148][T28604] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 477.308083][T28606] loop1: detected capacity change from 0 to 264192
[ 477.316420][T28604] CPU: 0 PID: 28604 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 477.333916][T28604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 477.344067][T28604] Call Trace:
[ 477.347342][T28604]
[ 477.350269][T28604] dump_stack_lvl+0xd6/0x122
[ 477.354945][T28604] dump_stack+0x11/0x1b
[ 477.359113][T28604] should_fail+0x23c/0x250
[ 477.363617][T28604] __alloc_pages+0x102/0x330
[ 477.368208][T28604] alloc_pages_vma+0x67e/0x810
[ 477.372979][T28604] new_page+0x121/0x170
[ 477.377145][T28604] migrate_pages+0x465/0x1810
[ 477.381831][T28604] ? do_mbind+0x760/0x760
[ 477.386225][T28604] ? remove_migration_ptes+0x90/0x90
[ 477.391521][T28604] do_mbind+0x5b7/0x760
[ 477.395682][T28604] __se_sys_mbind+0x151/0x410
[ 477.400361][T28604] __x64_sys_mbind+0x74/0x80
[ 477.404989][T28604] do_syscall_64+0x44/0xd0
[ 477.409408][T28604] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 477.415309][T28604] RIP: 0033:0x7fb80e59e059
[ 477.419724][T28604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 477.439451][T28604] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 477.447866][T28604] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 477.455839][T28604] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 477.463817][T28604] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 477.471792][T28604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:38:41 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:41 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:41 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 477.479757][T28604] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 477.487815][T28604]
18:38:41 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:41 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 29)
18:38:41 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:41 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00026, 0x0, 0x0, 0x6, 0x10000000002)
18:38:41 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 477.588226][T28613] loop4: detected capacity change from 0 to 264192
[ 477.612018][T28615] loop1: detected capacity change from 0 to 264192
18:38:41 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:41 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:41 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 477.707015][T28620] loop4: detected capacity change from 0 to 264192
[ 477.756030][T28630] loop5: detected capacity change from 0 to 264192
[ 477.765714][T28621] FAULT_INJECTION: forcing a failure.
[ 477.765714][T28621] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 477.778963][T28621] CPU: 1 PID: 28621 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 477.789988][T28621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 477.800058][T28621] Call Trace:
[ 477.803330][T28621]
[ 477.806255][T28621] dump_stack_lvl+0xd6/0x122
[ 477.810943][T28621] dump_stack+0x11/0x1b
[ 477.815133][T28621] should_fail+0x23c/0x250
[ 477.819614][T28621] __alloc_pages+0x102/0x330
[ 477.824198][T28621] alloc_pages_vma+0x67e/0x810
[ 477.828983][T28621] new_page+0x121/0x170
[ 477.833146][T28621] migrate_pages+0x465/0x1810
[ 477.837889][T28621] ? do_mbind+0x760/0x760
[ 477.842217][T28621] ? remove_migration_ptes+0x90/0x90
[ 477.847509][T28621] do_mbind+0x5b7/0x760
[ 477.851744][T28621] __se_sys_mbind+0x151/0x410
18:38:41 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 477.856441][T28621] __x64_sys_mbind+0x74/0x80
[ 477.861116][T28621] do_syscall_64+0x44/0xd0
[ 477.865552][T28621] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 477.871471][T28621] RIP: 0033:0x7fb80e59e059
[ 477.875882][T28621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 477.895678][T28621] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:41 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 30)
18:38:41 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:41 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000a00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 477.904086][T28621] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 477.912055][T28621] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 477.920021][T28621] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 477.927965][T28621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 477.935909][T28621] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 477.943876][T28621]
18:38:41 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:41 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:41 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000b00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 478.002559][T28638] loop4: detected capacity change from 0 to 264192
[ 478.033164][T28644] loop1: detected capacity change from 0 to 264192
[ 478.125500][T28649] loop4: detected capacity change from 0 to 264192
[ 478.134470][T28647] FAULT_INJECTION: forcing a failure.
[ 478.134470][T28647] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 478.147732][T28647] CPU: 0 PID: 28647 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 478.158831][T28647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 478.168935][T28647] Call Trace:
[ 478.172210][T28647]
[ 478.175143][T28647] dump_stack_lvl+0xd6/0x122
[ 478.179752][T28647] dump_stack+0x11/0x1b
[ 478.184106][T28647] should_fail+0x23c/0x250
[ 478.188547][T28647] __alloc_pages+0x102/0x330
[ 478.193247][T28647] alloc_pages_vma+0x67e/0x810
[ 478.198013][T28647] new_page+0x121/0x170
[ 478.202243][T28647] migrate_pages+0x465/0x1810
[ 478.206922][T28647] ? do_mbind+0x760/0x760
[ 478.211292][T28647] ? remove_migration_ptes+0x90/0x90
[ 478.216631][T28647] do_mbind+0x5b7/0x760
[ 478.220811][T28647] __se_sys_mbind+0x151/0x410
[ 478.225481][T28647] __x64_sys_mbind+0x74/0x80
[ 478.230162][T28647] do_syscall_64+0x44/0xd0
[ 478.234571][T28647] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 478.240496][T28647] RIP: 0033:0x7fb80e59e059
[ 478.244970][T28647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 478.264579][T28647] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:41 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, 0x0, 0x6, 0x10000000002)
18:38:41 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000002500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:41 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 478.273050][T28647] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 478.281021][T28647] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 478.288977][T28647] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 478.297053][T28647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 478.305021][T28647] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 478.312990][T28647]
18:38:42 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
18:38:42 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000004000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:42 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000d00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:42 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 31)
18:38:42 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:42 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 478.407511][T28660] loop5: detected capacity change from 0 to 264192
[ 478.472581][T28668] loop4: detected capacity change from 0 to 264192
[ 478.486682][T28671] loop1: detected capacity change from 0 to 264192
[ 478.511858][T28664] FAULT_INJECTION: forcing a failure.
[ 478.511858][T28664] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 478.525122][T28664] CPU: 1 PID: 28664 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 478.536225][T28664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 478.546278][T28664] Call Trace:
[ 478.549552][T28664]
[ 478.552473][T28664] dump_stack_lvl+0xd6/0x122
[ 478.557097][T28664] dump_stack+0x11/0x1b
[ 478.561259][T28664] should_fail+0x23c/0x250
[ 478.565668][T28664] __alloc_pages+0x102/0x330
18:38:42 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000064900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 478.570255][T28664] alloc_pages_vma+0x67e/0x810
[ 478.575061][T28664] new_page+0x121/0x170
[ 478.579319][T28664] migrate_pages+0x465/0x1810
[ 478.584097][T28664] ? do_mbind+0x760/0x760
[ 478.588538][T28664] ? remove_migration_ptes+0x90/0x90
[ 478.593897][T28664] do_mbind+0x5b7/0x760
[ 478.598057][T28664] __se_sys_mbind+0x151/0x410
[ 478.602755][T28664] __x64_sys_mbind+0x74/0x80
[ 478.607468][T28664] do_syscall_64+0x44/0xd0
[ 478.611959][T28664] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 478.617929][T28664] RIP: 0033:0x7fb80e59e059
[ 478.622405][T28664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 478.642015][T28664] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 478.650422][T28664] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 478.658388][T28664] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
18:38:42 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000f00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:42 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 32)
[ 478.666388][T28664] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 478.674424][T28664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 478.682400][T28664] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 478.690351][T28664]
18:38:42 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00028, 0x0, 0x0, 0x6, 0x10000000002)
18:38:42 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:42 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000005c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 478.801562][T28684] loop5: detected capacity change from 0 to 264192
[ 478.821688][T28679] FAULT_INJECTION: forcing a failure.
[ 478.821688][T28679] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 478.834967][T28679] CPU: 1 PID: 28679 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
18:38:42 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
18:38:42 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:42 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000006000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 478.845985][T28679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 478.856038][T28679] Call Trace:
[ 478.859403][T28679]
[ 478.862350][T28679] dump_stack_lvl+0xd6/0x122
[ 478.866944][T28679] dump_stack+0x11/0x1b
[ 478.871098][T28679] should_fail+0x23c/0x250
[ 478.875523][T28679] __alloc_pages+0x102/0x330
[ 478.880148][T28679] alloc_pages_vma+0x67e/0x810
[ 478.884940][T28679] new_page+0x121/0x170
[ 478.889113][T28679] migrate_pages+0x465/0x1810
[ 478.893864][T28679] ? do_mbind+0x760/0x760
[ 478.898213][T28679] ? remove_migration_ptes+0x90/0x90
[ 478.903505][T28679] do_mbind+0x5b7/0x760
[ 478.907662][T28679] __se_sys_mbind+0x151/0x410
[ 478.912336][T28679] __x64_sys_mbind+0x74/0x80
[ 478.916968][T28679] do_syscall_64+0x44/0xd0
[ 478.921385][T28679] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 478.927357][T28679] RIP: 0033:0x7fb80e59e059
[ 478.931764][T28679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 478.951369][T28679] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 478.959776][T28679] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 478.967892][T28679] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 478.975860][T28679] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 478.983813][T28679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 478.991770][T28679] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
18:38:42 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 478.999861][T28679]
18:38:42 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 33)
18:38:42 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001100000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 479.039595][T28691] loop4: detected capacity change from 0 to 264192
18:38:42 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001200000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 479.097601][T28698] loop1: detected capacity change from 0 to 264192
[ 479.164087][T28695] FAULT_INJECTION: forcing a failure.
[ 479.164087][T28695] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 479.177391][T28695] CPU: 1 PID: 28695 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 479.188411][T28695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 479.198461][T28695] Call Trace:
[ 479.201738][T28695]
[ 479.204713][T28695] dump_stack_lvl+0xd6/0x122
[ 479.209304][T28695] dump_stack+0x11/0x1b
[ 479.213450][T28695] should_fail+0x23c/0x250
[ 479.217859][T28695] __alloc_pages+0x102/0x330
[ 479.222441][T28695] alloc_pages_vma+0x67e/0x810
[ 479.227197][T28695] new_page+0x121/0x170
[ 479.231350][T28695] migrate_pages+0x465/0x1810
[ 479.236134][T28695] ? do_mbind+0x760/0x760
[ 479.240516][T28695] ? remove_migration_ptes+0x90/0x90
[ 479.245815][T28695] do_mbind+0x5b7/0x760
[ 479.249967][T28695] __se_sys_mbind+0x151/0x410
[ 479.254703][T28695] __x64_sys_mbind+0x74/0x80
[ 479.259288][T28695] do_syscall_64+0x44/0xd0
[ 479.263702][T28695] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 479.269678][T28695] RIP: 0033:0x7fb80e59e059
[ 479.274103][T28695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 479.293805][T28695] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 479.302259][T28695] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:43 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffff9e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 479.310234][T28695] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 479.318188][T28695] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 479.326142][T28695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 479.334145][T28695] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 479.342160][T28695]
18:38:43 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0006e, 0x0, 0x0, 0x6, 0x10000000002)
18:38:43 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001400000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 34)
[ 479.427237][T28708] loop4: detected capacity change from 0 to 264192
18:38:43 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
18:38:43 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffffef00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001600000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 479.525594][T28712] FAULT_INJECTION: forcing a failure.
[ 479.525594][T28712] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 479.534141][T28720] loop5: detected capacity change from 0 to 264192
[ 479.538897][T28712] CPU: 0 PID: 28712 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 479.556311][T28712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 479.566386][T28712] Call Trace:
[ 479.569655][T28712]
[ 479.572658][T28712] dump_stack_lvl+0xd6/0x122
[ 479.577327][T28712] dump_stack+0x11/0x1b
[ 479.581481][T28712] should_fail+0x23c/0x250
[ 479.585986][T28712] __alloc_pages+0x102/0x330
[ 479.590582][T28712] alloc_pages_vma+0x67e/0x810
[ 479.595350][T28712] new_page+0x121/0x170
[ 479.599504][T28712] migrate_pages+0x465/0x1810
[ 479.604217][T28712] ? do_mbind+0x760/0x760
[ 479.608578][T28712] ? remove_migration_ptes+0x90/0x90
[ 479.613867][T28712] do_mbind+0x5b7/0x760
[ 479.618035][T28712] __se_sys_mbind+0x151/0x410
[ 479.622712][T28712] __x64_sys_mbind+0x74/0x80
[ 479.627382][T28712] do_syscall_64+0x44/0xd0
[ 479.631793][T28712] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 479.637986][T28712] RIP: 0033:0x7fb80e59e059
[ 479.642395][T28712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 479.662019][T28712] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 479.670418][T28712] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 479.678419][T28712] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 479.686373][T28712] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 479.694372][T28712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 479.702352][T28712] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 479.710307][T28712]
18:38:43 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:43 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001800000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 35)
[ 479.731514][T28723] loop1: detected capacity change from 0 to 264192
18:38:43 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000001900000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 479.860786][T28735] loop4: detected capacity change from 0 to 264192
[ 479.877724][T28729] FAULT_INJECTION: forcing a failure.
[ 479.877724][T28729] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 479.891007][T28729] CPU: 1 PID: 28729 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 479.902047][T28729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 479.912099][T28729] Call Trace:
[ 479.915371][T28729]
[ 479.918297][T28729] dump_stack_lvl+0xd6/0x122
[ 479.923057][T28729] dump_stack+0x11/0x1b
[ 479.927321][T28729] should_fail+0x23c/0x250
[ 479.931742][T28729] __alloc_pages+0x102/0x330
[ 479.936335][T28729] alloc_pages_vma+0x67e/0x810
[ 479.941101][T28729] new_page+0x121/0x170
[ 479.945322][T28729] migrate_pages+0x465/0x1810
[ 479.950143][T28729] ? do_mbind+0x760/0x760
[ 479.954478][T28729] ? remove_migration_ptes+0x90/0x90
[ 479.959770][T28729] do_mbind+0x5b7/0x760
[ 479.963931][T28729] __se_sys_mbind+0x151/0x410
[ 479.968653][T28729] __x64_sys_mbind+0x74/0x80
[ 479.973247][T28729] do_syscall_64+0x44/0xd0
[ 479.977718][T28729] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 479.983671][T28729] RIP: 0033:0x7fb80e59e059
[ 479.988090][T28729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:43 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2, 0x0, 0x6, 0x10000000002)
18:38:43 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0)
18:38:43 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 36)
18:38:43 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffffe00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
[ 480.007757][T28729] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 480.016176][T28729] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 480.024147][T28729] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 480.032221][T28729] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 480.040180][T28729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 480.048224][T28729] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 480.056176][T28729]
18:38:43 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000002500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:43 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007fffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 480.119639][T28744] loop5: detected capacity change from 0 to 264192
[ 480.146891][T28745] loop1: detected capacity change from 0 to 264192
[ 480.172641][T28739] FAULT_INJECTION: forcing a failure.
[ 480.172641][T28739] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 480.185917][T28739] CPU: 1 PID: 28739 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 480.196952][T28739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 480.207003][T28739] Call Trace:
[ 480.210337][T28739]
[ 480.213279][T28739] dump_stack_lvl+0xd6/0x122
[ 480.217891][T28739] dump_stack+0x11/0x1b
18:38:43 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 480.222129][T28739] should_fail+0x23c/0x250
[ 480.226544][T28739] __alloc_pages+0x102/0x330
[ 480.231198][T28739] alloc_pages_vma+0x67e/0x810
[ 480.235976][T28739] new_page+0x121/0x170
[ 480.240142][T28739] migrate_pages+0x465/0x1810
[ 480.244822][T28739] ? do_mbind+0x760/0x760
[ 480.249198][T28739] ? remove_migration_ptes+0x90/0x90
[ 480.254566][T28739] do_mbind+0x5b7/0x760
[ 480.258737][T28739] __se_sys_mbind+0x151/0x410
[ 480.263427][T28739] __x64_sys_mbind+0x74/0x80
[ 480.268023][T28739] do_syscall_64+0x44/0xd0
[ 480.272431][T28739] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 480.278314][T28739] RIP: 0033:0x7fb80e59e059
[ 480.282717][T28739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 480.302314][T28739] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 480.310751][T28739] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 480.318710][T28739] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 480.326668][T28739] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 480.334708][T28739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 480.342712][T28739] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 480.350699][T28739]
18:38:44 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000004000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:44 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 37)
18:38:44 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000009effffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 480.374633][T28753] loop4: detected capacity change from 0 to 264192
18:38:44 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000efffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:44 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000005c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:44 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0)
18:38:44 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f0ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 480.455218][T28763] loop5: detected capacity change from 0 to 264192
[ 480.535002][T28761] FAULT_INJECTION: forcing a failure.
[ 480.535002][T28761] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 480.548264][T28761] CPU: 1 PID: 28761 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 480.559338][T28761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 480.569442][T28761] Call Trace:
[ 480.572712][T28761]
[ 480.575633][T28761] dump_stack_lvl+0xd6/0x122
[ 480.580242][T28761] dump_stack+0x11/0x1b
[ 480.584385][T28761] should_fail+0x23c/0x250
[ 480.588838][T28761] __alloc_pages+0x102/0x330
[ 480.593416][T28761] alloc_pages_vma+0x67e/0x810
[ 480.598210][T28761] new_page+0x121/0x170
[ 480.602353][T28761] migrate_pages+0x465/0x1810
[ 480.607094][T28761] ? do_mbind+0x760/0x760
[ 480.611408][T28761] ? remove_migration_ptes+0x90/0x90
[ 480.616687][T28761] do_mbind+0x5b7/0x760
[ 480.620839][T28761] __se_sys_mbind+0x151/0x410
[ 480.625504][T28761] __x64_sys_mbind+0x74/0x80
[ 480.630078][T28761] do_syscall_64+0x44/0xd0
[ 480.634478][T28761] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 480.640378][T28761] RIP: 0033:0x7fb80e59e059
[ 480.644774][T28761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 480.664419][T28761] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 480.672813][T28761] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:44 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:44 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000006000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 480.680841][T28761] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 480.688793][T28761] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 480.696748][T28761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 480.704706][T28761] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 480.712674][T28761]
18:38:44 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f5ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 480.739506][T28773] loop1: detected capacity change from 0 to 264192
18:38:44 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 38)
18:38:44 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000007c00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:44 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x6, 0x10000000002)
18:38:44 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000feffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:44 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffff9e00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:44 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x0)
[ 480.872399][T28781] loop4: detected capacity change from 0 to 264192
18:38:44 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:44 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000005bb00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 480.928672][T28789] loop5: detected capacity change from 0 to 264192
[ 480.992143][T28784] FAULT_INJECTION: forcing a failure.
[ 480.992143][T28784] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 481.005418][T28784] CPU: 0 PID: 28784 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 481.016456][T28784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 481.020190][T28799] loop1: detected capacity change from 0 to 264192
[ 481.026503][T28784] Call Trace:
[ 481.026510][T28784]
18:38:44 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x6, 0x0, 0x6, 0x10000000002)
[ 481.026517][T28784] dump_stack_lvl+0xd6/0x122
[ 481.043819][T28784] dump_stack+0x11/0x1b
[ 481.048032][T28784] should_fail+0x23c/0x250
[ 481.052523][T28784] __alloc_pages+0x102/0x330
[ 481.057165][T28784] alloc_pages_vma+0x67e/0x810
[ 481.061929][T28784] new_page+0x121/0x170
[ 481.066091][T28784] migrate_pages+0x465/0x1810
[ 481.070792][T28784] ? do_mbind+0x760/0x760
[ 481.075207][T28784] ? remove_migration_ptes+0x90/0x90
[ 481.080497][T28784] do_mbind+0x5b7/0x760
[ 481.084656][T28784] __se_sys_mbind+0x151/0x410
[ 481.089330][T28784] __x64_sys_mbind+0x74/0x80
[ 481.093922][T28784] do_syscall_64+0x44/0xd0
[ 481.098397][T28784] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 481.104292][T28784] RIP: 0033:0x7fb80e59e059
[ 481.108703][T28784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 481.128390][T28784] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:44 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:44 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x6, 0x10000000002)
18:38:44 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 481.136807][T28784] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 481.144797][T28784] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 481.152766][T28784] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 481.160774][T28784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 481.168768][T28784] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 481.176783][T28784]
18:38:44 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 39)
18:38:44 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000ffffffef00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:45 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000002000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 481.262474][T28806] loop5: detected capacity change from 0 to 264192
18:38:45 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:45 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 481.308959][T28813] loop1: detected capacity change from 0 to 264192
[ 481.346132][T28817] loop4: detected capacity change from 0 to 264192
[ 481.381137][T28804] FAULT_INJECTION: forcing a failure.
[ 481.381137][T28804] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 481.394621][T28804] CPU: 0 PID: 28804 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 481.405647][T28804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 481.415702][T28804] Call Trace:
[ 481.418978][T28804]
[ 481.421901][T28804] dump_stack_lvl+0xd6/0x122
[ 481.426531][T28804] dump_stack+0x11/0x1b
[ 481.430758][T28804] should_fail+0x23c/0x250
[ 481.435274][T28804] __alloc_pages+0x102/0x330
[ 481.439866][T28804] alloc_pages_vma+0x67e/0x810
[ 481.444645][T28804] new_page+0x121/0x170
[ 481.448829][T28804] migrate_pages+0x465/0x1810
[ 481.453526][T28804] ? do_mbind+0x760/0x760
[ 481.457953][T28804] ? remove_migration_ptes+0x90/0x90
[ 481.463243][T28804] do_mbind+0x5b7/0x760
[ 481.467410][T28804] __se_sys_mbind+0x151/0x410
[ 481.472101][T28804] __x64_sys_mbind+0x74/0x80
[ 481.476703][T28804] do_syscall_64+0x44/0xd0
[ 481.481136][T28804] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 481.487063][T28804] RIP: 0033:0x7fb80e59e059
[ 481.491488][T28804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 481.511182][T28804] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 481.519620][T28804] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:45 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:45 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x7, 0x0, 0x6, 0x10000000002)
18:38:45 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffff500000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:45 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 40)
[ 481.527591][T28804] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 481.535567][T28804] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 481.543535][T28804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 481.551507][T28804] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 481.559481][T28804]
[ 481.660772][T28830] loop5: detected capacity change from 0 to 264192
[ 481.723664][T28832] FAULT_INJECTION: forcing a failure.
[ 481.723664][T28832] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 481.736928][T28832] CPU: 0 PID: 28832 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 481.747949][T28832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 481.758040][T28832] Call Trace:
[ 481.761393][T28832]
[ 481.764359][T28832] dump_stack_lvl+0xd6/0x122
[ 481.769023][T28832] dump_stack+0x11/0x1b
18:38:45 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:45 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000004000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:45 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000fffffffe00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 481.773192][T28832] should_fail+0x23c/0x250
[ 481.777634][T28832] __alloc_pages+0x102/0x330
[ 481.782259][T28832] alloc_pages_vma+0x67e/0x810
[ 481.787096][T28832] new_page+0x121/0x170
[ 481.791381][T28832] migrate_pages+0x465/0x1810
[ 481.796061][T28832] ? do_mbind+0x760/0x760
[ 481.800382][T28832] ? remove_migration_ptes+0x90/0x90
[ 481.805713][T28832] do_mbind+0x5b7/0x760
[ 481.809865][T28832] __se_sys_mbind+0x151/0x410
[ 481.814621][T28832] __x64_sys_mbind+0x74/0x80
[ 481.819197][T28832] do_syscall_64+0x44/0xd0
[ 481.823609][T28832] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 481.829492][T28832] RIP: 0033:0x7fb80e59e059
[ 481.833896][T28832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 481.853503][T28832] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 481.862083][T28832] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
18:38:45 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 481.870039][T28832] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 481.877993][T28832] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 481.885979][T28832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 481.894070][T28832] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 481.902029][T28832]
18:38:45 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:45 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 41)
18:38:45 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000007fffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:45 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x8, 0x0, 0x6, 0x10000000002)
18:38:45 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 482.001199][T28845] loop1: detected capacity change from 0 to 264192
[ 482.050061][T28850] FAULT_INJECTION: forcing a failure.
[ 482.050061][T28850] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 482.056072][T28849] loop4: detected capacity change from 0 to 264192
[ 482.063327][T28850] CPU: 0 PID: 28850 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 482.063354][T28850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 482.091068][T28850] Call Trace:
[ 482.094340][T28850]
[ 482.097317][T28850] dump_stack_lvl+0xd6/0x122
[ 482.101956][T28850] dump_stack+0x11/0x1b
[ 482.106161][T28850] should_fail+0x23c/0x250
[ 482.110576][T28850] __alloc_pages+0x102/0x330
[ 482.115196][T28850] alloc_pages_vma+0x67e/0x810
[ 482.120023][T28850] new_page+0x121/0x170
[ 482.124204][T28850] migrate_pages+0x465/0x1810
[ 482.128917][T28850] ? do_mbind+0x760/0x760
[ 482.133357][T28850] ? remove_migration_ptes+0x90/0x90
[ 482.138695][T28850] do_mbind+0x5b7/0x760
[ 482.142852][T28850] __se_sys_mbind+0x151/0x410
[ 482.147532][T28850] __x64_sys_mbind+0x74/0x80
[ 482.152155][T28850] do_syscall_64+0x44/0xd0
[ 482.156642][T28850] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 482.162597][T28850] RIP: 0033:0x7fb80e59e059
[ 482.167073][T28850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 482.186750][T28850] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:45 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000009effffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:45 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
[ 482.195165][T28850] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 482.203143][T28850] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 482.211175][T28850] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 482.219247][T28850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 482.227270][T28850] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 482.235250][T28850]
18:38:45 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:46 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000efffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:46 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 42)
[ 482.265956][T28856] loop5: detected capacity change from 0 to 264192
18:38:46 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000008000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:46 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f0ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 482.431347][T28870] loop4: detected capacity change from 0 to 264192
[ 482.440171][T28862] FAULT_INJECTION: forcing a failure.
[ 482.440171][T28862] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 482.453412][T28862] CPU: 0 PID: 28862 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 482.464433][T28862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 482.474491][T28862] Call Trace:
[ 482.477767][T28862]
18:38:46 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:46 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x9, 0x0, 0x6, 0x10000000002)
18:38:46 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000f5ffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 482.480696][T28862] dump_stack_lvl+0xd6/0x122
[ 482.485464][T28862] dump_stack+0x11/0x1b
[ 482.489678][T28862] should_fail+0x23c/0x250
[ 482.494106][T28862] __alloc_pages+0x102/0x330
[ 482.498695][T28862] alloc_pages_vma+0x67e/0x810
[ 482.503456][T28862] new_page+0x121/0x170
[ 482.507612][T28862] migrate_pages+0x465/0x1810
[ 482.512347][T28862] ? do_mbind+0x760/0x760
[ 482.516724][T28862] ? remove_migration_ptes+0x90/0x90
[ 482.522016][T28862] do_mbind+0x5b7/0x760
[ 482.526182][T28862] __se_sys_mbind+0x151/0x410
[ 482.530983][T28862] __x64_sys_mbind+0x74/0x80
[ 482.535578][T28862] do_syscall_64+0x44/0xd0
[ 482.540066][T28862] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 482.546009][T28862] RIP: 0033:0x7fb80e59e059
[ 482.550493][T28862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 482.570097][T28862] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:46 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 482.578517][T28862] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 482.586487][T28862] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 482.594514][T28862] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 482.602520][T28862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 482.610581][T28862] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 482.618542][T28862]
18:38:46 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 43)
18:38:46 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000feffffff00000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 482.661262][T28876] loop5: detected capacity change from 0 to 264192
[ 482.730393][T28880] loop1: detected capacity change from 0 to 264192
[ 482.817804][T28883] FAULT_INJECTION: forcing a failure.
[ 482.817804][T28883] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 482.831120][T28883] CPU: 0 PID: 28883 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 482.842145][T28883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 482.852197][T28883] Call Trace:
[ 482.855467][T28883]
[ 482.858849][T28883] dump_stack_lvl+0xd6/0x122
[ 482.863440][T28883] dump_stack+0x11/0x1b
[ 482.867611][T28883] should_fail+0x23c/0x250
[ 482.872026][T28883] __alloc_pages+0x102/0x330
[ 482.876614][T28883] alloc_pages_vma+0x67e/0x810
[ 482.881392][T28883] new_page+0x121/0x170
[ 482.885548][T28883] migrate_pages+0x465/0x1810
[ 482.890235][T28883] ? do_mbind+0x760/0x760
[ 482.894577][T28883] ? remove_migration_ptes+0x90/0x90
[ 482.899869][T28883] do_mbind+0x5b7/0x760
[ 482.904057][T28883] __se_sys_mbind+0x151/0x410
[ 482.909628][T28883] __x64_sys_mbind+0x74/0x80
18:38:46 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0)
18:38:46 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000a000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:46 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xd, 0x0, 0x6, 0x10000000002)
18:38:46 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 482.914222][T28883] do_syscall_64+0x44/0xd0
[ 482.918640][T28883] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 482.924607][T28883] RIP: 0033:0x7fb80e59e059
[ 482.929016][T28883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 482.948720][T28883] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 482.957132][T28883] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:46 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:46 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 44)
[ 482.965125][T28883] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 482.973096][T28883] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 482.981128][T28883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 482.989091][T28883] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 482.997060][T28883]
18:38:46 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:46 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 483.037704][T28892] loop5: detected capacity change from 0 to 264192
[ 483.072153][T28897] loop1: detected capacity change from 0 to 264192
[ 483.105380][T28901] loop4: detected capacity change from 0 to 264192
[ 483.125626][T28893] FAULT_INJECTION: forcing a failure.
[ 483.125626][T28893] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 483.138921][T28893] CPU: 0 PID: 28893 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 483.149944][T28893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 483.160043][T28893] Call Trace:
[ 483.163315][T28893]
[ 483.166327][T28893] dump_stack_lvl+0xd6/0x122
[ 483.170927][T28893] dump_stack+0x11/0x1b
[ 483.175121][T28893] should_fail+0x23c/0x250
[ 483.179546][T28893] __alloc_pages+0x102/0x330
[ 483.184199][T28893] alloc_pages_vma+0x67e/0x810
[ 483.189052][T28893] new_page+0x121/0x170
[ 483.193236][T28893] migrate_pages+0x465/0x1810
[ 483.197923][T28893] ? do_mbind+0x760/0x760
18:38:46 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xf, 0x0, 0x6, 0x10000000002)
[ 483.202252][T28893] ? remove_migration_ptes+0x90/0x90
[ 483.207569][T28893] do_mbind+0x5b7/0x760
[ 483.211732][T28893] __se_sys_mbind+0x151/0x410
[ 483.216413][T28893] __x64_sys_mbind+0x74/0x80
[ 483.221025][T28893] do_syscall_64+0x44/0xd0
[ 483.225450][T28893] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 483.231350][T28893] RIP: 0033:0x7fb80e59e059
[ 483.235775][T28893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 483.255520][T28893] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 483.263935][T28893] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 483.271942][T28893] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 483.279919][T28893] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 483.287894][T28893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 483.295874][T28893] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0)
[ 483.303919][T28893]
18:38:47 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 45)
18:38:47 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000002000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000d000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 483.413895][T28913] loop5: detected capacity change from 0 to 264192
[ 483.448923][T28915] FAULT_INJECTION: forcing a failure.
[ 483.448923][T28915] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 483.462278][T28915] CPU: 1 PID: 28915 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 483.473320][T28915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 483.474423][T28919] loop4: detected capacity change from 0 to 264192
[ 483.483400][T28915] Call Trace:
[ 483.483409][T28915]
[ 483.483417][T28915] dump_stack_lvl+0xd6/0x122
[ 483.483445][T28915] dump_stack+0x11/0x1b
[ 483.483466][T28915] should_fail+0x23c/0x250
[ 483.509305][T28915] __alloc_pages+0x102/0x330
[ 483.513902][T28915] alloc_pages_vma+0x67e/0x810
[ 483.518784][T28915] new_page+0x121/0x170
[ 483.523003][T28915] migrate_pages+0x465/0x1810
[ 483.527739][T28915] ? do_mbind+0x760/0x760
[ 483.532069][T28915] ? remove_migration_ptes+0x90/0x90
[ 483.537408][T28915] do_mbind+0x5b7/0x760
[ 483.541566][T28915] __se_sys_mbind+0x151/0x410
[ 483.546317][T28915] __x64_sys_mbind+0x74/0x80
[ 483.550924][T28915] do_syscall_64+0x44/0xd0
[ 483.555381][T28915] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 483.561412][T28915] RIP: 0033:0x7fb80e59e059
[ 483.565915][T28915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 483.585530][T28915] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 483.593948][T28915] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 483.601929][T28915] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
18:38:47 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0)
[ 483.609898][T28915] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 483.618047][T28915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 483.626251][T28915] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 483.634396][T28915]
18:38:47 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:47 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 46)
18:38:47 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x10, 0x0, 0x6, 0x10000000002)
18:38:47 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000004000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000010000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 483.767470][T28930] loop4: detected capacity change from 0 to 264192
[ 483.813098][T28936] loop5: detected capacity change from 0 to 264192
[ 483.824241][T28939] loop1: detected capacity change from 0 to 264192
[ 483.837156][T28928] FAULT_INJECTION: forcing a failure.
[ 483.837156][T28928] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 483.850443][T28928] CPU: 0 PID: 28928 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 483.861533][T28928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 483.871594][T28928] Call Trace:
[ 483.874867][T28928]
[ 483.877790][T28928] dump_stack_lvl+0xd6/0x122
[ 483.882389][T28928] dump_stack+0x11/0x1b
[ 483.886544][T28928] should_fail+0x23c/0x250
[ 483.891145][T28928] __alloc_pages+0x102/0x330
[ 483.895801][T28928] alloc_pages_vma+0x67e/0x810
[ 483.900562][T28928] new_page+0x121/0x170
[ 483.904736][T28928] migrate_pages+0x465/0x1810
[ 483.909466][T28928] ? do_mbind+0x760/0x760
[ 483.913798][T28928] ? remove_migration_ptes+0x90/0x90
[ 483.919154][T28928] do_mbind+0x5b7/0x760
[ 483.923318][T28928] __se_sys_mbind+0x151/0x410
[ 483.927993][T28928] __x64_sys_mbind+0x74/0x80
[ 483.932589][T28928] do_syscall_64+0x44/0xd0
[ 483.937023][T28928] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 483.942925][T28928] RIP: 0033:0x7fb80e59e059
[ 483.947334][T28928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 483.966943][T28928] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 483.975427][T28928] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 483.983501][T28928] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 483.991531][T28928] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 483.999544][T28928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:38:47 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x11, 0x0, 0x6, 0x10000000002)
18:38:47 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 484.007522][T28928] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 484.015495][T28928]
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000011000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x0, 0x0, 0x6, 0x10000000002)
18:38:47 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:47 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 47)
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x12, 0x0, 0x6, 0x10000000002)
18:38:47 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:47 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:48 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000008000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 484.238373][T28956] loop5: detected capacity change from 0 to 264192
[ 484.258503][T28960] loop4: detected capacity change from 0 to 264192
[ 484.266176][T28964] loop1: detected capacity change from 0 to 264192
18:38:48 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 484.335844][T28954] FAULT_INJECTION: forcing a failure.
[ 484.335844][T28954] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 484.349130][T28954] CPU: 0 PID: 28954 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 484.360165][T28954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 484.370226][T28954] Call Trace:
[ 484.373508][T28954]
[ 484.376430][T28954] dump_stack_lvl+0xd6/0x122
[ 484.381135][T28954] dump_stack+0x11/0x1b
[ 484.385299][T28954] should_fail+0x23c/0x250
[ 484.389720][T28954] __alloc_pages+0x102/0x330
[ 484.394312][T28954] alloc_pages_vma+0x67e/0x810
[ 484.399090][T28954] new_page+0x121/0x170
[ 484.403262][T28954] migrate_pages+0x465/0x1810
[ 484.408039][T28954] ? do_mbind+0x760/0x760
[ 484.412508][T28954] ? remove_migration_ptes+0x90/0x90
[ 484.417874][T28954] do_mbind+0x5b7/0x760
[ 484.422098][T28954] __se_sys_mbind+0x151/0x410
[ 484.426774][T28954] __x64_sys_mbind+0x74/0x80
[ 484.431374][T28954] do_syscall_64+0x44/0xd0
[ 484.435842][T28954] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 484.441740][T28954] RIP: 0033:0x7fb80e59e059
[ 484.446166][T28954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 484.465834][T28954] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 484.474386][T28954] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:48 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:48 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x13, 0x0, 0x6, 0x10000000002)
18:38:48 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 48)
[ 484.482385][T28954] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 484.490346][T28954] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 484.498318][T28954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 484.506289][T28954] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 484.514308][T28954]
18:38:48 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0)
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:48 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:48 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:48 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 484.665226][T28979] loop5: detected capacity change from 0 to 264192
[ 484.675115][T28985] loop1: detected capacity change from 0 to 264192
[ 484.686932][T28976] FAULT_INJECTION: forcing a failure.
[ 484.686932][T28976] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 484.700220][T28976] CPU: 1 PID: 28976 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 484.711287][T28976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 484.721341][T28976] Call Trace:
[ 484.724618][T28976]
[ 484.727583][T28976] dump_stack_lvl+0xd6/0x122
[ 484.732239][T28976] dump_stack+0x11/0x1b
[ 484.736397][T28976] should_fail+0x23c/0x250
[ 484.740817][T28976] __alloc_pages+0x102/0x330
[ 484.745493][T28976] alloc_pages_vma+0x67e/0x810
[ 484.750331][T28976] new_page+0x121/0x170
[ 484.754553][T28976] migrate_pages+0x465/0x1810
[ 484.759236][T28976] ? do_mbind+0x760/0x760
[ 484.763620][T28976] ? remove_migration_ptes+0x90/0x90
[ 484.768977][T28976] do_mbind+0x5b7/0x760
[ 484.773133][T28976] __se_sys_mbind+0x151/0x410
[ 484.778015][T28976] __x64_sys_mbind+0x74/0x80
[ 484.782611][T28976] do_syscall_64+0x44/0xd0
[ 484.787027][T28976] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 484.792931][T28976] RIP: 0033:0x7fb80e59e059
18:38:48 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x14, 0x0, 0x6, 0x10000000002)
[ 484.797372][T28976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 484.817051][T28976] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 484.825465][T28976] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 484.833480][T28976] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 484.841453][T28976] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 484.849411][T28976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 484.857478][T28976] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
18:38:48 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 49)
18:38:48 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000a000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 484.865451][T28976]
18:38:48 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:48 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000025000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:48 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 484.919787][T28992] loop4: detected capacity change from 0 to 264192
18:38:48 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000040000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 485.032609][T29000] loop1: detected capacity change from 0 to 264192
[ 485.037229][T29002] loop5: detected capacity change from 0 to 264192
[ 485.049798][T28998] FAULT_INJECTION: forcing a failure.
[ 485.049798][T28998] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 485.063042][T28998] CPU: 0 PID: 28998 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 485.074092][T28998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 485.084144][T28998] Call Trace:
[ 485.087498][T28998]
[ 485.090420][T28998] dump_stack_lvl+0xd6/0x122
[ 485.095134][T28998] dump_stack+0x11/0x1b
[ 485.099296][T28998] should_fail+0x23c/0x250
[ 485.103711][T28998] __alloc_pages+0x102/0x330
[ 485.108390][T28998] alloc_pages_vma+0x67e/0x810
[ 485.113160][T28998] new_page+0x121/0x170
[ 485.117326][T28998] migrate_pages+0x465/0x1810
[ 485.122077][T28998] ? do_mbind+0x760/0x760
[ 485.126403][T28998] ? remove_migration_ptes+0x90/0x90
[ 485.131698][T28998] do_mbind+0x5b7/0x760
[ 485.135855][T28998] __se_sys_mbind+0x151/0x410
[ 485.140529][T28998] __x64_sys_mbind+0x74/0x80
[ 485.145151][T28998] do_syscall_64+0x44/0xd0
[ 485.149568][T28998] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 485.155483][T28998] RIP: 0033:0x7fb80e59e059
[ 485.159890][T28998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:48 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x15, 0x0, 0x6, 0x10000000002)
[ 485.179751][T28998] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 485.188238][T28998] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 485.196207][T28998] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 485.204246][T28998] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 485.212249][T28998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 485.220215][T28998] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 485.228252][T28998]
18:38:49 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 1)
18:38:49 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:49 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 50)
18:38:49 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000649000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:49 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:49 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000d000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:49 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000005c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 485.346592][T29015] loop5: detected capacity change from 0 to 264192
[ 485.399831][T29016] loop4: detected capacity change from 0 to 264192
[ 485.413306][T29023] loop1: detected capacity change from 0 to 264192
[ 485.427857][T29010] FAULT_INJECTION: forcing a failure.
[ 485.427857][T29010] name fail_page_alloc, interval 1, probability 0, space 0, times 0
18:38:49 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 485.441127][T29010] CPU: 0 PID: 29010 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 485.452234][T29010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 485.462289][T29010] Call Trace:
[ 485.465564][T29010]
[ 485.468525][T29010] dump_stack_lvl+0xd6/0x122
[ 485.473194][T29010] dump_stack+0x11/0x1b
[ 485.477372][T29010] should_fail+0x23c/0x250
[ 485.481798][T29010] __alloc_pages+0x102/0x330
[ 485.486418][T29010] alloc_pages_vma+0x67e/0x810
[ 485.491242][T29010] new_page+0x121/0x170
[ 485.495401][T29010] migrate_pages+0x465/0x1810
18:38:49 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x16, 0x0, 0x6, 0x10000000002)
[ 485.500167][T29010] ? do_mbind+0x760/0x760
[ 485.504509][T29010] ? remove_migration_ptes+0x90/0x90
[ 485.509854][T29010] do_mbind+0x5b7/0x760
[ 485.514017][T29010] __se_sys_mbind+0x151/0x410
[ 485.518700][T29010] __x64_sys_mbind+0x74/0x80
[ 485.523302][T29010] do_syscall_64+0x44/0xd0
[ 485.527780][T29010] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 485.533755][T29010] RIP: 0033:0x7fb80e59e059
[ 485.538166][T29010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 485.557790][T29010] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 485.566206][T29010] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 485.574202][T29010] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 485.582150][T29010] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 485.590106][T29010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 485.598159][T29010] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 485.606110][T29010]
[ 485.620797][T29027] FAULT_INJECTION: forcing a failure.
[ 485.620797][T29027] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 485.634095][T29027] CPU: 1 PID: 29027 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 485.645126][T29027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 485.655168][T29027] Call Trace:
[ 485.658451][T29027]
[ 485.661368][T29027] dump_stack_lvl+0xd6/0x122
[ 485.665950][T29027] dump_stack+0x11/0x1b
[ 485.670098][T29027] should_fail+0x23c/0x250
[ 485.674503][T29027] __alloc_pages+0x102/0x330
[ 485.679097][T29027] alloc_pages_vma+0x67e/0x810
[ 485.683850][T29027] new_page+0x121/0x170
[ 485.687991][T29027] migrate_pages+0x465/0x1810
[ 485.692657][T29027] ? mbind_range+0x846/0x8d0
[ 485.697281][T29027] ? do_mbind+0x760/0x760
[ 485.701595][T29027] do_mbind+0x5b7/0x760
[ 485.705766][T29027] __se_sys_mbind+0x151/0x410
[ 485.710433][T29027] __x64_sys_mbind+0x74/0x80
[ 485.715007][T29027] do_syscall_64+0x44/0xd0
[ 485.719590][T29027] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 485.725472][T29027] RIP: 0033:0x7f1ee090e059
[ 485.729871][T29027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:49 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 51)
18:38:49 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:49 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:49 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 2)
[ 485.749515][T29027] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 485.758027][T29027] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059
[ 485.766024][T29027] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 485.773984][T29027] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002
[ 485.782205][T29027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 485.790231][T29027] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000
[ 485.798216][T29027]
18:38:49 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:49 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000007c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 485.870298][T29035] loop5: detected capacity change from 0 to 264192
[ 485.878721][T29037] loop1: detected capacity change from 0 to 264192
18:38:49 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000010000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:49 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 485.927000][T29040] loop4: detected capacity change from 0 to 264192
[ 485.955112][T29031] FAULT_INJECTION: forcing a failure.
[ 485.955112][T29031] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 485.968409][T29031] CPU: 0 PID: 29031 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 485.979528][T29031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 485.989664][T29031] Call Trace:
[ 485.992940][T29031]
[ 485.995866][T29031] dump_stack_lvl+0xd6/0x122
[ 486.000491][T29031] dump_stack+0x11/0x1b
[ 486.004651][T29031] should_fail+0x23c/0x250
[ 486.009125][T29031] __alloc_pages+0x102/0x330
[ 486.013772][T29031] alloc_pages_vma+0x67e/0x810
[ 486.018569][T29031] new_page+0x121/0x170
[ 486.022732][T29031] migrate_pages+0x465/0x1810
[ 486.027499][T29031] ? do_mbind+0x760/0x760
[ 486.031828][T29031] ? remove_migration_ptes+0x90/0x90
[ 486.037122][T29031] do_mbind+0x5b7/0x760
[ 486.041285][T29031] __se_sys_mbind+0x151/0x410
[ 486.045961][T29031] __x64_sys_mbind+0x74/0x80
[ 486.050553][T29031] do_syscall_64+0x44/0xd0
[ 486.054968][T29031] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 486.061010][T29031] RIP: 0033:0x7fb80e59e059
18:38:49 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x17, 0x0, 0x6, 0x10000000002)
[ 486.065415][T29031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 486.085017][T29031] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 486.093554][T29031] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 486.101572][T29031] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 486.109524][T29031] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 486.117499][T29031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 486.125457][T29031] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 486.133422][T29031]
[ 486.140788][T29040] FAULT_INJECTION: forcing a failure.
[ 486.140788][T29040] name failslab, interval 1, probability 0, space 0, times 0
[ 486.153446][T29040] CPU: 1 PID: 29040 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 486.164464][T29040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 486.174520][T29040] Call Trace:
[ 486.177864][T29040]
[ 486.180885][T29040] dump_stack_lvl+0xd6/0x122
[ 486.185486][T29040] dump_stack+0x11/0x1b
[ 486.190249][T29040] should_fail+0x23c/0x250
[ 486.194674][T29040] ? mempool_alloc_slab+0x16/0x20
[ 486.199796][T29040] __should_failslab+0x81/0x90
[ 486.204565][T29040] should_failslab+0x5/0x20
[ 486.209069][T29040] kmem_cache_alloc+0x4f/0x320
[ 486.213846][T29040] mempool_alloc_slab+0x16/0x20
[ 486.218724][T29040] ? mempool_free+0x130/0x130
[ 486.223403][T29040] mempool_alloc+0x9d/0x310
[ 486.227907][T29040] ? __rcu_read_unlock+0x45/0x290
[ 486.232961][T29040] ? __this_cpu_preempt_check+0x18/0x20
[ 486.238550][T29040] bio_alloc_bioset+0xcc/0x560
[ 486.243322][T29040] submit_bh_wbc+0x133/0x320
[ 486.247917][T29040] __block_write_full_page+0x648/0xa10
[ 486.253384][T29040] ? mark_buffer_write_io_error+0x180/0x180
[ 486.259311][T29040] ? fat_block_truncate_page+0x30/0x30
[ 486.264843][T29040] ? fat_block_truncate_page+0x30/0x30
[ 486.270301][T29040] block_write_full_page+0x1f0/0x210
[ 486.275682][T29040] fat_writepage+0x20/0x30
[ 486.280159][T29040] move_to_new_page+0x2f6/0x520
[ 486.285013][T29040] ? remove_migration_ptes+0x90/0x90
[ 486.290297][T29040] migrate_pages+0xdec/0x1810
[ 486.295110][T29040] ? do_mbind+0x760/0x760
[ 486.299443][T29040] do_mbind+0x5b7/0x760
[ 486.303684][T29040] __se_sys_mbind+0x151/0x410
[ 486.308409][T29040] __x64_sys_mbind+0x74/0x80
[ 486.313029][T29040] do_syscall_64+0x44/0xd0
[ 486.317446][T29040] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 486.323339][T29040] RIP: 0033:0x7f1ee090e059
18:38:49 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 52)
[ 486.327752][T29040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 486.347497][T29040] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 486.355906][T29040] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059
[ 486.363885][T29040] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
18:38:50 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000080000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 486.372043][T29040] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002
[ 486.380031][T29040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 486.388138][T29040] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000
[ 486.396095][T29040]
[ 486.427133][T29050] FAULT_INJECTION: forcing a failure.
[ 486.427133][T29050] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 486.440425][T29050] CPU: 0 PID: 29050 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 486.451518][T29050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 486.461569][T29050] Call Trace:
[ 486.464843][T29050]
[ 486.467766][T29050] dump_stack_lvl+0xd6/0x122
[ 486.472361][T29050] dump_stack+0x11/0x1b
[ 486.476518][T29050] should_fail+0x23c/0x250
[ 486.480932][T29050] __alloc_pages+0x102/0x330
[ 486.485613][T29050] alloc_pages_vma+0x67e/0x810
[ 486.490380][T29050] new_page+0x121/0x170
[ 486.494709][T29050] migrate_pages+0x465/0x1810
[ 486.499566][T29050] ? do_mbind+0x760/0x760
[ 486.503903][T29050] ? remove_migration_ptes+0x90/0x90
[ 486.509193][T29050] do_mbind+0x5b7/0x760
[ 486.513440][T29050] __se_sys_mbind+0x151/0x410
[ 486.518192][T29050] __x64_sys_mbind+0x74/0x80
[ 486.522789][T29050] do_syscall_64+0x44/0xd0
18:38:50 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 3)
[ 486.522799][T29054] loop1: detected capacity change from 0 to 264192
[ 486.527202][T29050] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 486.539575][T29050] RIP: 0033:0x7fb80e59e059
[ 486.544063][T29050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 486.563827][T29050] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 486.572262][T29050] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 486.580309][T29050] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 486.588462][T29050] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 486.596411][T29050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 486.604360][T29050] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 486.612365][T29050]
18:38:50 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:50 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000011000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:50 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffff9e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 486.638158][T29056] loop5: detected capacity change from 0 to 264192
18:38:50 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:50 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 53)
18:38:50 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffef000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:50 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 486.703362][T29063] loop1: detected capacity change from 0 to 264192
[ 486.706480][T29064] loop4: detected capacity change from 0 to 264192
18:38:50 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:50 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x18, 0x0, 0x6, 0x10000000002)
18:38:50 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff0000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 486.810939][T29071] loop1: detected capacity change from 0 to 264192
18:38:50 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 486.882981][T29078] FAULT_INJECTION: forcing a failure.
[ 486.882981][T29078] name failslab, interval 1, probability 0, space 0, times 0
[ 486.895664][T29078] CPU: 1 PID: 29078 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 486.906719][T29078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 486.916783][T29078] Call Trace:
[ 486.920041][T29078]
[ 486.922970][T29078] dump_stack_lvl+0xd6/0x122
[ 486.927577][T29078] dump_stack+0x11/0x1b
[ 486.931777][T29078] should_fail+0x23c/0x250
[ 486.936176][T29078] ? mempool_alloc_slab+0x16/0x20
[ 486.941263][T29078] __should_failslab+0x81/0x90
[ 486.946003][T29078] should_failslab+0x5/0x20
[ 486.950504][T29078] kmem_cache_alloc+0x4f/0x320
[ 486.955248][T29078] mempool_alloc_slab+0x16/0x20
[ 486.960079][T29078] ? mempool_free+0x130/0x130
[ 486.964782][T29078] mempool_alloc+0x9d/0x310
[ 486.969338][T29078] ? submit_bio_noacct+0x49f/0x4e0
[ 486.974521][T29078] bio_alloc_bioset+0xcc/0x560
[ 486.979275][T29078] submit_bh_wbc+0x133/0x320
[ 486.983865][T29078] __block_write_full_page+0x648/0xa10
[ 486.989309][T29078] ? mark_buffer_write_io_error+0x180/0x180
[ 486.995248][T29078] ? fat_block_truncate_page+0x30/0x30
[ 487.000844][T29078] ? fat_block_truncate_page+0x30/0x30
[ 487.006381][T29078] block_write_full_page+0x1f0/0x210
[ 487.011652][T29078] fat_writepage+0x20/0x30
[ 487.016063][T29078] move_to_new_page+0x2f6/0x520
[ 487.020906][T29078] ? remove_migration_ptes+0x90/0x90
[ 487.026172][T29078] migrate_pages+0xdec/0x1810
[ 487.030910][T29078] ? do_mbind+0x760/0x760
[ 487.035228][T29078] do_mbind+0x5b7/0x760
[ 487.039375][T29078] __se_sys_mbind+0x151/0x410
[ 487.044112][T29078] __x64_sys_mbind+0x74/0x80
[ 487.048691][T29078] do_syscall_64+0x44/0xd0
[ 487.053098][T29078] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 487.059042][T29078] RIP: 0033:0x7f1ee090e059
[ 487.063438][T29078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 487.083043][T29078] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 487.091559][T29078] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059
[ 487.099511][T29078] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 487.107458][T29078] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002
[ 487.115411][T29078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 487.123431][T29078] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000
[ 487.131392][T29078]
[ 487.140147][T29075] FAULT_INJECTION: forcing a failure.
[ 487.140147][T29075] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 487.153393][T29075] CPU: 1 PID: 29075 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 487.164416][T29075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 487.174503][T29075] Call Trace:
[ 487.177909][T29075]
[ 487.180840][T29075] dump_stack_lvl+0xd6/0x122
[ 487.185439][T29075] dump_stack+0x11/0x1b
[ 487.189596][T29075] should_fail+0x23c/0x250
[ 487.194122][T29075] __alloc_pages+0x102/0x330
[ 487.198760][T29075] alloc_pages_vma+0x67e/0x810
[ 487.203762][T29075] new_page+0x121/0x170
[ 487.207950][T29075] migrate_pages+0x465/0x1810
[ 487.212658][T29075] ? do_mbind+0x760/0x760
[ 487.216987][T29075] ? remove_migration_ptes+0x90/0x90
[ 487.222313][T29075] do_mbind+0x5b7/0x760
[ 487.226503][T29075] __se_sys_mbind+0x151/0x410
18:38:50 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 4)
18:38:50 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff5000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:50 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 487.231246][T29075] __x64_sys_mbind+0x74/0x80
[ 487.235836][T29075] do_syscall_64+0x44/0xd0
[ 487.240264][T29075] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 487.246158][T29075] RIP: 0033:0x7fb80e59e059
[ 487.250580][T29075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 487.270212][T29075] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 487.278662][T29075] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 487.286714][T29075] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 487.294671][T29075] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 487.302699][T29075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 487.310679][T29075] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 487.318693][T29075]
18:38:51 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 54)
[ 487.330147][T29086] loop5: detected capacity change from 0 to 264192
[ 487.337304][T29085] loop1: detected capacity change from 0 to 264192
18:38:51 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffffe000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:51 executing program 1:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 487.384388][T29089] loop4: detected capacity change from 0 to 264192
18:38:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:51 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x19, 0x0, 0x6, 0x10000000002)
18:38:51 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007fffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 487.487668][T29099] loop1: detected capacity change from 0 to 264192
[ 487.523988][T29089] FAULT_INJECTION: forcing a failure.
[ 487.523988][T29089] name failslab, interval 1, probability 0, space 0, times 0
[ 487.536649][T29089] CPU: 1 PID: 29089 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 487.547708][T29089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 487.557758][T29089] Call Trace:
[ 487.561069][T29089]
[ 487.563998][T29089] dump_stack_lvl+0xd6/0x122
[ 487.568611][T29089] dump_stack+0x11/0x1b
[ 487.572828][T29089] should_fail+0x23c/0x250
[ 487.577375][T29089] ? mempool_alloc_slab+0x16/0x20
[ 487.582395][T29089] __should_failslab+0x81/0x90
[ 487.587166][T29089] should_failslab+0x5/0x20
[ 487.591672][T29089] kmem_cache_alloc+0x4f/0x320
[ 487.596434][T29089] mempool_alloc_slab+0x16/0x20
[ 487.601351][T29089] ? mempool_free+0x130/0x130
[ 487.606066][T29089] mempool_alloc+0x9d/0x310
[ 487.610599][T29089] ? submit_bio_noacct+0x49f/0x4e0
[ 487.615714][T29089] bio_alloc_bioset+0xcc/0x560
[ 487.620494][T29089] submit_bh_wbc+0x133/0x320
[ 487.625129][T29089] __block_write_full_page+0x648/0xa10
[ 487.630637][T29089] ? mark_buffer_write_io_error+0x180/0x180
[ 487.636580][T29089] ? fat_block_truncate_page+0x30/0x30
[ 487.642106][T29089] ? fat_block_truncate_page+0x30/0x30
[ 487.647648][T29089] block_write_full_page+0x1f0/0x210
[ 487.650605][T29107] loop5: detected capacity change from 0 to 264192
[ 487.653027][T29089] fat_writepage+0x20/0x30
[ 487.653057][T29089] move_to_new_page+0x2f6/0x520
[ 487.668923][T29089] ? remove_migration_ptes+0x90/0x90
[ 487.674292][T29089] migrate_pages+0xdec/0x1810
[ 487.678982][T29089] ? do_mbind+0x760/0x760
[ 487.683323][T29089] do_mbind+0x5b7/0x760
[ 487.687486][T29089] __se_sys_mbind+0x151/0x410
[ 487.692306][T29089] __x64_sys_mbind+0x74/0x80
[ 487.696899][T29089] do_syscall_64+0x44/0xd0
[ 487.701371][T29089] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 487.707352][T29089] RIP: 0033:0x7f1ee090e059
[ 487.711818][T29089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:51 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a, 0x0, 0x6, 0x10000000002)
[ 487.731434][T29089] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 487.739851][T29089] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059
[ 487.747860][T29089] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 487.755846][T29089] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002
[ 487.763817][T29089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 487.771783][T29089] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000
[ 487.779785][T29089]
[ 487.796557][T29094] FAULT_INJECTION: forcing a failure.
[ 487.796557][T29094] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 487.809829][T29094] CPU: 0 PID: 29094 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 487.820844][T29094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 487.830891][T29094] Call Trace:
[ 487.834163][T29094]
[ 487.837090][T29094] dump_stack_lvl+0xd6/0x122
[ 487.841683][T29094] dump_stack+0x11/0x1b
[ 487.845864][T29094] should_fail+0x23c/0x250
[ 487.850330][T29094] __alloc_pages+0x102/0x330
[ 487.854921][T29094] alloc_pages_vma+0x67e/0x810
[ 487.859808][T29094] new_page+0x121/0x170
[ 487.864020][T29094] migrate_pages+0x465/0x1810
[ 487.868763][T29094] ? do_mbind+0x760/0x760
[ 487.873095][T29094] ? remove_migration_ptes+0x90/0x90
[ 487.878484][T29094] do_mbind+0x5b7/0x760
[ 487.882650][T29094] __se_sys_mbind+0x151/0x410
[ 487.887340][T29094] __x64_sys_mbind+0x74/0x80
[ 487.891953][T29094] do_syscall_64+0x44/0xd0
18:38:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000025000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:51 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 5)
18:38:51 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 487.896366][T29094] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 487.902433][T29094] RIP: 0033:0x7fb80e59e059
[ 487.906838][T29094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 487.926439][T29094] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 487.934854][T29094] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:51 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:51 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 55)
[ 487.942817][T29094] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 487.950767][T29094] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 487.958714][T29094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 487.966670][T29094] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 487.974623][T29094]
18:38:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000040000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:51 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000002000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 488.018421][T29116] loop5: detected capacity change from 0 to 264192
18:38:51 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 488.075042][T29118] loop4: detected capacity change from 0 to 264192
18:38:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000005c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 488.136830][T29114] FAULT_INJECTION: forcing a failure.
[ 488.136830][T29114] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 488.150170][T29114] CPU: 0 PID: 29114 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 488.161196][T29114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 488.171251][T29114] Call Trace:
[ 488.174564][T29114]
[ 488.177489][T29114] dump_stack_lvl+0xd6/0x122
[ 488.182091][T29114] dump_stack+0x11/0x1b
[ 488.186295][T29114] should_fail+0x23c/0x250
[ 488.190733][T29114] __alloc_pages+0x102/0x330
[ 488.195356][T29114] alloc_pages_vma+0x67e/0x810
[ 488.200255][T29114] new_page+0x121/0x170
[ 488.204418][T29114] migrate_pages+0x465/0x1810
[ 488.209100][T29114] ? do_mbind+0x760/0x760
[ 488.213425][T29114] ? remove_migration_ptes+0x90/0x90
[ 488.218821][T29114] do_mbind+0x5b7/0x760
[ 488.222980][T29114] __se_sys_mbind+0x151/0x410
[ 488.227664][T29114] __x64_sys_mbind+0x74/0x80
[ 488.232254][T29114] do_syscall_64+0x44/0xd0
18:38:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 488.236668][T29114] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 488.242573][T29114] RIP: 0033:0x7fb80e59e059
[ 488.247122][T29114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 488.266763][T29114] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 488.275177][T29114] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 488.283151][T29114] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 488.291121][T29114] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 488.299090][T29114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 488.307061][T29114] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 488.315115][T29114]
[ 488.321991][T29118] FAULT_INJECTION: forcing a failure.
[ 488.321991][T29118] name failslab, interval 1, probability 0, space 0, times 0
[ 488.334683][T29118] CPU: 1 PID: 29118 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 488.345763][T29118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 488.355810][T29118] Call Trace:
[ 488.359131][T29118]
[ 488.362078][T29118] dump_stack_lvl+0xd6/0x122
[ 488.366724][T29118] dump_stack+0x11/0x1b
[ 488.370883][T29118] should_fail+0x23c/0x250
[ 488.375497][T29118] ? mempool_alloc_slab+0x16/0x20
[ 488.380531][T29118] __should_failslab+0x81/0x90
[ 488.385298][T29118] should_failslab+0x5/0x20
[ 488.389872][T29118] kmem_cache_alloc+0x4f/0x320
[ 488.394641][T29118] mempool_alloc_slab+0x16/0x20
[ 488.399501][T29118] ? mempool_free+0x130/0x130
[ 488.404209][T29118] mempool_alloc+0x9d/0x310
[ 488.408739][T29118] ? submit_bio_noacct+0x49f/0x4e0
[ 488.413905][T29118] bio_alloc_bioset+0xcc/0x560
[ 488.418675][T29118] submit_bh_wbc+0x133/0x320
[ 488.423339][T29118] __block_write_full_page+0x648/0xa10
[ 488.428877][T29118] ? mark_buffer_write_io_error+0x180/0x180
[ 488.434883][T29118] ? fat_block_truncate_page+0x30/0x30
[ 488.440349][T29118] ? fat_block_truncate_page+0x30/0x30
[ 488.445888][T29118] block_write_full_page+0x1f0/0x210
[ 488.451175][T29118] fat_writepage+0x20/0x30
[ 488.455590][T29118] move_to_new_page+0x2f6/0x520
[ 488.460470][T29118] ? remove_migration_ptes+0x90/0x90
[ 488.465791][T29118] migrate_pages+0xdec/0x1810
[ 488.470470][T29118] ? do_mbind+0x760/0x760
[ 488.474843][T29118] do_mbind+0x5b7/0x760
[ 488.479046][T29118] __se_sys_mbind+0x151/0x410
[ 488.483732][T29118] __x64_sys_mbind+0x74/0x80
18:38:52 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 56)
18:38:52 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1b, 0x0, 0x6, 0x10000000002)
[ 488.488319][T29118] do_syscall_64+0x44/0xd0
[ 488.492793][T29118] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 488.498686][T29118] RIP: 0033:0x7f1ee090e059
[ 488.503100][T29118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 488.522708][T29118] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:52 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000004000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 488.531134][T29118] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059
[ 488.539149][T29118] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 488.547175][T29118] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002
[ 488.555139][T29118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 488.563188][T29118] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000
[ 488.571192][T29118]
[ 488.618260][T29140] FAULT_INJECTION: forcing a failure.
[ 488.618260][T29140] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 488.631558][T29140] CPU: 0 PID: 29140 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 488.642698][T29140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 488.652759][T29140] Call Trace:
[ 488.656031][T29140]
[ 488.658955][T29140] dump_stack_lvl+0xd6/0x122
[ 488.663557][T29140] dump_stack+0x11/0x1b
[ 488.667724][T29140] should_fail+0x23c/0x250
[ 488.672147][T29140] __alloc_pages+0x102/0x330
[ 488.676737][T29140] alloc_pages_vma+0x67e/0x810
[ 488.681518][T29140] new_page+0x121/0x170
[ 488.685723][T29140] migrate_pages+0x465/0x1810
[ 488.690408][T29140] ? do_mbind+0x760/0x760
[ 488.694877][T29140] ? remove_migration_ptes+0x90/0x90
[ 488.700156][T29140] do_mbind+0x5b7/0x760
[ 488.704320][T29140] __se_sys_mbind+0x151/0x410
[ 488.708986][T29140] __x64_sys_mbind+0x74/0x80
[ 488.713560][T29140] do_syscall_64+0x44/0xd0
[ 488.717966][T29140] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 488.723846][T29140] RIP: 0033:0x7fb80e59e059
[ 488.728310][T29140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 488.748020][T29140] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 488.756428][T29140] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
18:38:52 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 6)
[ 488.764384][T29140] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 488.772435][T29140] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 488.780399][T29140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 488.788360][T29140] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 488.796316][T29140]
18:38:52 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:52 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000000007c000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:52 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 488.842148][T29144] loop5: detected capacity change from 0 to 264192
18:38:52 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:52 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 57)
18:38:52 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:52 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1c, 0x0, 0x6, 0x10000000002)
[ 488.926738][T29151] loop4: detected capacity change from 0 to 264192
18:38:52 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000080000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:52 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:52 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:52 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 489.055016][T29151] FAULT_INJECTION: forcing a failure.
[ 489.055016][T29151] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 489.068320][T29151] CPU: 1 PID: 29151 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 489.079416][T29151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 489.089533][T29151] Call Trace:
[ 489.092871][T29151]
[ 489.095800][T29151] dump_stack_lvl+0xd6/0x122
[ 489.100384][T29151] dump_stack+0x11/0x1b
[ 489.104538][T29151] should_fail+0x23c/0x250
[ 489.109000][T29151] __alloc_pages+0x102/0x330
[ 489.113578][T29151] alloc_pages_vma+0x67e/0x810
[ 489.118405][T29151] new_page+0x121/0x170
[ 489.122550][T29151] migrate_pages+0x465/0x1810
[ 489.127390][T29151] ? do_mbind+0x760/0x760
[ 489.131776][T29151] ? remove_migration_ptes+0x90/0x90
[ 489.137133][T29151] do_mbind+0x5b7/0x760
[ 489.141343][T29151] __se_sys_mbind+0x151/0x410
[ 489.146061][T29151] __x64_sys_mbind+0x74/0x80
[ 489.150637][T29151] do_syscall_64+0x44/0xd0
[ 489.155043][T29151] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 489.161051][T29151] RIP: 0033:0x7f1ee090e059
[ 489.165463][T29151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 489.185417][T29151] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 489.194053][T29151] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059
[ 489.202019][T29151] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 489.210073][T29151] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002
[ 489.218241][T29151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 489.226202][T29151] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000
[ 489.234197][T29151]
[ 489.265241][T29171] loop5: detected capacity change from 0 to 264192
[ 489.265521][T29169] FAULT_INJECTION: forcing a failure.
[ 489.265521][T29169] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 489.285075][T29169] CPU: 1 PID: 29169 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 489.296095][T29169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 489.306151][T29169] Call Trace:
[ 489.309458][T29169]
18:38:53 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 7)
18:38:53 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffff9e000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:53 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000008000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 489.312461][T29169] dump_stack_lvl+0xd6/0x122
[ 489.317063][T29169] dump_stack+0x11/0x1b
[ 489.321256][T29169] should_fail+0x23c/0x250
[ 489.325703][T29169] __alloc_pages+0x102/0x330
[ 489.330413][T29169] alloc_pages_vma+0x67e/0x810
[ 489.335181][T29169] new_page+0x121/0x170
[ 489.339351][T29169] migrate_pages+0x465/0x1810
[ 489.344032][T29169] ? do_mbind+0x760/0x760
[ 489.348418][T29169] ? remove_migration_ptes+0x90/0x90
[ 489.353749][T29169] do_mbind+0x5b7/0x760
[ 489.357907][T29169] __se_sys_mbind+0x151/0x410
[ 489.362592][T29169] __x64_sys_mbind+0x74/0x80
[ 489.367269][T29169] do_syscall_64+0x44/0xd0
[ 489.371688][T29169] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 489.377662][T29169] RIP: 0033:0x7fb80e59e059
[ 489.382176][T29169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 489.401837][T29169] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:53 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000005bb000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 489.410294][T29169] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 489.418248][T29169] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 489.426215][T29169] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 489.434227][T29169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 489.442190][T29169] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 489.450150][T29169]
18:38:53 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:53 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1d, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 58)
18:38:53 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffef000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 489.572814][T29195] loop4: detected capacity change from 0 to 264192
[ 489.622596][T29198] loop5: detected capacity change from 0 to 264192
[ 489.624680][T29186] FAULT_INJECTION: forcing a failure.
[ 489.624680][T29186] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 489.642371][T29186] CPU: 1 PID: 29186 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 489.653610][T29186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 489.663657][T29186] Call Trace:
[ 489.666982][T29186]
[ 489.669976][T29186] dump_stack_lvl+0xd6/0x122
[ 489.674606][T29186] dump_stack+0x11/0x1b
[ 489.678761][T29186] should_fail+0x23c/0x250
[ 489.683232][T29186] __alloc_pages+0x102/0x330
[ 489.687898][T29186] alloc_pages_vma+0x67e/0x810
[ 489.692712][T29186] new_page+0x121/0x170
[ 489.696869][T29186] migrate_pages+0x465/0x1810
[ 489.701607][T29186] ? do_mbind+0x760/0x760
[ 489.705941][T29186] ? remove_migration_ptes+0x90/0x90
[ 489.711287][T29186] do_mbind+0x5b7/0x760
[ 489.715681][T29186] __se_sys_mbind+0x151/0x410
[ 489.720364][T29186] __x64_sys_mbind+0x74/0x80
[ 489.724949][T29186] do_syscall_64+0x44/0xd0
[ 489.729365][T29186] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 489.735381][T29186] RIP: 0033:0x7fb80e59e059
[ 489.739874][T29186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 489.759478][T29186] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 489.767965][T29186] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 489.775937][T29186] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 489.783900][T29186] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 489.791936][T29186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 489.799885][T29186] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 489.807871][T29186]
[ 489.815423][T29199] FAULT_INJECTION: forcing a failure.
[ 489.815423][T29199] name failslab, interval 1, probability 0, space 0, times 0
[ 489.828101][T29199] CPU: 1 PID: 29199 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 489.839116][T29199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 489.849162][T29199] Call Trace:
[ 489.852429][T29199]
[ 489.855354][T29199] dump_stack_lvl+0xd6/0x122
[ 489.859951][T29199] dump_stack+0x11/0x1b
[ 489.864149][T29199] should_fail+0x23c/0x250
[ 489.868637][T29199] ? mempool_alloc_slab+0x16/0x20
[ 489.873666][T29199] __should_failslab+0x81/0x90
[ 489.878563][T29199] should_failslab+0x5/0x20
[ 489.883069][T29199] kmem_cache_alloc+0x4f/0x320
[ 489.887856][T29199] mempool_alloc_slab+0x16/0x20
[ 489.892718][T29199] ? mempool_free+0x130/0x130
[ 489.897369][T29199] mempool_alloc+0x9d/0x310
[ 489.901846][T29199] ? __rcu_read_unlock+0x45/0x290
[ 489.906848][T29199] ? __this_cpu_preempt_check+0x18/0x20
[ 489.912391][T29199] bio_alloc_bioset+0xcc/0x560
[ 489.917139][T29199] submit_bh_wbc+0x133/0x320
[ 489.921787][T29199] __block_write_full_page+0x648/0xa10
[ 489.927249][T29199] ? mark_buffer_write_io_error+0x180/0x180
[ 489.933120][T29199] ? fat_block_truncate_page+0x30/0x30
[ 489.938608][T29199] ? fat_block_truncate_page+0x30/0x30
[ 489.944127][T29199] block_write_full_page+0x1f0/0x210
[ 489.949413][T29199] fat_writepage+0x20/0x30
[ 489.953866][T29199] move_to_new_page+0x2f6/0x520
[ 489.958747][T29199] ? remove_migration_ptes+0x90/0x90
[ 489.964045][T29199] migrate_pages+0xdec/0x1810
[ 489.968704][T29199] ? do_mbind+0x760/0x760
[ 489.973064][T29199] ? remove_migration_ptes+0x90/0x90
[ 489.978402][T29199] do_mbind+0x5b7/0x760
[ 489.982662][T29199] __se_sys_mbind+0x151/0x410
[ 489.987322][T29199] __x64_sys_mbind+0x74/0x80
[ 489.991961][T29199] do_syscall_64+0x44/0xd0
[ 489.996415][T29199] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 490.002306][T29199] RIP: 0033:0x7f1ee090e059
[ 490.006776][T29199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 490.026359][T29199] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 490.034755][T29199] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059
[ 490.042705][T29199] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 490.050651][T29199] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002
[ 490.058595][T29199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 490.066550][T29199] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000
[ 490.074540][T29199]
18:38:53 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 8)
18:38:53 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:53 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1e, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff0000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:53 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 59)
18:38:53 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:53 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffff5000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 490.165941][T29208] loop5: detected capacity change from 0 to 264192
18:38:53 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 490.255381][T29217] loop4: detected capacity change from 0 to 264192
[ 490.284624][T29206] FAULT_INJECTION: forcing a failure.
[ 490.284624][T29206] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 490.298082][T29206] CPU: 0 PID: 29206 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 490.309163][T29206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 490.319250][T29206] Call Trace:
[ 490.322544][T29206]
[ 490.325462][T29206] dump_stack_lvl+0xd6/0x122
[ 490.330080][T29206] dump_stack+0x11/0x1b
[ 490.334236][T29206] should_fail+0x23c/0x250
[ 490.338673][T29206] __alloc_pages+0x102/0x330
[ 490.343261][T29206] alloc_pages_vma+0x67e/0x810
[ 490.348035][T29206] new_page+0x121/0x170
18:38:54 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:54 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x21, 0x0, 0x6, 0x10000000002)
18:38:54 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000fffffffe000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 490.352192][T29206] migrate_pages+0x465/0x1810
[ 490.356908][T29206] ? do_mbind+0x760/0x760
[ 490.361451][T29206] ? remove_migration_ptes+0x90/0x90
[ 490.366799][T29206] do_mbind+0x5b7/0x760
[ 490.370959][T29206] __se_sys_mbind+0x151/0x410
[ 490.375683][T29206] __x64_sys_mbind+0x74/0x80
[ 490.380299][T29206] do_syscall_64+0x44/0xd0
[ 490.384743][T29206] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 490.390683][T29206] RIP: 0033:0x7fb80e59e059
[ 490.395103][T29206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 490.414730][T29206] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 490.423139][T29206] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 490.431190][T29206] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 490.439265][T29206] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 490.447273][T29206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 490.455238][T29206] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 490.463215][T29206]
[ 490.478802][T29224] FAULT_INJECTION: forcing a failure.
[ 490.478802][T29224] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 490.492120][T29224] CPU: 1 PID: 29224 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 490.503143][T29224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 490.513208][T29224] Call Trace:
[ 490.516482][T29224]
[ 490.519432][T29224] dump_stack_lvl+0xd6/0x122
[ 490.524037][T29224] dump_stack+0x11/0x1b
[ 490.528198][T29224] should_fail+0x23c/0x250
[ 490.532616][T29224] __alloc_pages+0x102/0x330
[ 490.537255][T29224] alloc_pages_vma+0x67e/0x810
[ 490.542072][T29224] new_page+0x121/0x170
[ 490.546221][T29224] migrate_pages+0x465/0x1810
[ 490.550932][T29224] ? do_mbind+0x760/0x760
[ 490.555250][T29224] ? remove_migration_ptes+0x90/0x90
[ 490.560532][T29224] do_mbind+0x5b7/0x760
[ 490.564674][T29224] __se_sys_mbind+0x151/0x410
[ 490.569339][T29224] __x64_sys_mbind+0x74/0x80
[ 490.573959][T29224] do_syscall_64+0x44/0xd0
[ 490.578361][T29224] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 490.584242][T29224] RIP: 0033:0x7f1ee090e059
[ 490.588660][T29224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 490.608251][T29224] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 490.616718][T29224] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059
[ 490.624675][T29224] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 490.632652][T29224] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002
[ 490.640620][T29224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 490.648582][T29224] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000
18:38:54 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 9)
18:38:54 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:54 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 60)
18:38:54 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 490.656552][T29224]
18:38:54 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007fffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:54 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 490.705825][T29235] loop5: detected capacity change from 0 to 264192
18:38:54 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 490.778640][T29243] loop4: detected capacity change from 0 to 264192
[ 490.798544][T29233] FAULT_INJECTION: forcing a failure.
[ 490.798544][T29233] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 490.811905][T29233] CPU: 1 PID: 29233 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 490.822926][T29233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 490.833043][T29233] Call Trace:
[ 490.836339][T29233]
[ 490.839298][T29233] dump_stack_lvl+0xd6/0x122
[ 490.843926][T29233] dump_stack+0x11/0x1b
[ 490.848077][T29233] should_fail+0x23c/0x250
[ 490.852494][T29233] __alloc_pages+0x102/0x330
[ 490.857128][T29233] alloc_pages_vma+0x67e/0x810
[ 490.861892][T29233] new_page+0x121/0x170
[ 490.866046][T29233] migrate_pages+0x465/0x1810
[ 490.870727][T29233] ? do_mbind+0x760/0x760
[ 490.875060][T29233] ? remove_migration_ptes+0x90/0x90
[ 490.880376][T29233] do_mbind+0x5b7/0x760
[ 490.884532][T29233] __se_sys_mbind+0x151/0x410
[ 490.889219][T29233] __x64_sys_mbind+0x74/0x80
[ 490.893809][T29233] do_syscall_64+0x44/0xd0
[ 490.898229][T29233] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 490.904127][T29233] RIP: 0033:0x7fb80e59e059
[ 490.908540][T29233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 490.928147][T29233] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 490.936612][T29233] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 490.944582][T29233] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 490.952559][T29233] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 490.960591][T29233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 490.968615][T29233] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 490.976586][T29233]
18:38:54 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000ffffffff000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 490.987038][T29247] FAULT_INJECTION: forcing a failure.
[ 490.987038][T29247] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 491.000392][T29247] CPU: 0 PID: 29247 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 491.011408][T29247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 491.021459][T29247] Call Trace:
[ 491.024750][T29247]
[ 491.027684][T29247] dump_stack_lvl+0xd6/0x122
[ 491.032329][T29247] dump_stack+0x11/0x1b
18:38:54 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 61)
[ 491.036496][T29247] should_fail+0x23c/0x250
[ 491.040912][T29247] __alloc_pages+0x102/0x330
[ 491.045650][T29247] alloc_pages_vma+0x67e/0x810
[ 491.050456][T29247] new_page+0x121/0x170
[ 491.054615][T29247] migrate_pages+0x465/0x1810
[ 491.059368][T29247] ? do_mbind+0x760/0x760
[ 491.063712][T29247] ? remove_migration_ptes+0x90/0x90
[ 491.069099][T29247] do_mbind+0x5b7/0x760
[ 491.073334][T29247] __se_sys_mbind+0x151/0x410
[ 491.078021][T29247] __x64_sys_mbind+0x74/0x80
[ 491.082633][T29247] do_syscall_64+0x44/0xd0
18:38:54 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x22, 0x0, 0x6, 0x10000000002)
18:38:54 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 491.087097][T29247] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 491.093076][T29247] RIP: 0033:0x7f1ee090e059
[ 491.097493][T29247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 491.117315][T29247] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 491.125755][T29247] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059
18:38:54 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 10)
[ 491.133731][T29247] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 491.141734][T29247] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002
[ 491.149851][T29247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 491.157832][T29247] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000
[ 491.165875][T29247]
18:38:54 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 491.198668][T29254] FAULT_INJECTION: forcing a failure.
[ 491.198668][T29254] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 491.212009][T29254] CPU: 0 PID: 29254 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 491.223040][T29254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 491.233096][T29254] Call Trace:
[ 491.236369][T29254]
[ 491.239301][T29254] dump_stack_lvl+0xd6/0x122
[ 491.243972][T29254] dump_stack+0x11/0x1b
[ 491.248203][T29254] should_fail+0x23c/0x250
[ 491.252683][T29254] __alloc_pages+0x102/0x330
[ 491.257306][T29254] alloc_pages_vma+0x67e/0x810
[ 491.262069][T29254] new_page+0x121/0x170
[ 491.266225][T29254] migrate_pages+0x465/0x1810
[ 491.270909][T29254] ? do_mbind+0x760/0x760
[ 491.275236][T29254] ? remove_migration_ptes+0x90/0x90
[ 491.280525][T29254] do_mbind+0x5b7/0x760
[ 491.284771][T29254] __se_sys_mbind+0x151/0x410
[ 491.289446][T29254] __x64_sys_mbind+0x74/0x80
[ 491.294033][T29254] do_syscall_64+0x44/0xd0
[ 491.298508][T29254] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 491.304588][T29254] RIP: 0033:0x7fb80e59e059
[ 491.309019][T29254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 491.328691][T29254] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 491.337123][T29254] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:55 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 62)
18:38:55 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000002000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 491.345100][T29254] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 491.353098][T29254] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 491.361109][T29254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 491.369181][T29254] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 491.377164][T29254]
18:38:55 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:55 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000003000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 491.433327][T29265] loop5: detected capacity change from 0 to 264192
[ 491.441812][T29268] loop4: detected capacity change from 0 to 264192
18:38:55 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:55 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000010000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 491.541730][T29274] FAULT_INJECTION: forcing a failure.
[ 491.541730][T29274] name failslab, interval 1, probability 0, space 0, times 0
[ 491.554390][T29274] CPU: 0 PID: 29274 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 491.565408][T29274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 491.575460][T29274] Call Trace:
[ 491.578735][T29274]
[ 491.581739][T29274] dump_stack_lvl+0xd6/0x122
[ 491.586411][T29274] dump_stack+0x11/0x1b
[ 491.590655][T29274] should_fail+0x23c/0x250
[ 491.595069][T29274] ? mempool_alloc_slab+0x16/0x20
[ 491.600268][T29274] __should_failslab+0x81/0x90
[ 491.605085][T29274] should_failslab+0x5/0x20
[ 491.609669][T29274] kmem_cache_alloc+0x4f/0x320
[ 491.610362][T29263] FAULT_INJECTION: forcing a failure.
[ 491.610362][T29263] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 491.614458][T29274] mempool_alloc_slab+0x16/0x20
[ 491.632682][T29274] ? mempool_free+0x130/0x130
[ 491.637353][T29274] mempool_alloc+0x9d/0x310
[ 491.641839][T29274] ? submit_bio_noacct+0x49f/0x4e0
[ 491.647015][T29274] bio_alloc_bioset+0xcc/0x560
[ 491.651768][T29274] submit_bh_wbc+0x133/0x320
[ 491.656349][T29274] __block_write_full_page+0x648/0xa10
[ 491.661892][T29274] ? mark_buffer_write_io_error+0x180/0x180
[ 491.667796][T29274] ? fat_block_truncate_page+0x30/0x30
[ 491.673257][T29274] ? fat_block_truncate_page+0x30/0x30
[ 491.678781][T29274] block_write_full_page+0x1f0/0x210
[ 491.684111][T29274] fat_writepage+0x20/0x30
[ 491.688525][T29274] move_to_new_page+0x2f6/0x520
[ 491.693404][T29274] ? remove_migration_ptes+0x90/0x90
[ 491.698754][T29274] migrate_pages+0xdec/0x1810
[ 491.703432][T29274] ? do_mbind+0x760/0x760
[ 491.707824][T29274] ? remove_migration_ptes+0x90/0x90
[ 491.713101][T29274] do_mbind+0x5b7/0x760
[ 491.717245][T29274] __se_sys_mbind+0x151/0x410
[ 491.721909][T29274] __x64_sys_mbind+0x74/0x80
[ 491.726497][T29274] do_syscall_64+0x44/0xd0
[ 491.730900][T29274] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 491.736793][T29274] RIP: 0033:0x7f1ee090e059
[ 491.741249][T29274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 491.760890][T29274] RSP: 002b:00007f1edfa63168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 491.769289][T29274] RAX: ffffffffffffffda RBX: 00007f1ee0a21030 RCX: 00007f1ee090e059
[ 491.777678][T29274] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 491.785651][T29274] RBP: 00007f1edfa631d0 R08: 0000000000000000 R09: 0000010000000002
[ 491.793782][T29274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 491.801777][T29274] R13: 00007fff7f45224f R14: 00007f1edfa63300 R15: 0000000000022000
[ 491.809731][T29274]
[ 491.812737][T29263] CPU: 1 PID: 29263 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 491.823790][T29263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 491.833851][T29263] Call Trace:
[ 491.837126][T29263]
[ 491.840047][T29263] dump_stack_lvl+0xd6/0x122
[ 491.844712][T29263] dump_stack+0x11/0x1b
[ 491.848979][T29263] should_fail+0x23c/0x250
[ 491.853435][T29263] __alloc_pages+0x102/0x330
[ 491.858019][T29263] alloc_pages_vma+0x67e/0x810
[ 491.862780][T29263] new_page+0x121/0x170
[ 491.867079][T29263] migrate_pages+0x465/0x1810
[ 491.871832][T29263] ? do_mbind+0x760/0x760
[ 491.876161][T29263] ? remove_migration_ptes+0x90/0x90
[ 491.881642][T29263] do_mbind+0x5b7/0x760
[ 491.885817][T29263] __se_sys_mbind+0x151/0x410
[ 491.890539][T29263] __x64_sys_mbind+0x74/0x80
[ 491.895164][T29263] do_syscall_64+0x44/0xd0
[ 491.899598][T29263] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 491.905665][T29263] RIP: 0033:0x7fb80e59e059
[ 491.910076][T29263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 491.929768][T29263] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:55 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x23, 0x0, 0x6, 0x10000000002)
18:38:55 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000004000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:55 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 491.938173][T29263] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 491.946138][T29263] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 491.954102][T29263] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 491.962250][T29263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 491.970220][T29263] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 491.978211][T29263]
18:38:55 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 63)
18:38:55 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 11)
18:38:55 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:55 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:55 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 492.071091][T29290] loop5: detected capacity change from 0 to 264192
18:38:55 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 492.143833][T29298] loop4: detected capacity change from 0 to 264192
[ 492.164823][T29301] FAULT_INJECTION: forcing a failure.
[ 492.164823][T29301] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 492.178111][T29301] CPU: 1 PID: 29301 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
18:38:55 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x24, 0x0, 0x6, 0x10000000002)
[ 492.189214][T29301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 492.199451][T29301] Call Trace:
[ 492.202747][T29301]
[ 492.205670][T29301] dump_stack_lvl+0xd6/0x122
[ 492.210280][T29301] dump_stack+0x11/0x1b
[ 492.214497][T29301] should_fail+0x23c/0x250
[ 492.218913][T29301] __alloc_pages+0x102/0x330
[ 492.223933][T29301] alloc_pages_vma+0x67e/0x810
[ 492.228702][T29301] new_page+0x121/0x170
[ 492.232914][T29301] migrate_pages+0x465/0x1810
[ 492.237683][T29301] ? do_mbind+0x760/0x760
[ 492.242063][T29301] ? remove_migration_ptes+0x90/0x90
[ 492.247439][T29301] do_mbind+0x5b7/0x760
[ 492.251593][T29301] __se_sys_mbind+0x151/0x410
[ 492.256301][T29301] __x64_sys_mbind+0x74/0x80
[ 492.260903][T29301] do_syscall_64+0x44/0xd0
[ 492.265317][T29301] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 492.271216][T29301] RIP: 0033:0x7fb80e59e059
[ 492.275622][T29301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 492.295487][T29301] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 492.303899][T29301] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 492.311883][T29301] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 492.319856][T29301] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 492.327873][T29301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 492.335940][T29301] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 492.343973][T29301]
[ 492.354940][T29298] FAULT_INJECTION: forcing a failure.
[ 492.354940][T29298] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 492.368232][T29298] CPU: 0 PID: 29298 Comm: syz-executor.4 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 492.379254][T29298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 492.389360][T29298] Call Trace:
[ 492.392628][T29298]
[ 492.395546][T29298] dump_stack_lvl+0xd6/0x122
[ 492.400130][T29298] dump_stack+0x11/0x1b
[ 492.404378][T29298] should_fail+0x23c/0x250
[ 492.408828][T29298] __alloc_pages+0x102/0x330
[ 492.413463][T29298] alloc_pages_vma+0x67e/0x810
[ 492.418248][T29298] new_page+0x121/0x170
[ 492.422390][T29298] migrate_pages+0x465/0x1810
[ 492.427066][T29298] ? do_mbind+0x760/0x760
[ 492.431400][T29298] ? remove_migration_ptes+0x90/0x90
[ 492.436674][T29298] do_mbind+0x5b7/0x760
[ 492.440817][T29298] __se_sys_mbind+0x151/0x410
[ 492.445481][T29298] __x64_sys_mbind+0x74/0x80
[ 492.450194][T29298] do_syscall_64+0x44/0xd0
[ 492.454645][T29298] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 492.460614][T29298] RIP: 0033:0x7f1ee090e059
[ 492.465015][T29298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 492.484654][T29298] RSP: 002b:00007f1edfa84168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:56 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 64)
18:38:56 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:56 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
[ 492.493051][T29298] RAX: ffffffffffffffda RBX: 00007f1ee0a20f60 RCX: 00007f1ee090e059
[ 492.501017][T29298] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 492.509156][T29298] RBP: 00007f1edfa841d0 R08: 0000000000000000 R09: 0000010000000002
[ 492.517191][T29298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 492.525184][T29298] R13: 00007fff7f45224f R14: 00007f1edfa84300 R15: 0000000000022000
[ 492.533201][T29298]
18:38:56 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 12)
18:38:56 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:56 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 492.615476][T29312] loop5: detected capacity change from 0 to 264192
[ 492.636441][T29313] FAULT_INJECTION: forcing a failure.
[ 492.636441][T29313] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 492.649727][T29313] CPU: 0 PID: 29313 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 492.660799][T29313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 492.670930][T29313] Call Trace:
[ 492.674250][T29313]
[ 492.677173][T29313] dump_stack_lvl+0xd6/0x122
[ 492.681829][T29313] dump_stack+0x11/0x1b
[ 492.685983][T29313] should_fail+0x23c/0x250
[ 492.690425][T29313] __alloc_pages+0x102/0x330
[ 492.695057][T29313] alloc_pages_vma+0x67e/0x810
[ 492.699863][T29313] new_page+0x121/0x170
[ 492.704022][T29313] migrate_pages+0x465/0x1810
[ 492.708708][T29313] ? do_mbind+0x760/0x760
[ 492.713043][T29313] ? remove_migration_ptes+0x90/0x90
[ 492.718339][T29313] do_mbind+0x5b7/0x760
[ 492.722520][T29313] __se_sys_mbind+0x151/0x410
[ 492.727236][T29313] __x64_sys_mbind+0x74/0x80
[ 492.731828][T29313] do_syscall_64+0x44/0xd0
[ 492.736250][T29313] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 492.742212][T29313] RIP: 0033:0x7fb80e59e059
[ 492.746617][T29313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 492.766388][T29313] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 492.774885][T29313] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 492.782856][T29313] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 492.790935][T29313] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 492.798936][T29313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 492.806907][T29313] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
18:38:56 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x25, 0x0, 0x6, 0x10000000002)
18:38:56 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 65)
[ 492.814882][T29313]
18:38:56 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:56 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000008000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 492.896643][T29321] loop4: detected capacity change from 0 to 264192
[ 492.905028][T29327] loop5: detected capacity change from 0 to 264192
[ 492.941188][T29323] FAULT_INJECTION: forcing a failure.
[ 492.941188][T29323] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 492.954560][T29323] CPU: 0 PID: 29323 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 492.965587][T29323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 492.975638][T29323] Call Trace:
[ 492.978910][T29323]
[ 492.981835][T29323] dump_stack_lvl+0xd6/0x122
[ 492.986488][T29323] dump_stack+0x11/0x1b
18:38:56 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 492.990650][T29323] should_fail+0x23c/0x250
[ 492.995068][T29323] __alloc_pages+0x102/0x330
[ 492.999658][T29323] alloc_pages_vma+0x67e/0x810
[ 493.004484][T29323] new_page+0x121/0x170
[ 493.008655][T29323] migrate_pages+0x465/0x1810
[ 493.013347][T29323] ? do_mbind+0x760/0x760
[ 493.017877][T29323] ? remove_migration_ptes+0x90/0x90
[ 493.023174][T29323] do_mbind+0x5b7/0x760
[ 493.027333][T29323] __se_sys_mbind+0x151/0x410
[ 493.032034][T29323] __x64_sys_mbind+0x74/0x80
[ 493.036679][T29323] do_syscall_64+0x44/0xd0
[ 493.041093][T29323] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 493.047023][T29323] RIP: 0033:0x7fb80e59e059
[ 493.051438][T29323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 493.071047][T29323] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 493.079508][T29323] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:56 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x6, 0x10000000002)
18:38:56 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000009000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 493.087531][T29323] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 493.095565][T29323] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 493.103534][T29323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 493.111501][T29323] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 493.119476][T29323]
18:38:56 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:56 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 66)
18:38:56 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000a000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:56 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:56 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
18:38:56 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x26, 0x0, 0x6, 0x10000000002)
[ 493.314582][T29343] FAULT_INJECTION: forcing a failure.
[ 493.314582][T29343] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 493.328110][T29343] CPU: 1 PID: 29343 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 493.339141][T29343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 493.349291][T29343] Call Trace:
[ 493.352565][T29343]
[ 493.355534][T29343] dump_stack_lvl+0xd6/0x122
[ 493.357794][T29352] loop4: detected capacity change from 0 to 264192
[ 493.360173][T29343] dump_stack+0x11/0x1b
[ 493.360200][T29343] should_fail+0x23c/0x250
[ 493.375235][T29343] __alloc_pages+0x102/0x330
[ 493.379935][T29343] alloc_pages_vma+0x67e/0x810
[ 493.384731][T29343] new_page+0x121/0x170
[ 493.388887][T29343] migrate_pages+0x465/0x1810
[ 493.393653][T29343] ? do_mbind+0x760/0x760
[ 493.397986][T29343] ? remove_migration_ptes+0x90/0x90
[ 493.403796][T29343] do_mbind+0x5b7/0x760
[ 493.408035][T29343] __se_sys_mbind+0x151/0x410
[ 493.412856][T29343] __x64_sys_mbind+0x74/0x80
[ 493.417460][T29343] do_syscall_64+0x44/0xd0
[ 493.421939][T29343] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 493.427853][T29343] RIP: 0033:0x7fb80e59e059
[ 493.432302][T29343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 493.446899][T29353] loop5: detected capacity change from 0 to 264192
18:38:57 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:57 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000b000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 493.451903][T29343] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 493.451940][T29343] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 493.474750][T29343] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 493.482835][T29343] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 493.490824][T29343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 493.498833][T29343] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 493.506876][T29343]
18:38:57 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:57 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:57 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x27, 0x0, 0x6, 0x10000000002)
18:38:57 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:57 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 67)
18:38:57 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000d000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 493.653767][T29371] loop5: detected capacity change from 0 to 264192
[ 493.729922][T29369] FAULT_INJECTION: forcing a failure.
[ 493.729922][T29369] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 493.743308][T29369] CPU: 1 PID: 29369 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 493.754330][T29369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 493.764379][T29369] Call Trace:
[ 493.767650][T29369]
[ 493.770570][T29369] dump_stack_lvl+0xd6/0x122
[ 493.775180][T29369] dump_stack+0x11/0x1b
[ 493.779347][T29369] should_fail+0x23c/0x250
[ 493.783768][T29369] __alloc_pages+0x102/0x330
[ 493.788412][T29369] alloc_pages_vma+0x67e/0x810
[ 493.793176][T29369] new_page+0x121/0x170
[ 493.797354][T29369] migrate_pages+0x465/0x1810
[ 493.802066][T29369] ? do_mbind+0x760/0x760
[ 493.806412][T29369] ? remove_migration_ptes+0x90/0x90
[ 493.811755][T29369] do_mbind+0x5b7/0x760
[ 493.815972][T29369] __se_sys_mbind+0x151/0x410
[ 493.820649][T29369] __x64_sys_mbind+0x74/0x80
[ 493.825232][T29369] do_syscall_64+0x44/0xd0
18:38:57 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:57 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:57 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x28, 0x0, 0x6, 0x10000000002)
18:38:57 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2, 0x0, 0x0, 0x10000000002)
[ 493.829646][T29369] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 493.835541][T29369] RIP: 0033:0x7fb80e59e059
[ 493.839954][T29369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 493.859569][T29369] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 493.868082][T29369] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:57 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000e000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:57 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 493.876035][T29369] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 493.884006][T29369] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 493.891963][T29369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 493.899963][T29369] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 493.907922][T29369]
18:38:57 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000f000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:57 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 68)
18:38:57 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x6, 0x10000000002)
18:38:57 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000010000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:57 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 493.991096][T29387] loop4: detected capacity change from 0 to 264192
[ 494.015962][T29390] loop5: detected capacity change from 0 to 264192
[ 494.092861][T29400] FAULT_INJECTION: forcing a failure.
[ 494.092861][T29400] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 494.106125][T29400] CPU: 0 PID: 29400 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 494.117147][T29400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 494.127197][T29400] Call Trace:
[ 494.130494][T29400]
[ 494.133418][T29400] dump_stack_lvl+0xd6/0x122
[ 494.138013][T29400] dump_stack+0x11/0x1b
18:38:57 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x0, 0x10000000002)
[ 494.142200][T29400] should_fail+0x23c/0x250
[ 494.146617][T29400] __alloc_pages+0x102/0x330
[ 494.151206][T29400] alloc_pages_vma+0x67e/0x810
[ 494.155967][T29400] new_page+0x121/0x170
[ 494.160172][T29400] migrate_pages+0x465/0x1810
[ 494.164897][T29400] ? do_mbind+0x760/0x760
[ 494.169329][T29400] ? remove_migration_ptes+0x90/0x90
[ 494.174657][T29400] do_mbind+0x5b7/0x760
[ 494.178820][T29400] __se_sys_mbind+0x151/0x410
[ 494.183507][T29400] __x64_sys_mbind+0x74/0x80
[ 494.188098][T29400] do_syscall_64+0x44/0xd0
18:38:57 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x29, 0x0, 0x6, 0x10000000002)
[ 494.192518][T29400] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 494.198415][T29400] RIP: 0033:0x7fb80e59e059
[ 494.202855][T29400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 494.222445][T29400] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 494.230872][T29400] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000049060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 69)
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000011000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 494.238826][T29400] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 494.246823][T29400] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 494.254775][T29400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 494.262754][T29400] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 494.270710][T29400]
18:38:58 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002)
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000012000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 494.349978][T29409] loop4: detected capacity change from 0 to 264192
[ 494.410215][T29417] loop5: detected capacity change from 0 to 264192
[ 494.418259][T29407] FAULT_INJECTION: forcing a failure.
[ 494.418259][T29407] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 494.431591][T29407] CPU: 1 PID: 29407 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 494.442616][T29407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 494.452671][T29407] Call Trace:
[ 494.455970][T29407]
[ 494.458897][T29407] dump_stack_lvl+0xd6/0x122
[ 494.463497][T29407] dump_stack+0x11/0x1b
[ 494.467725][T29407] should_fail+0x23c/0x250
[ 494.472213][T29407] __alloc_pages+0x102/0x330
[ 494.476862][T29407] alloc_pages_vma+0x67e/0x810
[ 494.481633][T29407] new_page+0x121/0x170
[ 494.485810][T29407] migrate_pages+0x465/0x1810
[ 494.491060][T29407] ? do_mbind+0x760/0x760
[ 494.495396][T29407] ? remove_migration_ptes+0x90/0x90
[ 494.500688][T29407] do_mbind+0x5b7/0x760
[ 494.504914][T29407] __se_sys_mbind+0x151/0x410
18:38:58 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x7, 0x0, 0x0, 0x10000000002)
[ 494.509595][T29407] __x64_sys_mbind+0x74/0x80
[ 494.514216][T29407] do_syscall_64+0x44/0xd0
[ 494.518678][T29407] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 494.524583][T29407] RIP: 0033:0x7fb80e59e059
[ 494.528993][T29407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 494.548629][T29407] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:58 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2a, 0x0, 0x6, 0x10000000002)
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000014000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 494.557069][T29407] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 494.565118][T29407] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 494.573107][T29407] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 494.581082][T29407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 494.589127][T29407] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 494.597101][T29407]
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0)
18:38:58 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 70)
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000016000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000018000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 494.692218][T29427] loop4: detected capacity change from 0 to 264192
[ 494.706423][T29432] loop5: detected capacity change from 0 to 264192
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0)
[ 494.806686][T29430] FAULT_INJECTION: forcing a failure.
[ 494.806686][T29430] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 494.820018][T29430] CPU: 1 PID: 29430 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 494.831220][T29430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 494.841332][T29430] Call Trace:
[ 494.844610][T29430]
[ 494.847539][T29430] dump_stack_lvl+0xd6/0x122
[ 494.852179][T29430] dump_stack+0x11/0x1b
18:38:58 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2b, 0x0, 0x6, 0x10000000002)
18:38:58 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x8, 0x0, 0x0, 0x10000000002)
[ 494.856333][T29430] should_fail+0x23c/0x250
[ 494.860838][T29430] __alloc_pages+0x102/0x330
[ 494.865430][T29430] alloc_pages_vma+0x67e/0x810
[ 494.870219][T29430] new_page+0x121/0x170
[ 494.874379][T29430] migrate_pages+0x465/0x1810
[ 494.879055][T29430] ? do_mbind+0x760/0x760
[ 494.883386][T29430] ? remove_migration_ptes+0x90/0x90
[ 494.888686][T29430] do_mbind+0x5b7/0x760
[ 494.892848][T29430] __se_sys_mbind+0x151/0x410
[ 494.897518][T29430] __x64_sys_mbind+0x74/0x80
[ 494.902104][T29430] do_syscall_64+0x44/0xd0
[ 494.906515][T29430] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 494.912521][T29430] RIP: 0033:0x7fb80e59e059
[ 494.916954][T29430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 494.936551][T29430] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 494.944952][T29430] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000019000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 494.952914][T29430] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 494.960900][T29430] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 494.968919][T29430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 494.976881][T29430] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 494.984889][T29430]
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 71)
18:38:58 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0)
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000025000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 495.081780][T29452] loop4: detected capacity change from 0 to 264192
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 495.140099][T29461] loop5: detected capacity change from 0 to 264192
18:38:58 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000005c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:58 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xc, 0x0, 0x0, 0x10000000002)
18:38:58 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 495.231014][T29458] FAULT_INJECTION: forcing a failure.
[ 495.231014][T29458] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 495.244274][T29458] CPU: 0 PID: 29458 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 495.255324][T29458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 495.265380][T29458] Call Trace:
[ 495.268658][T29458]
[ 495.271668][T29458] dump_stack_lvl+0xd6/0x122
[ 495.276262][T29458] dump_stack+0x11/0x1b
18:38:59 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2c, 0x0, 0x6, 0x10000000002)
[ 495.280430][T29458] should_fail+0x23c/0x250
[ 495.284857][T29458] __alloc_pages+0x102/0x330
[ 495.289449][T29458] alloc_pages_vma+0x67e/0x810
[ 495.294375][T29458] new_page+0x121/0x170
[ 495.298543][T29458] migrate_pages+0x465/0x1810
[ 495.303283][T29458] ? do_mbind+0x760/0x760
[ 495.307809][T29458] ? remove_migration_ptes+0x90/0x90
[ 495.313094][T29458] do_mbind+0x5b7/0x760
[ 495.317256][T29458] __se_sys_mbind+0x151/0x410
[ 495.321929][T29458] __x64_sys_mbind+0x74/0x80
[ 495.326580][T29458] do_syscall_64+0x44/0xd0
[ 495.331001][T29458] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 495.336925][T29458] RIP: 0033:0x7fb80e59e059
[ 495.341331][T29458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 495.361002][T29458] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 495.369478][T29458] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:38:59 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 1)
18:38:59 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 72)
[ 495.377432][T29458] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 495.385398][T29458] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 495.393392][T29458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 495.401516][T29458] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 495.409475][T29458]
[ 495.464777][T29477] loop4: detected capacity change from 0 to 264192
[ 495.494368][T29480] loop5: detected capacity change from 0 to 264192
[ 495.515205][T29473] FAULT_INJECTION: forcing a failure.
[ 495.515205][T29473] name failslab, interval 1, probability 0, space 0, times 0
[ 495.527880][T29473] CPU: 0 PID: 29473 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 495.538962][T29473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 495.549013][T29473] Call Trace:
[ 495.552286][T29473]
[ 495.555204][T29473] dump_stack_lvl+0xd6/0x122
[ 495.559869][T29473] dump_stack+0x11/0x1b
[ 495.564047][T29473] should_fail+0x23c/0x250
[ 495.568453][T29473] ? do_mbind+0x2cc/0x760
[ 495.572773][T29473] __should_failslab+0x81/0x90
[ 495.577689][T29473] should_failslab+0x5/0x20
[ 495.582250][T29473] kmem_cache_alloc+0x4f/0x320
[ 495.587005][T29473] ? get_pid_task+0x90/0xc0
[ 495.591528][T29473] do_mbind+0x2cc/0x760
[ 495.595686][T29473] ? __fget_files+0x1d2/0x210
[ 495.600346][T29473] __se_sys_mbind+0x151/0x410
[ 495.605104][T29473] __x64_sys_mbind+0x74/0x80
[ 495.609727][T29473] do_syscall_64+0x44/0xd0
[ 495.614153][T29473] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 495.620039][T29473] RIP: 0033:0x7f7e86279059
[ 495.624438][T29473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 495.644095][T29473] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 495.652544][T29473] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:38:59 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x12, 0x0, 0x0, 0x10000000002)
18:38:59 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000060000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 495.660514][T29473] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 495.668469][T29473] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 495.676424][T29473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 495.684389][T29473] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 495.692345][T29473]
18:38:59 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 2)
18:38:59 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 495.736410][T29482] FAULT_INJECTION: forcing a failure.
[ 495.736410][T29482] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 495.749707][T29482] CPU: 0 PID: 29482 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 495.760762][T29482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 495.766695][T29485] loop4: detected capacity change from 0 to 264192
[ 495.770814][T29482] Call Trace:
[ 495.770823][T29482]
[ 495.770865][T29482] dump_stack_lvl+0xd6/0x122
[ 495.788150][T29482] dump_stack+0x11/0x1b
[ 495.792348][T29482] should_fail+0x23c/0x250
[ 495.796795][T29482] __alloc_pages+0x102/0x330
[ 495.801404][T29482] alloc_pages_vma+0x67e/0x810
[ 495.806171][T29482] new_page+0x121/0x170
[ 495.810338][T29482] migrate_pages+0x465/0x1810
[ 495.815026][T29482] ? do_mbind+0x760/0x760
[ 495.819431][T29482] ? remove_migration_ptes+0x90/0x90
[ 495.824792][T29482] do_mbind+0x5b7/0x760
[ 495.829017][T29482] __se_sys_mbind+0x151/0x410
[ 495.833730][T29482] __x64_sys_mbind+0x74/0x80
[ 495.838322][T29482] do_syscall_64+0x44/0xd0
[ 495.842738][T29482] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 495.848640][T29482] RIP: 0033:0x7fb80e59e059
[ 495.853049][T29482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 495.872655][T29482] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:38:59 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x13, 0x0, 0x0, 0x10000000002)
[ 495.881127][T29482] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 495.889103][T29482] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 495.897066][T29482] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 495.905070][T29482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 495.913031][T29482] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 495.920999][T29482]
[ 495.925144][T29489] FAULT_INJECTION: forcing a failure.
[ 495.925144][T29489] name failslab, interval 1, probability 0, space 0, times 0
[ 495.937788][T29489] CPU: 1 PID: 29489 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 495.948810][T29489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 495.958871][T29489] Call Trace:
[ 495.962161][T29489]
[ 495.965082][T29489] dump_stack_lvl+0xd6/0x122
[ 495.969679][T29489] dump_stack+0x11/0x1b
[ 495.973936][T29489] should_fail+0x23c/0x250
[ 495.978427][T29489] ? vm_area_dup+0x44/0x130
[ 495.983076][T29489] __should_failslab+0x81/0x90
[ 495.987852][T29489] should_failslab+0x5/0x20
[ 495.992360][T29489] kmem_cache_alloc+0x4f/0x320
[ 495.997217][T29489] ? preempt_count_add+0x4e/0x90
[ 496.002171][T29489] vm_area_dup+0x44/0x130
[ 496.006575][T29489] ? debug_smp_processor_id+0x18/0x20
[ 496.011974][T29489] ? delay_tsc+0x96/0xe0
[ 496.016252][T29489] ? vma_merge+0x9c/0x810
[ 496.020594][T29489] __split_vma+0x82/0x320
[ 496.025010][T29489] ? vmacache_find+0x157/0x320
[ 496.029856][T29489] split_vma+0x57/0x70
[ 496.033918][T29489] mbind_range+0x52e/0x8d0
[ 496.038333][T29489] do_mbind+0x4d9/0x760
[ 496.042480][T29489] __se_sys_mbind+0x151/0x410
[ 496.047281][T29489] __x64_sys_mbind+0x74/0x80
[ 496.051975][T29489] do_syscall_64+0x44/0xd0
[ 496.056498][T29489] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 496.062396][T29489] RIP: 0033:0x7f7e86279059
[ 496.066806][T29489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:38:59 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2d, 0x0, 0x6, 0x10000000002)
18:38:59 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 73)
18:38:59 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 496.086484][T29489] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 496.094903][T29489] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 496.102876][T29489] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 496.110842][T29489] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 496.118891][T29489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 496.126878][T29489] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 496.134865][T29489]
18:38:59 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 3)
18:38:59 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007c000000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:38:59 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 496.185100][T29500] loop4: detected capacity change from 0 to 264192
[ 496.242587][T29496] FAULT_INJECTION: forcing a failure.
[ 496.242587][T29496] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 496.255909][T29496] CPU: 0 PID: 29496 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 496.267027][T29496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 496.277115][T29496] Call Trace:
[ 496.280394][T29496]
[ 496.283471][T29496] dump_stack_lvl+0xd6/0x122
[ 496.288438][T29496] dump_stack+0x11/0x1b
[ 496.292619][T29496] should_fail+0x23c/0x250
[ 496.297536][T29496] __alloc_pages+0x102/0x330
[ 496.302175][T29496] alloc_pages_vma+0x67e/0x810
[ 496.306999][T29496] new_page+0x121/0x170
[ 496.311179][T29496] migrate_pages+0x465/0x1810
[ 496.315955][T29496] ? do_mbind+0x760/0x760
[ 496.320292][T29496] ? remove_migration_ptes+0x90/0x90
[ 496.325636][T29496] do_mbind+0x5b7/0x760
[ 496.329796][T29496] __se_sys_mbind+0x151/0x410
[ 496.333230][T29511] loop5: detected capacity change from 0 to 264192
[ 496.334485][T29496] __x64_sys_mbind+0x74/0x80
[ 496.334510][T29496] do_syscall_64+0x44/0xd0
[ 496.350056][T29496] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 496.356052][T29496] RIP: 0033:0x7fb80e59e059
[ 496.360489][T29496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 496.380285][T29496] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:00 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x14, 0x0, 0x0, 0x10000000002)
18:39:00 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 496.388785][T29496] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 496.397154][T29496] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 496.405205][T29496] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 496.413253][T29496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 496.421228][T29496] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 496.429227][T29496]
[ 496.436687][T29503] FAULT_INJECTION: forcing a failure.
[ 496.436687][T29503] name failslab, interval 1, probability 0, space 0, times 0
[ 496.449770][T29503] CPU: 1 PID: 29503 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 496.461752][T29503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 496.471803][T29503] Call Trace:
[ 496.475075][T29503]
[ 496.477996][T29503] dump_stack_lvl+0xd6/0x122
[ 496.482721][T29503] dump_stack+0x11/0x1b
[ 496.486868][T29503] should_fail+0x23c/0x250
[ 496.491388][T29503] ? __mpol_dup+0x3f/0x180
[ 496.495806][T29503] __should_failslab+0x81/0x90
[ 496.500928][T29503] should_failslab+0x5/0x20
[ 496.505553][T29503] kmem_cache_alloc+0x4f/0x320
[ 496.510317][T29503] __mpol_dup+0x3f/0x180
[ 496.514568][T29503] mbind_range+0x5e7/0x8d0
[ 496.518975][T29503] do_mbind+0x4d9/0x760
[ 496.523122][T29503] __se_sys_mbind+0x151/0x410
[ 496.527805][T29503] __x64_sys_mbind+0x74/0x80
[ 496.532440][T29503] do_syscall_64+0x44/0xd0
[ 496.536846][T29503] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 496.542942][T29503] RIP: 0033:0x7f7e86279059
[ 496.547381][T29503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 496.566971][T29503] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 496.575374][T29503] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 496.583328][T29503] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
18:39:00 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 74)
18:39:00 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 496.591319][T29503] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 496.599335][T29503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 496.607298][T29503] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 496.615261][T29503]
18:39:00 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 4)
18:39:00 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2e, 0x0, 0x6, 0x10000000002)
18:39:00 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:00 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:00 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 496.724152][T29526] loop4: detected capacity change from 0 to 264192
[ 496.761375][T29531] loop5: detected capacity change from 0 to 264192
[ 496.763932][T29519] FAULT_INJECTION: forcing a failure.
[ 496.763932][T29519] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 496.781084][T29519] CPU: 1 PID: 29519 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 496.792132][T29519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 496.802180][T29519] Call Trace:
[ 496.805453][T29519]
[ 496.808383][T29519] dump_stack_lvl+0xd6/0x122
[ 496.812989][T29519] dump_stack+0x11/0x1b
[ 496.817228][T29519] should_fail+0x23c/0x250
[ 496.821689][T29519] __alloc_pages+0x102/0x330
[ 496.826339][T29519] alloc_pages_vma+0x67e/0x810
[ 496.831109][T29519] new_page+0x121/0x170
[ 496.835277][T29519] migrate_pages+0x465/0x1810
[ 496.839965][T29519] ? do_mbind+0x760/0x760
[ 496.844292][T29519] ? remove_migration_ptes+0x90/0x90
[ 496.849587][T29519] do_mbind+0x5b7/0x760
[ 496.853767][T29519] __se_sys_mbind+0x151/0x410
[ 496.858447][T29519] __x64_sys_mbind+0x74/0x80
[ 496.863169][T29519] do_syscall_64+0x44/0xd0
[ 496.867651][T29519] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 496.873768][T29519] RIP: 0033:0x7fb80e59e059
[ 496.878196][T29519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 496.897806][T29519] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 496.906299][T29519] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 496.914268][T29519] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
18:39:00 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x15, 0x0, 0x0, 0x10000000002)
18:39:00 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2f, 0x0, 0x6, 0x10000000002)
[ 496.922305][T29519] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 496.930801][T29519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 496.939074][T29519] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 496.947119][T29519]
[ 496.954917][T29523] FAULT_INJECTION: forcing a failure.
[ 496.954917][T29523] name failslab, interval 1, probability 0, space 0, times 0
[ 496.967800][T29523] CPU: 0 PID: 29523 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 496.979421][T29523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 496.989778][T29523] Call Trace:
[ 496.993317][T29523]
[ 496.996351][T29523] dump_stack_lvl+0xd6/0x122
[ 497.001604][T29523] dump_stack+0x11/0x1b
[ 497.005823][T29523] should_fail+0x23c/0x250
[ 497.010261][T29523] ? vm_area_dup+0x44/0x130
[ 497.014847][T29523] __should_failslab+0x81/0x90
[ 497.019929][T29523] should_failslab+0x5/0x20
[ 497.024446][T29523] kmem_cache_alloc+0x4f/0x320
[ 497.029509][T29523] ? __vma_adjust+0x1830/0x1a70
[ 497.034449][T29523] vm_area_dup+0x44/0x130
[ 497.040814][T29523] ? should_fail+0xd6/0x250
[ 497.045357][T29523] ? __mpol_equal+0x175/0x1c0
[ 497.050109][T29523] __split_vma+0x82/0x320
[ 497.054546][T29523] split_vma+0x57/0x70
[ 497.058627][T29523] mbind_range+0x587/0x8d0
[ 497.063224][T29523] do_mbind+0x4d9/0x760
[ 497.067558][T29523] __se_sys_mbind+0x151/0x410
18:39:00 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 75)
[ 497.072372][T29523] __x64_sys_mbind+0x74/0x80
[ 497.076969][T29523] do_syscall_64+0x44/0xd0
[ 497.081541][T29523] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 497.087527][T29523] RIP: 0033:0x7f7e86279059
[ 497.092057][T29523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 497.112648][T29523] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:00 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000bb050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 497.121066][T29523] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 497.129928][T29523] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 497.138006][T29523] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 497.146691][T29523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 497.155256][T29523] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 497.163301][T29523]
[ 497.204731][T29536] FAULT_INJECTION: forcing a failure.
[ 497.204731][T29536] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 497.210752][T29543] loop4: detected capacity change from 0 to 264192
[ 497.218450][T29536] CPU: 1 PID: 29536 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 497.218476][T29536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 497.218488][T29536] Call Trace:
[ 497.218494][T29536]
[ 497.253071][T29536] dump_stack_lvl+0xd6/0x122
[ 497.257888][T29536] dump_stack+0x11/0x1b
[ 497.262056][T29536] should_fail+0x23c/0x250
[ 497.266502][T29536] __alloc_pages+0x102/0x330
[ 497.271272][T29536] alloc_pages_vma+0x67e/0x810
[ 497.276236][T29536] new_page+0x121/0x170
[ 497.280864][T29536] migrate_pages+0x465/0x1810
[ 497.285710][T29536] ? do_mbind+0x760/0x760
[ 497.290050][T29536] ? remove_migration_ptes+0x90/0x90
[ 497.295765][T29536] do_mbind+0x5b7/0x760
[ 497.300009][T29536] __se_sys_mbind+0x151/0x410
[ 497.304817][T29536] __x64_sys_mbind+0x74/0x80
[ 497.309511][T29536] do_syscall_64+0x44/0xd0
[ 497.314016][T29536] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 497.320056][T29536] RIP: 0033:0x7fb80e59e059
[ 497.324504][T29536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 497.344291][T29536] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:01 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x16, 0x0, 0x0, 0x10000000002)
18:39:01 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 5)
18:39:01 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 497.352704][T29536] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 497.361115][T29536] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 497.369348][T29536] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 497.370839][T29541] loop5: detected capacity change from 0 to 264192
[ 497.377941][T29536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 497.393132][T29536] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 497.401105][T29536]
18:39:01 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 76)
18:39:01 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 497.501652][T29550] FAULT_INJECTION: forcing a failure.
[ 497.501652][T29550] name failslab, interval 1, probability 0, space 0, times 0
[ 497.514412][T29550] CPU: 0 PID: 29550 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 497.525715][T29550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 497.535871][T29550] Call Trace:
[ 497.539147][T29550]
[ 497.542073][T29550] dump_stack_lvl+0xd6/0x122
[ 497.546674][T29550] dump_stack+0x11/0x1b
[ 497.550901][T29550] should_fail+0x23c/0x250
[ 497.555319][T29550] ? anon_vma_clone+0x8d/0x380
[ 497.560080][T29550] __should_failslab+0x81/0x90
[ 497.564969][T29550] should_failslab+0x5/0x20
[ 497.569478][T29550] kmem_cache_alloc+0x4f/0x320
[ 497.574250][T29550] anon_vma_clone+0x8d/0x380
[ 497.578859][T29550] __split_vma+0x134/0x320
[ 497.583401][T29550] split_vma+0x57/0x70
[ 497.587578][T29550] mbind_range+0x587/0x8d0
[ 497.592028][T29550] do_mbind+0x4d9/0x760
[ 497.596464][T29550] __se_sys_mbind+0x151/0x410
[ 497.601142][T29550] __x64_sys_mbind+0x74/0x80
[ 497.605792][T29550] do_syscall_64+0x44/0xd0
[ 497.610212][T29550] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 497.616220][T29550] RIP: 0033:0x7f7e86279059
[ 497.620893][T29550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 497.640779][T29550] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 497.649191][T29550] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 497.657160][T29550] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 497.665138][T29550] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 497.673090][T29550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 497.681128][T29550] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 497.689156][T29550]
[ 497.701597][T29557] FAULT_INJECTION: forcing a failure.
[ 497.701597][T29557] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 497.714996][T29557] CPU: 1 PID: 29557 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 497.726093][T29557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 497.737119][T29557] Call Trace:
[ 497.740489][T29557]
[ 497.743417][T29557] dump_stack_lvl+0xd6/0x122
[ 497.748028][T29557] dump_stack+0x11/0x1b
18:39:01 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x30, 0x0, 0x6, 0x10000000002)
[ 497.752251][T29557] should_fail+0x23c/0x250
[ 497.756665][T29557] __alloc_pages+0x102/0x330
[ 497.761252][T29557] alloc_pages_vma+0x67e/0x810
[ 497.766075][T29557] new_page+0x121/0x170
[ 497.770270][T29557] migrate_pages+0x465/0x1810
[ 497.775023][T29557] ? do_mbind+0x760/0x760
[ 497.779361][T29557] ? remove_migration_ptes+0x90/0x90
[ 497.780632][T29560] loop5: detected capacity change from 0 to 264192
[ 497.784708][T29557] do_mbind+0x5b7/0x760
[ 497.784735][T29557] __se_sys_mbind+0x151/0x410
[ 497.800160][T29557] __x64_sys_mbind+0x74/0x80
[ 497.804752][T29557] do_syscall_64+0x44/0xd0
[ 497.809274][T29557] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 497.815180][T29557] RIP: 0033:0x7fb80e59e059
[ 497.819593][T29557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 497.839720][T29557] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:01 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x31, 0x0, 0x6, 0x10000000002)
18:39:01 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 497.848176][T29557] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 497.856245][T29557] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 497.864788][T29557] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 497.872779][T29557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 497.880748][T29557] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 497.888868][T29557]
18:39:01 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 6)
18:39:01 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 497.902682][T29562] loop4: detected capacity change from 0 to 264192
18:39:01 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:01 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 77)
18:39:01 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x17, 0x0, 0x0, 0x10000000002)
[ 498.016759][T29568] FAULT_INJECTION: forcing a failure.
[ 498.016759][T29568] name failslab, interval 1, probability 0, space 0, times 0
[ 498.029468][T29568] CPU: 0 PID: 29568 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 498.040647][T29568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 498.050798][T29568] Call Trace:
[ 498.054075][T29568]
[ 498.057000][T29568] dump_stack_lvl+0xd6/0x122
[ 498.061622][T29568] dump_stack+0x11/0x1b
[ 498.065847][T29568] should_fail+0x23c/0x250
[ 498.070329][T29568] ? __mpol_dup+0x3f/0x180
[ 498.074815][T29568] __should_failslab+0x81/0x90
[ 498.079647][T29568] should_failslab+0x5/0x20
[ 498.084159][T29568] kmem_cache_alloc+0x4f/0x320
[ 498.088928][T29568] __mpol_dup+0x3f/0x180
[ 498.093221][T29568] mbind_range+0x5e7/0x8d0
[ 498.097716][T29568] do_mbind+0x4d9/0x760
[ 498.101873][T29568] __se_sys_mbind+0x151/0x410
[ 498.106545][T29568] __x64_sys_mbind+0x74/0x80
[ 498.111147][T29568] do_syscall_64+0x44/0xd0
[ 498.115560][T29568] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 498.121502][T29568] RIP: 0033:0x7f7e86279059
[ 498.125904][T29568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 498.145616][T29568] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 498.154023][T29568] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:01 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 498.161981][T29568] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 498.169936][T29568] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 498.177893][T29568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 498.185851][T29568] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 498.194099][T29568]
[ 498.226539][T29576] FAULT_INJECTION: forcing a failure.
[ 498.226539][T29576] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 498.240112][T29576] CPU: 0 PID: 29576 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 498.245403][T29581] loop5: detected capacity change from 0 to 264192
[ 498.251129][T29576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 498.251143][T29576] Call Trace:
[ 498.251150][T29576]
[ 498.251157][T29576] dump_stack_lvl+0xd6/0x122
[ 498.278538][T29576] dump_stack+0x11/0x1b
[ 498.282746][T29576] should_fail+0x23c/0x250
[ 498.287210][T29576] __alloc_pages+0x102/0x330
[ 498.291804][T29576] alloc_pages_vma+0x67e/0x810
[ 498.296585][T29576] new_page+0x121/0x170
[ 498.300818][T29576] migrate_pages+0x465/0x1810
[ 498.305523][T29576] ? do_mbind+0x760/0x760
[ 498.310077][T29576] ? remove_migration_ptes+0x90/0x90
[ 498.316263][T29576] do_mbind+0x5b7/0x760
[ 498.320422][T29576] __se_sys_mbind+0x151/0x410
[ 498.325100][T29576] __x64_sys_mbind+0x74/0x80
[ 498.329694][T29576] do_syscall_64+0x44/0xd0
[ 498.334128][T29576] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 498.340084][T29576] RIP: 0033:0x7fb80e59e059
[ 498.344531][T29576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 498.364134][T29576] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:02 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 7)
18:39:02 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x32, 0x0, 0x6, 0x10000000002)
[ 498.372652][T29576] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 498.380629][T29576] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 498.388615][T29576] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 498.396656][T29576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 498.404758][T29576] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 498.412730][T29576]
18:39:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000006490000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 498.421068][T29582] loop4: detected capacity change from 0 to 264192
18:39:02 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x18, 0x0, 0x0, 0x10000000002)
18:39:02 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:02 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 78)
[ 498.498426][T29588] FAULT_INJECTION: forcing a failure.
[ 498.498426][T29588] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 498.511844][T29588] CPU: 0 PID: 29588 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 498.522881][T29588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 498.532964][T29588] Call Trace:
[ 498.536243][T29588]
[ 498.539221][T29588] dump_stack_lvl+0xd6/0x122
[ 498.543906][T29588] dump_stack+0x11/0x1b
[ 498.548132][T29588] should_fail+0x23c/0x250
[ 498.552590][T29588] __alloc_pages+0x102/0x330
[ 498.557187][T29588] alloc_pages_vma+0x67e/0x810
[ 498.561951][T29588] ? PageHuge+0x59/0xc0
[ 498.566115][T29588] new_page+0x121/0x170
[ 498.570272][T29588] migrate_pages+0x465/0x1810
[ 498.575022][T29588] ? __mpol_dup+0x151/0x180
[ 498.579529][T29588] ? mbind_range+0x846/0x8d0
[ 498.584117][T29588] ? do_mbind+0x760/0x760
[ 498.588483][T29588] do_mbind+0x5b7/0x760
[ 498.592742][T29588] __se_sys_mbind+0x151/0x410
[ 498.597425][T29588] __x64_sys_mbind+0x74/0x80
[ 498.602015][T29588] do_syscall_64+0x44/0xd0
[ 498.606521][T29588] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 498.612453][T29588] RIP: 0033:0x7f7e86279059
[ 498.616863][T29588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 498.636484][T29588] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 498.644949][T29588] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 498.652969][T29588] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 498.662209][T29588] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 498.670181][T29588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 498.678229][T29588] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 498.686237][T29588]
[ 498.699224][T29591] FAULT_INJECTION: forcing a failure.
[ 498.699224][T29591] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 498.712600][T29591] CPU: 1 PID: 29591 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 498.723626][T29591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 498.733697][T29591] Call Trace:
[ 498.736970][T29591]
[ 498.739896][T29591] dump_stack_lvl+0xd6/0x122
[ 498.744534][T29591] dump_stack+0x11/0x1b
[ 498.748785][T29591] should_fail+0x23c/0x250
[ 498.753204][T29591] __alloc_pages+0x102/0x330
[ 498.757871][T29591] alloc_pages_vma+0x67e/0x810
[ 498.762634][T29591] new_page+0x121/0x170
[ 498.766787][T29591] migrate_pages+0x465/0x1810
[ 498.771464][T29591] ? do_mbind+0x760/0x760
[ 498.775802][T29591] ? remove_migration_ptes+0x90/0x90
[ 498.781113][T29591] do_mbind+0x5b7/0x760
[ 498.785273][T29591] __se_sys_mbind+0x151/0x410
[ 498.789949][T29591] __x64_sys_mbind+0x74/0x80
[ 498.794536][T29591] do_syscall_64+0x44/0xd0
[ 498.798948][T29591] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 498.804903][T29591] RIP: 0033:0x7fb80e59e059
[ 498.809383][T29591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 498.829188][T29591] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 498.837661][T29591] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:39:02 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 8)
18:39:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 498.845758][T29591] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 498.853723][T29591] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 498.861718][T29591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 498.869685][T29591] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 498.877689][T29591]
18:39:02 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 498.917680][T29599] loop4: detected capacity change from 0 to 264192
[ 498.949736][T29603] loop5: detected capacity change from 0 to 264192
[ 498.953727][T29597] FAULT_INJECTION: forcing a failure.
[ 498.953727][T29597] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 498.969797][T29597] CPU: 0 PID: 29597 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 498.981064][T29597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 498.991271][T29597] Call Trace:
[ 498.994587][T29597]
[ 498.997531][T29597] dump_stack_lvl+0xd6/0x122
[ 499.002141][T29597] dump_stack+0x11/0x1b
[ 499.006303][T29597] should_fail+0x23c/0x250
[ 499.010727][T29597] __alloc_pages+0x102/0x330
18:39:02 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x19, 0x0, 0x0, 0x10000000002)
[ 499.015455][T29597] alloc_pages_vma+0x67e/0x810
[ 499.020312][T29597] ? PageHuge+0x59/0xc0
[ 499.024488][T29597] new_page+0x121/0x170
[ 499.028738][T29597] migrate_pages+0x465/0x1810
[ 499.033560][T29597] ? do_mbind+0x760/0x760
[ 499.038183][T29597] ? remove_migration_ptes+0x90/0x90
[ 499.043483][T29597] do_mbind+0x5b7/0x760
[ 499.047645][T29597] __se_sys_mbind+0x151/0x410
[ 499.052391][T29597] __x64_sys_mbind+0x74/0x80
[ 499.057136][T29597] do_syscall_64+0x44/0xd0
[ 499.061554][T29597] entry_SYSCALL_64_after_hwframe+0x44/0xae
18:39:02 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 79)
[ 499.067560][T29597] RIP: 0033:0x7f7e86279059
[ 499.071969][T29597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 499.091588][T29597] RSP: 002b:00007f7e853ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 499.100041][T29597] RAX: ffffffffffffffda RBX: 00007f7e8638c100 RCX: 00007f7e86279059
[ 499.108106][T29597] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
18:39:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:02 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x33, 0x0, 0x6, 0x10000000002)
[ 499.116085][T29597] RBP: 00007f7e853ad1d0 R08: 0000000000000000 R09: 0000010000000002
[ 499.124091][T29597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 499.132071][T29597] R13: 00007ffc19a6cfdf R14: 00007f7e853ad300 R15: 0000000000022000
[ 499.140103][T29597]
18:39:02 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 499.215388][T29609] FAULT_INJECTION: forcing a failure.
[ 499.215388][T29609] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 499.228674][T29609] CPU: 1 PID: 29609 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 499.239788][T29609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 499.249847][T29609] Call Trace:
[ 499.253159][T29609]
[ 499.256133][T29609] dump_stack_lvl+0xd6/0x122
[ 499.260793][T29609] dump_stack+0x11/0x1b
[ 499.264954][T29609] should_fail+0x23c/0x250
[ 499.269482][T29609] __alloc_pages+0x102/0x330
[ 499.274093][T29609] alloc_pages_vma+0x67e/0x810
[ 499.278930][T29609] new_page+0x121/0x170
[ 499.283217][T29609] migrate_pages+0x465/0x1810
[ 499.287980][T29609] ? do_mbind+0x760/0x760
[ 499.292320][T29609] ? remove_migration_ptes+0x90/0x90
[ 499.297637][T29609] do_mbind+0x5b7/0x760
[ 499.301795][T29609] __se_sys_mbind+0x151/0x410
[ 499.306544][T29609] __x64_sys_mbind+0x74/0x80
[ 499.311168][T29609] do_syscall_64+0x44/0xd0
18:39:02 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 9)
[ 499.315591][T29609] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 499.321489][T29609] RIP: 0033:0x7fb80e59e059
[ 499.325907][T29609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 499.345497][T29609] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 499.353999][T29609] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 499.362102][T29609] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 499.370064][T29609] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 499.378019][T29609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 499.385972][T29609] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 499.394022][T29609]
18:39:03 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 499.411405][T29619] loop4: detected capacity change from 0 to 264192
[ 499.432928][T29616] FAULT_INJECTION: forcing a failure.
[ 499.432928][T29616] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 499.446203][T29616] CPU: 0 PID: 29616 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 499.457399][T29616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 499.467454][T29616] Call Trace:
[ 499.470720][T29616]
[ 499.473645][T29616] dump_stack_lvl+0xd6/0x122
[ 499.478242][T29616] dump_stack+0x11/0x1b
[ 499.482484][T29616] should_fail+0x23c/0x250
[ 499.486968][T29616] __alloc_pages+0x102/0x330
[ 499.491620][T29616] alloc_pages_vma+0x67e/0x810
[ 499.496395][T29616] ? PageHuge+0x59/0xc0
[ 499.500588][T29616] new_page+0x121/0x170
[ 499.504746][T29616] migrate_pages+0x465/0x1810
[ 499.509433][T29616] ? do_mbind+0x760/0x760
[ 499.513801][T29616] ? remove_migration_ptes+0x90/0x90
[ 499.519177][T29616] do_mbind+0x5b7/0x760
[ 499.523335][T29616] __se_sys_mbind+0x151/0x410
[ 499.528020][T29616] __x64_sys_mbind+0x74/0x80
[ 499.532611][T29616] do_syscall_64+0x44/0xd0
[ 499.537029][T29616] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 499.543020][T29616] RIP: 0033:0x7f7e86279059
18:39:03 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a, 0x0, 0x0, 0x10000000002)
18:39:03 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 80)
[ 499.548300][T29616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 499.568286][T29616] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 499.576741][T29616] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 499.584710][T29616] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 499.592768][T29616] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 499.600741][T29616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 499.605926][T29626] loop5: detected capacity change from 0 to 264192
[ 499.608706][T29616] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 499.608727][T29616]
[ 499.636402][T29623] FAULT_INJECTION: forcing a failure.
[ 499.636402][T29623] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 499.649671][T29623] CPU: 0 PID: 29623 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 499.660821][T29623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 499.670870][T29623] Call Trace:
[ 499.674150][T29623]
[ 499.677156][T29623] dump_stack_lvl+0xd6/0x122
[ 499.681806][T29623] dump_stack+0x11/0x1b
[ 499.686011][T29623] should_fail+0x23c/0x250
[ 499.690428][T29623] __alloc_pages+0x102/0x330
[ 499.695014][T29623] alloc_pages_vma+0x67e/0x810
[ 499.699786][T29623] new_page+0x121/0x170
[ 499.703964][T29623] migrate_pages+0x465/0x1810
[ 499.708703][T29623] ? do_mbind+0x760/0x760
18:39:03 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 10)
[ 499.713116][T29623] ? remove_migration_ptes+0x90/0x90
[ 499.718467][T29623] do_mbind+0x5b7/0x760
[ 499.722667][T29623] __se_sys_mbind+0x151/0x410
[ 499.727350][T29623] __x64_sys_mbind+0x74/0x80
[ 499.732006][T29623] do_syscall_64+0x44/0xd0
[ 499.736442][T29623] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 499.742391][T29623] RIP: 0033:0x7fb80e59e059
[ 499.746800][T29623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:39:03 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 499.766434][T29623] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 499.774852][T29623] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 499.782824][T29623] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 499.790791][T29623] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 499.798763][T29623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 499.806740][T29623] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 499.814866][T29623]
18:39:03 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x34, 0x0, 0x6, 0x10000000002)
18:39:03 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000001000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:03 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 81)
[ 499.839949][T29629] FAULT_INJECTION: forcing a failure.
[ 499.839949][T29629] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 499.853254][T29629] CPU: 0 PID: 29629 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 499.864322][T29629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 499.874516][T29629] Call Trace:
[ 499.877794][T29629]
[ 499.880794][T29629] dump_stack_lvl+0xd6/0x122
[ 499.885396][T29629] dump_stack+0x11/0x1b
[ 499.889619][T29629] should_fail+0x23c/0x250
[ 499.894107][T29629] __alloc_pages+0x102/0x330
[ 499.898716][T29629] alloc_pages_vma+0x67e/0x810
[ 499.903486][T29629] ? PageHuge+0x59/0xc0
[ 499.907697][T29629] new_page+0x121/0x170
[ 499.911855][T29629] migrate_pages+0x465/0x1810
[ 499.916544][T29629] ? do_mbind+0x760/0x760
[ 499.920980][T29629] ? remove_migration_ptes+0x90/0x90
[ 499.926447][T29629] do_mbind+0x5b7/0x760
[ 499.930624][T29629] __se_sys_mbind+0x151/0x410
[ 499.935307][T29629] __x64_sys_mbind+0x74/0x80
[ 499.936114][T29638] loop4: detected capacity change from 0 to 264192
[ 499.939912][T29629] do_syscall_64+0x44/0xd0
[ 499.939937][T29629] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 499.939960][T29629] RIP: 0033:0x7f7e86279059
[ 499.939975][T29629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 499.981201][T29629] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:03 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000002000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 499.989621][T29629] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 499.997702][T29629] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 500.005670][T29629] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 500.013637][T29629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 500.021675][T29629] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 500.029652][T29629]
18:39:03 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 11)
18:39:03 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1b, 0x0, 0x0, 0x10000000002)
[ 500.062315][T29641] FAULT_INJECTION: forcing a failure.
[ 500.062315][T29641] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 500.075581][T29641] CPU: 0 PID: 29641 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 500.086627][T29641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 500.096680][T29641] Call Trace:
[ 500.099965][T29641]
[ 500.102889][T29641] dump_stack_lvl+0xd6/0x122
[ 500.107560][T29641] dump_stack+0x11/0x1b
[ 500.111754][T29641] should_fail+0x23c/0x250
[ 500.116231][T29641] __alloc_pages+0x102/0x330
[ 500.120828][T29641] alloc_pages_vma+0x67e/0x810
[ 500.125594][T29641] new_page+0x121/0x170
[ 500.129783][T29641] migrate_pages+0x465/0x1810
[ 500.134465][T29641] ? do_mbind+0x760/0x760
[ 500.138842][T29641] ? remove_migration_ptes+0x90/0x90
[ 500.144253][T29641] do_mbind+0x5b7/0x760
[ 500.148406][T29641] __se_sys_mbind+0x151/0x410
[ 500.153080][T29641] __x64_sys_mbind+0x74/0x80
[ 500.157671][T29641] do_syscall_64+0x44/0xd0
[ 500.162088][T29641] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 500.168063][T29641] RIP: 0033:0x7fb80e59e059
[ 500.172571][T29641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 500.192195][T29641] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 500.200660][T29641] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 500.208609][T29641] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 500.216571][T29641] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 500.224522][T29641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 500.232532][T29641] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 500.240587][T29641]
[ 500.254845][T29647] FAULT_INJECTION: forcing a failure.
[ 500.254845][T29647] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 500.268098][T29647] CPU: 0 PID: 29647 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 500.279245][T29647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 500.289330][T29647] Call Trace:
[ 500.292602][T29647]
[ 500.295518][T29647] dump_stack_lvl+0xd6/0x122
[ 500.300104][T29647] dump_stack+0x11/0x1b
[ 500.304301][T29647] should_fail+0x23c/0x250
[ 500.308759][T29647] __alloc_pages+0x102/0x330
[ 500.313357][T29647] alloc_pages_vma+0x67e/0x810
[ 500.318230][T29647] ? PageHuge+0x59/0xc0
[ 500.322443][T29647] new_page+0x121/0x170
[ 500.326602][T29647] migrate_pages+0x465/0x1810
[ 500.331375][T29647] ? do_mbind+0x760/0x760
[ 500.335695][T29647] ? remove_migration_ptes+0x90/0x90
[ 500.341035][T29647] do_mbind+0x5b7/0x760
[ 500.345363][T29647] __se_sys_mbind+0x151/0x410
[ 500.350030][T29647] __x64_sys_mbind+0x74/0x80
[ 500.354679][T29647] do_syscall_64+0x44/0xd0
[ 500.359119][T29647] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 500.365004][T29647] RIP: 0033:0x7f7e86279059
[ 500.369405][T29647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 500.389040][T29647] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 500.397437][T29647] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 500.405393][T29647] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
18:39:04 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:04 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 82)
[ 500.413348][T29647] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 500.421378][T29647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 500.429342][T29647] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 500.437312][T29647]
18:39:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000003000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:04 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 12)
18:39:04 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 500.480966][T29652] loop5: detected capacity change from 0 to 264192
[ 500.554631][T29661] loop4: detected capacity change from 0 to 264192
[ 500.567121][T29663] FAULT_INJECTION: forcing a failure.
[ 500.567121][T29663] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 500.580423][T29663] CPU: 0 PID: 29663 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 500.591446][T29663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 500.601496][T29663] Call Trace:
18:39:04 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x35, 0x0, 0x6, 0x10000000002)
18:39:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000004000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 500.604768][T29663]
[ 500.607696][T29663] dump_stack_lvl+0xd6/0x122
[ 500.612360][T29663] dump_stack+0x11/0x1b
[ 500.616597][T29663] should_fail+0x23c/0x250
[ 500.621018][T29663] __alloc_pages+0x102/0x330
[ 500.625610][T29663] alloc_pages_vma+0x67e/0x810
[ 500.630900][T29663] new_page+0x121/0x170
[ 500.635120][T29663] migrate_pages+0x465/0x1810
[ 500.639807][T29663] ? do_mbind+0x760/0x760
[ 500.644136][T29663] ? remove_migration_ptes+0x90/0x90
[ 500.649432][T29663] do_mbind+0x5b7/0x760
[ 500.653595][T29663] __se_sys_mbind+0x151/0x410
[ 500.658271][T29663] __x64_sys_mbind+0x74/0x80
[ 500.662882][T29663] do_syscall_64+0x44/0xd0
[ 500.667300][T29663] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 500.673257][T29663] RIP: 0033:0x7fb80e59e059
[ 500.677690][T29663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:39:04 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1c, 0x0, 0x0, 0x10000000002)
[ 500.697294][T29663] RSP: 002b:00007fb80d6f3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 500.705726][T29663] RAX: ffffffffffffffda RBX: 00007fb80e6b1030 RCX: 00007fb80e59e059
[ 500.713696][T29663] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 500.721732][T29663] RBP: 00007fb80d6f31d0 R08: 0000000000000000 R09: 0000010000000002
[ 500.729698][T29663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 500.737852][T29663] R13: 00007ffd4bf7e6af R14: 00007fb80d6f3300 R15: 0000000000022000
[ 500.745805][T29663]
[ 500.751986][T29662] FAULT_INJECTION: forcing a failure.
[ 500.751986][T29662] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 500.765265][T29662] CPU: 1 PID: 29662 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 500.776343][T29662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 500.786406][T29662] Call Trace:
[ 500.789702][T29662]
[ 500.792699][T29662] dump_stack_lvl+0xd6/0x122
[ 500.797350][T29662] dump_stack+0x11/0x1b
[ 500.801513][T29662] should_fail+0x23c/0x250
18:39:04 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 83)
[ 500.805932][T29662] __alloc_pages+0x102/0x330
[ 500.810516][T29662] alloc_pages_vma+0x67e/0x810
[ 500.815281][T29662] ? PageHuge+0x59/0xc0
[ 500.819436][T29662] new_page+0x121/0x170
[ 500.823589][T29662] migrate_pages+0x465/0x1810
[ 500.828281][T29662] ? do_mbind+0x760/0x760
[ 500.832648][T29662] ? remove_migration_ptes+0x90/0x90
[ 500.838109][T29662] do_mbind+0x5b7/0x760
[ 500.842261][T29662] __se_sys_mbind+0x151/0x410
[ 500.846939][T29662] __x64_sys_mbind+0x74/0x80
[ 500.851531][T29662] do_syscall_64+0x44/0xd0
[ 500.855961][T29662] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 500.861922][T29662] RIP: 0033:0x7f7e86279059
[ 500.866324][T29662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 500.886050][T29662] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 500.894454][T29662] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:04 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 500.902659][T29662] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 500.910616][T29662] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 500.918573][T29662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 500.926557][T29662] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 500.934559][T29662]
[ 500.964962][T29670] FAULT_INJECTION: forcing a failure.
[ 500.964962][T29670] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 500.978223][T29670] CPU: 0 PID: 29670 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 500.989269][T29670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 500.999348][T29670] Call Trace:
[ 501.002621][T29670]
[ 501.005536][T29670] dump_stack_lvl+0xd6/0x122
[ 501.010119][T29670] dump_stack+0x11/0x1b
[ 501.014272][T29670] should_fail+0x23c/0x250
[ 501.018789][T29670] __alloc_pages+0x102/0x330
[ 501.023461][T29670] alloc_pages_vma+0x67e/0x810
[ 501.028240][T29670] new_page+0x121/0x170
[ 501.032395][T29670] migrate_pages+0x465/0x1810
[ 501.037065][T29670] ? do_mbind+0x760/0x760
[ 501.041437][T29670] ? remove_migration_ptes+0x90/0x90
[ 501.046716][T29670] do_mbind+0x5b7/0x760
[ 501.050866][T29670] __se_sys_mbind+0x151/0x410
[ 501.055526][T29670] __x64_sys_mbind+0x74/0x80
[ 501.060210][T29670] do_syscall_64+0x44/0xd0
[ 501.064617][T29670] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 501.070510][T29670] RIP: 0033:0x7fb80e59e059
[ 501.074910][T29670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 501.094518][T29670] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 501.102932][T29670] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:39:04 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 13)
18:39:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000005000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 501.110889][T29670] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 501.118894][T29670] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 501.126851][T29670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 501.134826][T29670] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 501.142792][T29670]
18:39:04 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 84)
[ 501.177625][T29679] loop5: detected capacity change from 0 to 264192
[ 501.232713][T29683] loop4: detected capacity change from 0 to 264192
[ 501.254359][T29676] FAULT_INJECTION: forcing a failure.
[ 501.254359][T29676] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 501.267637][T29676] CPU: 1 PID: 29676 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 501.278690][T29676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 501.288742][T29676] Call Trace:
[ 501.292076][T29676]
[ 501.295002][T29676] dump_stack_lvl+0xd6/0x122
[ 501.299690][T29676] dump_stack+0x11/0x1b
[ 501.303920][T29676] should_fail+0x23c/0x250
[ 501.308438][T29676] __alloc_pages+0x102/0x330
[ 501.313097][T29676] alloc_pages_vma+0x67e/0x810
[ 501.317881][T29676] ? PageHuge+0x59/0xc0
[ 501.322066][T29676] new_page+0x121/0x170
[ 501.326294][T29676] migrate_pages+0x465/0x1810
18:39:05 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x36, 0x0, 0x6, 0x10000000002)
[ 501.330980][T29676] ? do_mbind+0x760/0x760
[ 501.335310][T29676] ? remove_migration_ptes+0x90/0x90
[ 501.340675][T29676] do_mbind+0x5b7/0x760
[ 501.344871][T29676] __se_sys_mbind+0x151/0x410
[ 501.349620][T29676] __x64_sys_mbind+0x74/0x80
[ 501.354209][T29676] do_syscall_64+0x44/0xd0
[ 501.358682][T29676] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 501.364578][T29676] RIP: 0033:0x7f7e86279059
[ 501.368993][T29676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 501.388663][T29676] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 501.397077][T29676] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 501.405045][T29676] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 501.413019][T29676] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 501.420994][T29676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:39:05 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1d, 0x0, 0x0, 0x10000000002)
[ 501.428965][T29676] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 501.436933][T29676]
[ 501.449920][T29684] FAULT_INJECTION: forcing a failure.
[ 501.449920][T29684] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 501.463242][T29684] CPU: 1 PID: 29684 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
18:39:05 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000006000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:05 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 14)
[ 501.474269][T29684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 501.484327][T29684] Call Trace:
[ 501.487656][T29684]
[ 501.490615][T29684] dump_stack_lvl+0xd6/0x122
[ 501.495297][T29684] dump_stack+0x11/0x1b
[ 501.499470][T29684] should_fail+0x23c/0x250
[ 501.503891][T29684] __alloc_pages+0x102/0x330
[ 501.508481][T29684] alloc_pages_vma+0x67e/0x810
[ 501.513359][T29684] new_page+0x121/0x170
[ 501.517519][T29684] migrate_pages+0x465/0x1810
[ 501.522349][T29684] ? do_mbind+0x760/0x760
[ 501.526731][T29684] ? remove_migration_ptes+0x90/0x90
[ 501.532071][T29684] do_mbind+0x5b7/0x760
[ 501.536256][T29684] __se_sys_mbind+0x151/0x410
[ 501.540955][T29684] __x64_sys_mbind+0x74/0x80
[ 501.545606][T29684] do_syscall_64+0x44/0xd0
[ 501.550028][T29684] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 501.555972][T29684] RIP: 0033:0x7fb80e59e059
[ 501.560430][T29684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 501.580156][T29684] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 501.588567][T29684] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 501.596541][T29684] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 501.604513][T29684] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 501.612517][T29684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 501.620985][T29684] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 501.628964][T29684]
18:39:05 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:05 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 85)
[ 501.654036][T29693] FAULT_INJECTION: forcing a failure.
[ 501.654036][T29693] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 501.667383][T29693] CPU: 1 PID: 29693 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 501.678409][T29693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 501.688512][T29693] Call Trace:
[ 501.691879][T29693]
[ 501.694805][T29693] dump_stack_lvl+0xd6/0x122
[ 501.699552][T29693] dump_stack+0x11/0x1b
[ 501.703728][T29693] should_fail+0x23c/0x250
[ 501.708144][T29693] __alloc_pages+0x102/0x330
[ 501.712733][T29693] alloc_pages_vma+0x67e/0x810
[ 501.717514][T29693] ? PageHuge+0x59/0xc0
[ 501.721678][T29693] new_page+0x121/0x170
[ 501.725828][T29693] migrate_pages+0x465/0x1810
[ 501.730513][T29693] ? do_mbind+0x760/0x760
[ 501.734848][T29693] ? remove_migration_ptes+0x90/0x90
[ 501.740154][T29693] do_mbind+0x5b7/0x760
[ 501.744310][T29693] __se_sys_mbind+0x151/0x410
[ 501.749036][T29693] __x64_sys_mbind+0x74/0x80
[ 501.753621][T29693] do_syscall_64+0x44/0xd0
[ 501.758053][T29693] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 501.763946][T29693] RIP: 0033:0x7f7e86279059
[ 501.768426][T29693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 501.788032][T29693] RSP: 002b:00007f7e853ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 501.796448][T29693] RAX: ffffffffffffffda RBX: 00007f7e8638c100 RCX: 00007f7e86279059
[ 501.804431][T29693] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 501.812425][T29693] RBP: 00007f7e853ad1d0 R08: 0000000000000000 R09: 0000010000000002
[ 501.820486][T29693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 501.828485][T29693] R13: 00007ffc19a6cfdf R14: 00007f7e853ad300 R15: 0000000000022000
[ 501.836457][T29693]
[ 501.855626][T29704] loop5: detected capacity change from 0 to 264192
[ 501.865873][T29695] loop4: detected capacity change from 0 to 264192
[ 501.867224][T29697] FAULT_INJECTION: forcing a failure.
[ 501.867224][T29697] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 501.885598][T29697] CPU: 0 PID: 29697 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 501.896611][T29697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 501.906659][T29697] Call Trace:
[ 501.909935][T29697]
[ 501.912857][T29697] dump_stack_lvl+0xd6/0x122
[ 501.917505][T29697] dump_stack+0x11/0x1b
[ 501.921703][T29697] should_fail+0x23c/0x250
[ 501.926121][T29697] __alloc_pages+0x102/0x330
[ 501.930713][T29697] alloc_pages_vma+0x67e/0x810
[ 501.935553][T29697] new_page+0x121/0x170
[ 501.939718][T29697] migrate_pages+0x465/0x1810
[ 501.944453][T29697] ? do_mbind+0x760/0x760
[ 501.948782][T29697] ? remove_migration_ptes+0x90/0x90
[ 501.954086][T29697] do_mbind+0x5b7/0x760
[ 501.958258][T29697] __se_sys_mbind+0x151/0x410
[ 501.962942][T29697] __x64_sys_mbind+0x74/0x80
[ 501.967529][T29697] do_syscall_64+0x44/0xd0
[ 501.972061][T29697] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 501.977958][T29697] RIP: 0033:0x7fb80e59e059
[ 501.982381][T29697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:39:05 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x37, 0x0, 0x6, 0x10000000002)
18:39:05 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 15)
[ 502.002052][T29697] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 502.010466][T29697] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 502.018527][T29697] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 502.026595][T29697] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 502.034718][T29697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 502.042697][T29697] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 502.050757][T29697]
18:39:05 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000007000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:05 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 86)
[ 502.088082][T29707] FAULT_INJECTION: forcing a failure.
[ 502.088082][T29707] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 502.101449][T29707] CPU: 1 PID: 29707 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 502.112470][T29707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 502.121548][ T1913] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[ 502.122527][T29707] Call Trace:
18:39:05 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1e, 0x0, 0x0, 0x10000000002)
[ 502.122534][T29707]
[ 502.122541][T29707] dump_stack_lvl+0xd6/0x122
[ 502.143509][T29707] dump_stack+0x11/0x1b
[ 502.147667][T29707] should_fail+0x23c/0x250
[ 502.152286][T29707] __alloc_pages+0x102/0x330
[ 502.156869][T29707] alloc_pages_vma+0x67e/0x810
[ 502.161663][T29707] ? PageHuge+0x59/0xc0
[ 502.165827][T29707] new_page+0x121/0x170
[ 502.169989][T29707] migrate_pages+0x465/0x1810
[ 502.170469][T29713] loop4: detected capacity change from 0 to 264192
[ 502.174673][T29707] ? do_mbind+0x760/0x760
[ 502.174698][T29707] ? remove_migration_ptes+0x90/0x90
[ 502.190806][T29707] do_mbind+0x5b7/0x760
[ 502.194972][T29707] __se_sys_mbind+0x151/0x410
[ 502.199713][T29707] __x64_sys_mbind+0x74/0x80
[ 502.204311][T29707] do_syscall_64+0x44/0xd0
[ 502.208772][T29707] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 502.214668][T29707] RIP: 0033:0x7f7e86279059
[ 502.219160][T29707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:39:05 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x21, 0x0, 0x0, 0x10000000002)
[ 502.238790][T29707] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 502.247207][T29707] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 502.255590][T29707] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 502.263566][T29707] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 502.271637][T29707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 502.279695][T29707] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
18:39:06 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 502.287670][T29707]
18:39:06 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 16)
[ 502.331914][T29716] loop5: detected capacity change from 0 to 264192
[ 502.354848][T29711] FAULT_INJECTION: forcing a failure.
[ 502.354848][T29711] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 502.368116][T29711] CPU: 1 PID: 29711 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 502.379225][T29711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 502.389281][T29711] Call Trace:
[ 502.392556][T29711]
[ 502.395486][T29711] dump_stack_lvl+0xd6/0x122
[ 502.400102][T29711] dump_stack+0x11/0x1b
[ 502.404314][T29711] should_fail+0x23c/0x250
[ 502.408915][T29711] __alloc_pages+0x102/0x330
[ 502.413658][T29711] alloc_pages_vma+0x67e/0x810
[ 502.418476][T29711] new_page+0x121/0x170
[ 502.422632][T29711] migrate_pages+0x465/0x1810
[ 502.427331][T29711] ? do_mbind+0x760/0x760
18:39:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000008000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:06 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x38, 0x0, 0x6, 0x10000000002)
[ 502.431738][T29711] ? remove_migration_ptes+0x90/0x90
[ 502.437032][T29711] do_mbind+0x5b7/0x760
[ 502.441189][T29711] __se_sys_mbind+0x151/0x410
[ 502.445867][T29711] __x64_sys_mbind+0x74/0x80
[ 502.450459][T29711] do_syscall_64+0x44/0xd0
[ 502.454874][T29711] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 502.460793][T29711] RIP: 0033:0x7fb80e59e059
[ 502.465202][T29711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 502.484807][T29711] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 502.493216][T29711] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 502.501265][T29711] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 502.509233][T29711] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 502.517306][T29711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:39:06 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 502.525366][T29711] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 502.533350][T29711]
[ 502.555972][T29724] FAULT_INJECTION: forcing a failure.
[ 502.555972][T29724] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 502.569212][T29724] CPU: 1 PID: 29724 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 502.580362][T29724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 502.590422][T29724] Call Trace:
[ 502.593838][T29724]
[ 502.596755][T29724] dump_stack_lvl+0xd6/0x122
[ 502.601358][T29724] dump_stack+0x11/0x1b
18:39:06 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 87)
[ 502.605595][T29724] should_fail+0x23c/0x250
[ 502.610027][T29724] __alloc_pages+0x102/0x330
[ 502.614662][T29724] alloc_pages_vma+0x67e/0x810
[ 502.619429][T29724] ? PageHuge+0x59/0xc0
[ 502.623595][T29724] new_page+0x121/0x170
[ 502.627765][T29724] migrate_pages+0x465/0x1810
[ 502.632451][T29724] ? do_mbind+0x760/0x760
[ 502.636875][T29724] ? remove_migration_ptes+0x90/0x90
[ 502.642242][T29724] do_mbind+0x5b7/0x760
[ 502.646431][T29724] __se_sys_mbind+0x151/0x410
[ 502.651398][T29724] __x64_sys_mbind+0x74/0x80
[ 502.655996][T29724] do_syscall_64+0x44/0xd0
[ 502.660408][T29724] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 502.666378][T29724] RIP: 0033:0x7f7e86279059
[ 502.670788][T29724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 502.690656][T29724] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000009000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:06 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 502.699065][T29724] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 502.707031][T29724] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 502.715112][T29724] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 502.723131][T29724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 502.731172][T29724] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 502.739237][T29724]
[ 502.747944][T29733] loop4: detected capacity change from 0 to 264192
[ 502.802349][T29732] FAULT_INJECTION: forcing a failure.
[ 502.802349][T29732] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 502.815634][T29732] CPU: 1 PID: 29732 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 502.826658][T29732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 502.832900][T29737] loop5: detected capacity change from 0 to 264192
[ 502.836728][T29732] Call Trace:
[ 502.836739][T29732]
[ 502.836746][T29732] dump_stack_lvl+0xd6/0x122
[ 502.854077][T29732] dump_stack+0x11/0x1b
[ 502.858282][T29732] should_fail+0x23c/0x250
[ 502.862777][T29732] __alloc_pages+0x102/0x330
[ 502.867758][T29732] alloc_pages_vma+0x67e/0x810
[ 502.872529][T29732] new_page+0x121/0x170
[ 502.876735][T29732] migrate_pages+0x465/0x1810
[ 502.881472][T29732] ? do_mbind+0x760/0x760
[ 502.885843][T29732] ? remove_migration_ptes+0x90/0x90
[ 502.891140][T29732] do_mbind+0x5b7/0x760
[ 502.895304][T29732] __se_sys_mbind+0x151/0x410
[ 502.900038][T29732] __x64_sys_mbind+0x74/0x80
[ 502.904662][T29732] do_syscall_64+0x44/0xd0
[ 502.909153][T29732] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 502.915102][T29732] RIP: 0033:0x7fb80e59e059
[ 502.919508][T29732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 502.939125][T29732] RSP: 002b:00007fb80d6d2168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:06 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x39, 0x0, 0x6, 0x10000000002)
18:39:06 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 17)
[ 502.947604][T29732] RAX: ffffffffffffffda RBX: 00007fb80e6b1100 RCX: 00007fb80e59e059
[ 502.955654][T29732] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 502.963626][T29732] RBP: 00007fb80d6d21d0 R08: 0000000000000000 R09: 0000010000000002
[ 502.971659][T29732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 502.979664][T29732] R13: 00007ffd4bf7e6af R14: 00007fb80d6d2300 R15: 0000000000022000
[ 502.987642][T29732]
18:39:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000a000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:06 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x22, 0x0, 0x0, 0x10000000002)
18:39:06 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000b000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 503.111693][T29749] loop5: detected capacity change from 0 to 264192
[ 503.125938][T29742] FAULT_INJECTION: forcing a failure.
[ 503.125938][T29742] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 503.139212][T29742] CPU: 1 PID: 29742 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 503.150671][T29742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
18:39:06 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 88)
[ 503.160728][T29742] Call Trace:
[ 503.164005][T29742]
[ 503.166949][T29742] dump_stack_lvl+0xd6/0x122
[ 503.171553][T29742] dump_stack+0x11/0x1b
[ 503.175763][T29742] should_fail+0x23c/0x250
[ 503.180178][T29742] __alloc_pages+0x102/0x330
[ 503.184770][T29742] alloc_pages_vma+0x67e/0x810
[ 503.189537][T29742] ? PageHuge+0x59/0xc0
[ 503.193712][T29742] new_page+0x121/0x170
[ 503.197914][T29742] migrate_pages+0x465/0x1810
[ 503.202679][T29742] ? do_mbind+0x760/0x760
[ 503.207067][T29742] ? remove_migration_ptes+0x90/0x90
[ 503.212430][T29742] do_mbind+0x5b7/0x760
[ 503.216592][T29742] __se_sys_mbind+0x151/0x410
[ 503.221276][T29742] __x64_sys_mbind+0x74/0x80
[ 503.225898][T29742] do_syscall_64+0x44/0xd0
[ 503.230309][T29742] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 503.236203][T29742] RIP: 0033:0x7f7e86279059
[ 503.240635][T29742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 503.260241][T29742] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 503.268657][T29742] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 503.276683][T29742] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 503.284666][T29742] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 503.292677][T29742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 503.300642][T29742] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 503.308615][T29742]
[ 503.317640][T29756] loop4: detected capacity change from 0 to 264192
[ 503.329182][T29754] FAULT_INJECTION: forcing a failure.
[ 503.329182][T29754] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 503.342517][T29754] CPU: 0 PID: 29754 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 503.353617][T29754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 503.363713][T29754] Call Trace:
18:39:07 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 18)
18:39:07 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3a, 0x0, 0x6, 0x10000000002)
[ 503.366987][T29754]
[ 503.369907][T29754] dump_stack_lvl+0xd6/0x122
[ 503.374577][T29754] dump_stack+0x11/0x1b
[ 503.378794][T29754] should_fail+0x23c/0x250
[ 503.383237][T29754] __alloc_pages+0x102/0x330
[ 503.387876][T29754] alloc_pages_vma+0x67e/0x810
[ 503.392641][T29754] new_page+0x121/0x170
[ 503.396816][T29754] migrate_pages+0x465/0x1810
[ 503.401500][T29754] ? do_mbind+0x760/0x760
[ 503.405907][T29754] ? remove_migration_ptes+0x90/0x90
[ 503.411200][T29754] do_mbind+0x5b7/0x760
18:39:07 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x23, 0x0, 0x0, 0x10000000002)
[ 503.415380][T29754] __se_sys_mbind+0x151/0x410
[ 503.420142][T29754] __x64_sys_mbind+0x74/0x80
[ 503.424734][T29754] do_syscall_64+0x44/0xd0
[ 503.429154][T29754] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 503.435071][T29754] RIP: 0033:0x7fb80e59e059
[ 503.439478][T29754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 503.459131][T29754] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:07 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 503.467564][T29754] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 503.475535][T29754] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 503.483587][T29754] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 503.491557][T29754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 503.499528][T29754] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 503.507497][T29754]
18:39:07 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 89)
[ 503.554795][T29759] FAULT_INJECTION: forcing a failure.
[ 503.554795][T29759] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 503.568097][T29759] CPU: 0 PID: 29759 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 503.579119][T29759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 503.589170][T29759] Call Trace:
[ 503.592443][T29759]
[ 503.595367][T29759] dump_stack_lvl+0xd6/0x122
[ 503.599964][T29759] dump_stack+0x11/0x1b
[ 503.604228][T29759] should_fail+0x23c/0x250
[ 503.608641][T29759] __alloc_pages+0x102/0x330
[ 503.613307][T29759] alloc_pages_vma+0x67e/0x810
[ 503.618137][T29759] ? PageHuge+0x59/0xc0
[ 503.622347][T29759] new_page+0x121/0x170
[ 503.626565][T29759] migrate_pages+0x465/0x1810
[ 503.631274][T29759] ? do_mbind+0x760/0x760
[ 503.635607][T29759] ? remove_migration_ptes+0x90/0x90
[ 503.640952][T29759] do_mbind+0x5b7/0x760
[ 503.645106][T29759] __se_sys_mbind+0x151/0x410
[ 503.649842][T29759] __x64_sys_mbind+0x74/0x80
[ 503.654429][T29759] do_syscall_64+0x44/0xd0
[ 503.658824][T29759] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 503.664696][T29759] RIP: 0033:0x7f7e86279059
[ 503.669152][T29759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 503.688888][T29759] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 503.697282][T29759] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 503.705274][T29759] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 503.713239][T29759] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 503.721223][T29759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 503.729169][T29759] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 503.737122][T29759]
[ 503.753538][T29764] FAULT_INJECTION: forcing a failure.
[ 503.753538][T29764] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 503.766900][T29764] CPU: 1 PID: 29764 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 503.777924][T29764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 503.787977][T29764] Call Trace:
[ 503.791354][T29764]
[ 503.794279][T29764] dump_stack_lvl+0xd6/0x122
[ 503.798905][T29764] dump_stack+0x11/0x1b
[ 503.803119][T29764] should_fail+0x23c/0x250
[ 503.807609][T29764] __alloc_pages+0x102/0x330
[ 503.812206][T29764] alloc_pages_vma+0x67e/0x810
[ 503.817092][T29764] new_page+0x121/0x170
[ 503.821563][T29764] migrate_pages+0x465/0x1810
[ 503.826280][T29764] ? do_mbind+0x760/0x760
[ 503.830701][T29764] ? remove_migration_ptes+0x90/0x90
[ 503.836040][T29764] do_mbind+0x5b7/0x760
[ 503.840255][T29764] __se_sys_mbind+0x151/0x410
[ 503.844949][T29764] __x64_sys_mbind+0x74/0x80
[ 503.849600][T29764] do_syscall_64+0x44/0xd0
[ 503.854033][T29764] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 503.859930][T29764] RIP: 0033:0x7fb80e59e059
[ 503.864341][T29764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 503.883949][T29764] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 503.892375][T29764] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:39:07 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 19)
[ 503.900451][T29764] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 503.908488][T29764] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 503.916456][T29764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 503.924464][T29764] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 503.932435][T29764]
[ 503.965596][T29772] FAULT_INJECTION: forcing a failure.
[ 503.965596][T29772] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 503.978905][T29772] CPU: 0 PID: 29772 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 503.989946][T29772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 503.992686][T29776] loop4: detected capacity change from 0 to 264192
[ 503.999997][T29772] Call Trace:
[ 504.000065][T29772]
[ 504.006731][T29775] loop5: detected capacity change from 0 to 264192
[ 504.009872][T29772] dump_stack_lvl+0xd6/0x122
[ 504.009936][T29772] dump_stack+0x11/0x1b
[ 504.028033][T29772] should_fail+0x23c/0x250
[ 504.032457][T29772] __alloc_pages+0x102/0x330
[ 504.037050][T29772] alloc_pages_vma+0x67e/0x810
[ 504.041817][T29772] ? PageHuge+0x59/0xc0
[ 504.045993][T29772] new_page+0x121/0x170
[ 504.050216][T29772] migrate_pages+0x465/0x1810
[ 504.054993][T29772] ? do_mbind+0x760/0x760
[ 504.059334][T29772] ? remove_migration_ptes+0x90/0x90
[ 504.064637][T29772] do_mbind+0x5b7/0x760
[ 504.068798][T29772] __se_sys_mbind+0x151/0x410
[ 504.073549][T29772] __x64_sys_mbind+0x74/0x80
[ 504.078143][T29772] do_syscall_64+0x44/0xd0
[ 504.082561][T29772] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 504.088495][T29772] RIP: 0033:0x7f7e86279059
[ 504.092905][T29772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:39:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000d000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:07 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 90)
18:39:07 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000400000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 504.112509][T29772] RSP: 002b:00007f7e853ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 504.121000][T29772] RAX: ffffffffffffffda RBX: 00007f7e8638c100 RCX: 00007f7e86279059
[ 504.128965][T29772] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 504.136929][T29772] RBP: 00007f7e853ad1d0 R08: 0000000000000000 R09: 0000010000000002
[ 504.144899][T29772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 504.153572][T29772] R13: 00007ffc19a6cfdf R14: 00007f7e853ad300 R15: 0000000000022000
[ 504.161551][T29772]
18:39:07 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x24, 0x0, 0x0, 0x10000000002)
18:39:07 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3b, 0x0, 0x6, 0x10000000002)
18:39:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:07 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 20)
[ 504.257817][T29786] FAULT_INJECTION: forcing a failure.
[ 504.257817][T29786] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 504.271251][T29786] CPU: 0 PID: 29786 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 504.282341][T29786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 504.292436][T29786] Call Trace:
[ 504.295710][T29786]
[ 504.298636][T29786] dump_stack_lvl+0xd6/0x122
[ 504.303235][T29786] dump_stack+0x11/0x1b
[ 504.307426][T29786] should_fail+0x23c/0x250
[ 504.311842][T29786] __alloc_pages+0x102/0x330
[ 504.316431][T29786] alloc_pages_vma+0x67e/0x810
[ 504.321272][T29786] new_page+0x121/0x170
[ 504.325532][T29786] migrate_pages+0x465/0x1810
[ 504.330287][T29786] ? do_mbind+0x760/0x760
[ 504.334616][T29786] ? remove_migration_ptes+0x90/0x90
[ 504.339910][T29786] do_mbind+0x5b7/0x760
[ 504.344067][T29786] __se_sys_mbind+0x151/0x410
[ 504.348753][T29786] __x64_sys_mbind+0x74/0x80
[ 504.353371][T29786] do_syscall_64+0x44/0xd0
[ 504.357800][T29786] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 504.363811][T29786] RIP: 0033:0x7fb80e59e059
[ 504.368227][T29786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 504.387873][T29786] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 504.396276][T29786] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 504.404265][T29786] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 504.412221][T29786] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 504.420178][T29786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 504.428155][T29786] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 504.436127][T29786]
[ 504.444618][T29791] FAULT_INJECTION: forcing a failure.
[ 504.444618][T29791] name fail_page_alloc, interval 1, probability 0, space 0, times 0
18:39:08 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:08 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 91)
[ 504.458234][T29791] CPU: 1 PID: 29791 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 504.469315][T29791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 504.479445][T29791] Call Trace:
[ 504.482798][T29791]
[ 504.485725][T29791] dump_stack_lvl+0xd6/0x122
[ 504.490321][T29791] dump_stack+0x11/0x1b
[ 504.494493][T29791] should_fail+0x23c/0x250
[ 504.498938][T29791] __alloc_pages+0x102/0x330
[ 504.503591][T29791] alloc_pages_vma+0x67e/0x810
[ 504.508410][T29791] ? PageHuge+0x59/0xc0
[ 504.512606][T29791] new_page+0x121/0x170
[ 504.516877][T29791] migrate_pages+0x465/0x1810
[ 504.521640][T29791] ? do_mbind+0x760/0x760
[ 504.526030][T29791] ? remove_migration_ptes+0x90/0x90
[ 504.531335][T29791] do_mbind+0x5b7/0x760
[ 504.535494][T29791] __se_sys_mbind+0x151/0x410
[ 504.540262][T29791] __x64_sys_mbind+0x74/0x80
[ 504.544861][T29791] do_syscall_64+0x44/0xd0
[ 504.549777][T29791] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 504.555849][T29791] RIP: 0033:0x7f7e86279059
[ 504.560240][T29791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 504.580144][T29791] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 504.588559][T29791] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 504.596570][T29791] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 504.604643][T29791] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 504.612703][T29791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 504.620702][T29791] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 504.628666][T29791]
[ 504.651241][T29799] loop4: detected capacity change from 0 to 264192
[ 504.653384][T29796] FAULT_INJECTION: forcing a failure.
[ 504.653384][T29796] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 504.671320][T29796] CPU: 0 PID: 29796 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 504.682343][T29796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 504.692397][T29796] Call Trace:
[ 504.692448][T29801] loop5: detected capacity change from 0 to 264192
[ 504.695670][T29796]
[ 504.695679][T29796] dump_stack_lvl+0xd6/0x122
[ 504.709646][T29796] dump_stack+0x11/0x1b
[ 504.714056][T29796] should_fail+0x23c/0x250
[ 504.718475][T29796] __alloc_pages+0x102/0x330
[ 504.723111][T29796] alloc_pages_vma+0x67e/0x810
[ 504.727914][T29796] new_page+0x121/0x170
[ 504.732073][T29796] migrate_pages+0x465/0x1810
[ 504.736760][T29796] ? do_mbind+0x760/0x760
[ 504.741094][T29796] ? remove_migration_ptes+0x90/0x90
[ 504.746440][T29796] do_mbind+0x5b7/0x760
[ 504.750631][T29796] __se_sys_mbind+0x151/0x410
[ 504.755315][T29796] __x64_sys_mbind+0x74/0x80
[ 504.759954][T29796] do_syscall_64+0x44/0xd0
[ 504.764368][T29796] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 504.770280][T29796] RIP: 0033:0x7fb80e59e059
[ 504.774692][T29796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
18:39:08 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 21)
18:39:08 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000f000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 504.794299][T29796] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 504.802719][T29796] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 504.810769][T29796] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 504.818743][T29796] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 504.826759][T29796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 504.834898][T29796] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 504.842946][T29796]
18:39:08 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:08 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x25, 0x0, 0x0, 0x10000000002)
18:39:08 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3c, 0x0, 0x6, 0x10000000002)
18:39:08 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 92)
18:39:08 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000010000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 504.962777][T29807] FAULT_INJECTION: forcing a failure.
[ 504.962777][T29807] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 504.976117][T29807] CPU: 0 PID: 29807 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 504.987202][T29807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 504.997249][T29807] Call Trace:
[ 505.000522][T29807]
[ 505.003444][T29807] dump_stack_lvl+0xd6/0x122
[ 505.008038][T29807] dump_stack+0x11/0x1b
18:39:08 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000011000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 505.012232][T29807] should_fail+0x23c/0x250
[ 505.016649][T29807] __alloc_pages+0x102/0x330
[ 505.021297][T29807] alloc_pages_vma+0x67e/0x810
[ 505.026056][T29807] ? PageHuge+0x59/0xc0
[ 505.030300][T29807] new_page+0x121/0x170
[ 505.034540][T29807] migrate_pages+0x465/0x1810
[ 505.039272][T29807] ? do_mbind+0x760/0x760
[ 505.043606][T29807] ? remove_migration_ptes+0x90/0x90
[ 505.048993][T29807] do_mbind+0x5b7/0x760
[ 505.053266][T29807] __se_sys_mbind+0x151/0x410
[ 505.057926][T29807] __x64_sys_mbind+0x74/0x80
[ 505.062617][T29807] do_syscall_64+0x44/0xd0
[ 505.067021][T29807] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 505.072912][T29807] RIP: 0033:0x7f7e86279059
[ 505.077359][T29807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 505.097004][T29807] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 505.105433][T29807] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:08 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 505.113481][T29807] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 505.121436][T29807] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 505.129417][T29807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 505.137378][T29807] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 505.145430][T29807]
[ 505.171567][T29816] FAULT_INJECTION: forcing a failure.
[ 505.171567][T29816] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 505.184893][T29816] CPU: 0 PID: 29816 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 505.195940][T29816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 505.205993][T29816] Call Trace:
[ 505.209260][T29816]
[ 505.212178][T29816] dump_stack_lvl+0xd6/0x122
[ 505.216794][T29816] dump_stack+0x11/0x1b
[ 505.220950][T29816] should_fail+0x23c/0x250
[ 505.225355][T29816] __alloc_pages+0x102/0x330
[ 505.229932][T29816] alloc_pages_vma+0x67e/0x810
[ 505.234744][T29816] new_page+0x121/0x170
[ 505.238916][T29816] migrate_pages+0x465/0x1810
[ 505.243608][T29816] ? do_mbind+0x760/0x760
[ 505.247924][T29816] ? remove_migration_ptes+0x90/0x90
[ 505.253200][T29816] do_mbind+0x5b7/0x760
[ 505.257344][T29816] __se_sys_mbind+0x151/0x410
[ 505.262103][T29816] __x64_sys_mbind+0x74/0x80
[ 505.266693][T29816] do_syscall_64+0x44/0xd0
[ 505.271119][T29816] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 505.277085][T29816] RIP: 0033:0x7fb80e59e059
[ 505.281499][T29816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 505.301174][T29816] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 505.309690][T29816] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:39:09 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 22)
[ 505.317731][T29816] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 505.325693][T29816] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 505.333658][T29816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 505.341620][T29816] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 505.349595][T29816]
[ 505.360013][T29824] loop4: detected capacity change from 0 to 264192
18:39:09 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000012000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 505.366901][T29825] loop5: detected capacity change from 0 to 264192
18:39:09 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000005bb0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:09 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 93)
18:39:09 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000014000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:09 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3d, 0x0, 0x6, 0x10000000002)
[ 505.521138][T29830] FAULT_INJECTION: forcing a failure.
[ 505.521138][T29830] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 505.534438][T29830] CPU: 0 PID: 29830 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 505.545456][T29830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 505.555519][T29830] Call Trace:
[ 505.558818][T29830]
[ 505.561744][T29830] dump_stack_lvl+0xd6/0x122
[ 505.566370][T29830] dump_stack+0x11/0x1b
18:39:09 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x26, 0x0, 0x0, 0x10000000002)
18:39:09 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000001000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 505.570526][T29830] should_fail+0x23c/0x250
[ 505.575005][T29830] __alloc_pages+0x102/0x330
[ 505.579593][T29830] alloc_pages_vma+0x67e/0x810
[ 505.584361][T29830] ? PageHuge+0x59/0xc0
[ 505.588517][T29830] new_page+0x121/0x170
[ 505.592670][T29830] migrate_pages+0x465/0x1810
[ 505.597357][T29830] ? do_mbind+0x760/0x760
[ 505.601744][T29830] ? remove_migration_ptes+0x90/0x90
[ 505.607033][T29830] do_mbind+0x5b7/0x760
[ 505.611239][T29830] __se_sys_mbind+0x151/0x410
[ 505.615932][T29830] __x64_sys_mbind+0x74/0x80
[ 505.620709][T29830] do_syscall_64+0x44/0xd0
[ 505.625176][T29830] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 505.631072][T29830] RIP: 0033:0x7f7e86279059
[ 505.635557][T29830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 505.655178][T29830] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 505.663618][T29830] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:09 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000016000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:09 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 23)
[ 505.671586][T29830] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 505.679551][T29830] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 505.687602][T29830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 505.695568][T29830] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 505.703580][T29830]
[ 505.754738][T29839] FAULT_INJECTION: forcing a failure.
[ 505.754738][T29839] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 505.759376][T29847] loop5: detected capacity change from 0 to 264192
[ 505.768084][T29839] CPU: 0 PID: 29839 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 505.785556][T29839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 505.795609][T29839] Call Trace:
[ 505.798912][T29839]
[ 505.801844][T29839] dump_stack_lvl+0xd6/0x122
[ 505.806444][T29839] dump_stack+0x11/0x1b
[ 505.810628][T29839] should_fail+0x23c/0x250
[ 505.815050][T29839] __alloc_pages+0x102/0x330
[ 505.819642][T29839] alloc_pages_vma+0x67e/0x810
[ 505.824486][T29839] new_page+0x121/0x170
[ 505.828695][T29839] migrate_pages+0x465/0x1810
[ 505.833395][T29839] ? do_mbind+0x760/0x760
[ 505.837786][T29839] ? remove_migration_ptes+0x90/0x90
[ 505.843082][T29839] do_mbind+0x5b7/0x760
[ 505.847242][T29839] __se_sys_mbind+0x151/0x410
[ 505.851920][T29839] __x64_sys_mbind+0x74/0x80
[ 505.856511][T29839] do_syscall_64+0x44/0xd0
[ 505.860925][T29839] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 505.866885][T29839] RIP: 0033:0x7fb80e59e059
[ 505.871291][T29839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 505.890896][T29839] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:09 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000002000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 505.899437][T29839] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 505.907403][T29839] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 505.915370][T29839] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 505.923418][T29839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 505.931465][T29839] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 505.939472][T29839]
18:39:09 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000018000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:09 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3e, 0x0, 0x6, 0x10000000002)
[ 505.960066][T29850] loop4: detected capacity change from 0 to 264192
18:39:09 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000003000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 506.007636][T29852] FAULT_INJECTION: forcing a failure.
[ 506.007636][T29852] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 506.020914][T29852] CPU: 0 PID: 29852 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 506.031996][T29852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 506.042052][T29852] Call Trace:
[ 506.045329][T29852]
[ 506.048251][T29852] dump_stack_lvl+0xd6/0x122
[ 506.052856][T29852] dump_stack+0x11/0x1b
18:39:09 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 94)
[ 506.057044][T29852] should_fail+0x23c/0x250
[ 506.061461][T29852] __alloc_pages+0x102/0x330
[ 506.066052][T29852] alloc_pages_vma+0x67e/0x810
[ 506.070849][T29852] ? PageHuge+0x59/0xc0
[ 506.075081][T29852] new_page+0x121/0x170
[ 506.079233][T29852] migrate_pages+0x465/0x1810
[ 506.083909][T29852] ? do_mbind+0x760/0x760
[ 506.088237][T29852] ? remove_migration_ptes+0x90/0x90
[ 506.093606][T29852] do_mbind+0x5b7/0x760
[ 506.097867][T29852] __se_sys_mbind+0x151/0x410
[ 506.102561][T29852] __x64_sys_mbind+0x74/0x80
[ 506.107177][T29852] do_syscall_64+0x44/0xd0
[ 506.111650][T29852] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 506.117614][T29852] RIP: 0033:0x7f7e86279059
[ 506.122114][T29852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 506.141722][T29852] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 506.150138][T29852] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
18:39:09 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x27, 0x0, 0x0, 0x10000000002)
18:39:09 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000019000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 506.158110][T29852] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 506.166079][T29852] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 506.174075][T29852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 506.182585][T29852] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 506.190558][T29852]
[ 506.224776][T29860] FAULT_INJECTION: forcing a failure.
[ 506.224776][T29860] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 506.238075][T29860] CPU: 0 PID: 29860 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 506.249090][T29860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 506.256333][T29866] loop5: detected capacity change from 0 to 264192
[ 506.259182][T29860] Call Trace:
[ 506.268953][T29860]
[ 506.271877][T29860] dump_stack_lvl+0xd6/0x122
[ 506.276506][T29860] dump_stack+0x11/0x1b
[ 506.280669][T29860] should_fail+0x23c/0x250
[ 506.285093][T29860] __alloc_pages+0x102/0x330
[ 506.289697][T29860] alloc_pages_vma+0x67e/0x810
[ 506.294467][T29860] new_page+0x121/0x170
[ 506.298683][T29860] migrate_pages+0x465/0x1810
[ 506.303368][T29860] ? do_mbind+0x760/0x760
[ 506.307719][T29860] ? remove_migration_ptes+0x90/0x90
[ 506.313062][T29860] do_mbind+0x5b7/0x760
[ 506.317217][T29860] __se_sys_mbind+0x151/0x410
18:39:10 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x41, 0x0, 0x6, 0x10000000002)
[ 506.321897][T29860] __x64_sys_mbind+0x74/0x80
[ 506.326550][T29860] do_syscall_64+0x44/0xd0
[ 506.330995][T29860] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 506.336891][T29860] RIP: 0033:0x7fb80e59e059
[ 506.341332][T29860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 506.360938][T29860] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:10 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 24)
18:39:10 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 95)
[ 506.369368][T29860] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
[ 506.377531][T29860] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 506.385547][T29860] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 506.393527][T29860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 506.401544][T29860] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 506.409516][T29860]
18:39:10 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000004000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:10 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000025000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 506.496286][T29873] loop4: detected capacity change from 0 to 264192
[ 506.510713][T29869] FAULT_INJECTION: forcing a failure.
[ 506.510713][T29869] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 506.523987][T29869] CPU: 1 PID: 29869 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 506.535013][T29869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 506.545069][T29869] Call Trace:
[ 506.548342][T29869]
[ 506.551760][T29869] dump_stack_lvl+0xd6/0x122
[ 506.556356][T29869] dump_stack+0x11/0x1b
[ 506.560564][T29869] should_fail+0x23c/0x250
[ 506.565038][T29869] __alloc_pages+0x102/0x330
[ 506.569625][T29869] alloc_pages_vma+0x67e/0x810
[ 506.574457][T29869] ? PageHuge+0x59/0xc0
[ 506.578617][T29869] new_page+0x121/0x170
[ 506.582834][T29869] migrate_pages+0x465/0x1810
[ 506.587515][T29869] ? do_mbind+0x760/0x760
18:39:10 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000005000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:10 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x28, 0x0, 0x0, 0x10000000002)
[ 506.591852][T29869] ? remove_migration_ptes+0x90/0x90
[ 506.597217][T29869] do_mbind+0x5b7/0x760
[ 506.601378][T29869] __se_sys_mbind+0x151/0x410
[ 506.606058][T29869] __x64_sys_mbind+0x74/0x80
[ 506.610707][T29869] do_syscall_64+0x44/0xd0
[ 506.615189][T29869] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 506.621092][T29869] RIP: 0033:0x7f7e86279059
[ 506.625498][T29869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 506.645324][T29869] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 506.654058][T29869] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 506.662006][T29869] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 506.669960][T29869] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 506.677908][T29869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 506.685863][T29869] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 506.693829][T29869]
[ 506.709398][T29878] FAULT_INJECTION: forcing a failure.
[ 506.709398][T29878] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 506.722767][T29878] CPU: 0 PID: 29878 Comm: syz-executor.0 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 506.733786][T29878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 506.743835][T29878] Call Trace:
[ 506.747102][T29878]
[ 506.750029][T29878] dump_stack_lvl+0xd6/0x122
[ 506.754623][T29878] dump_stack+0x11/0x1b
[ 506.758816][T29878] should_fail+0x23c/0x250
[ 506.763228][T29878] __alloc_pages+0x102/0x330
[ 506.767815][T29878] alloc_pages_vma+0x67e/0x810
[ 506.772598][T29878] new_page+0x121/0x170
[ 506.776742][T29878] migrate_pages+0x465/0x1810
[ 506.781418][T29878] ? do_mbind+0x760/0x760
[ 506.785796][T29878] ? remove_migration_ptes+0x90/0x90
[ 506.791086][T29878] do_mbind+0x5b7/0x760
[ 506.795323][T29878] __se_sys_mbind+0x151/0x410
[ 506.800045][T29878] __x64_sys_mbind+0x74/0x80
[ 506.804623][T29878] do_syscall_64+0x44/0xd0
[ 506.809092][T29878] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 506.814980][T29878] RIP: 0033:0x7fb80e59e059
[ 506.819378][T29878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 506.838981][T29878] RSP: 002b:00007fb80d714168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 506.847380][T29878] RAX: ffffffffffffffda RBX: 00007fb80e6b0f60 RCX: 00007fb80e59e059
18:39:10 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 25)
18:39:10 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000040000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 506.855402][T29878] RDX: 0000000000000000 RSI: 0000000000c00007 RDI: 0000000020012000
[ 506.863431][T29878] RBP: 00007fb80d7141d0 R08: 0000000000000000 R09: 0000010000000002
[ 506.871403][T29878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 506.879405][T29878] R13: 00007ffd4bf7e6af R14: 00007fb80d714300 R15: 0000000000022000
[ 506.887376][T29878]
[ 506.896604][T29884] loop5: detected capacity change from 0 to 264192
18:39:10 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) (fail_nth: 96)
18:39:10 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000006000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:10 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000649000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 506.949466][T29890] loop4: detected capacity change from 0 to 264192
[ 507.011787][T29888] FAULT_INJECTION: forcing a failure.
[ 507.011787][T29888] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 507.025091][T29888] CPU: 0 PID: 29888 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 507.036159][T29888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 507.046513][T29888] Call Trace:
[ 507.049788][T29888]
[ 507.052713][T29888] dump_stack_lvl+0xd6/0x122
[ 507.057315][T29888] dump_stack+0x11/0x1b
[ 507.061481][T29888] should_fail+0x23c/0x250
[ 507.065960][T29888] __alloc_pages+0x102/0x330
[ 507.070573][T29888] alloc_pages_vma+0x67e/0x810
[ 507.075361][T29888] ? PageHuge+0x59/0xc0
[ 507.079518][T29888] new_page+0x121/0x170
[ 507.083667][T29888] migrate_pages+0x465/0x1810
[ 507.088340][T29888] ? do_mbind+0x760/0x760
[ 507.092677][T29888] ? remove_migration_ptes+0x90/0x90
[ 507.097964][T29888] do_mbind+0x5b7/0x760
[ 507.102169][T29888] __se_sys_mbind+0x151/0x410
[ 507.106840][T29888] __x64_sys_mbind+0x74/0x80
[ 507.111510][T29888] do_syscall_64+0x44/0xd0
[ 507.116026][T29888] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 507.121908][T29888] RIP: 0033:0x7f7e86279059
[ 507.126304][T29888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 507.145894][T29888] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 507.154378][T29888] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:10 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x42, 0x0, 0x6, 0x10000000002)
18:39:10 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x29, 0x0, 0x0, 0x10000000002)
18:39:10 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 26)
18:39:10 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)
[ 507.162360][T29888] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 507.170403][T29888] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 507.178365][T29888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 507.186327][T29888] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 507.194318][T29888]
18:39:10 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000007000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:11 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000005c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 507.319927][T29912] loop5: detected capacity change from 0 to 264192
[ 507.339021][T29904] FAULT_INJECTION: forcing a failure.
[ 507.339021][T29904] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 507.352417][T29904] CPU: 0 PID: 29904 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 507.363462][T29904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 507.373519][T29904] Call Trace:
[ 507.376796][T29904]
[ 507.379727][T29904] dump_stack_lvl+0xd6/0x122
[ 507.383644][T29914] loop4: detected capacity change from 0 to 264192
[ 507.384327][T29904] dump_stack+0x11/0x1b
[ 507.384356][T29904] should_fail+0x23c/0x250
[ 507.384376][T29904] __alloc_pages+0x102/0x330
[ 507.404025][T29904] alloc_pages_vma+0x67e/0x810
[ 507.408821][T29904] ? PageHuge+0x59/0xc0
[ 507.413011][T29904] new_page+0x121/0x170
[ 507.417205][T29904] migrate_pages+0x465/0x1810
[ 507.421894][T29904] ? do_mbind+0x760/0x760
[ 507.426375][T29904] ? remove_migration_ptes+0x90/0x90
[ 507.431696][T29904] do_mbind+0x5b7/0x760
[ 507.435860][T29904] __se_sys_mbind+0x151/0x410
[ 507.440554][T29904] __x64_sys_mbind+0x74/0x80
[ 507.445220][T29904] do_syscall_64+0x44/0xd0
[ 507.449637][T29904] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 507.455580][T29904] RIP: 0033:0x7f7e86279059
18:39:11 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000008000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:11 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2a, 0x0, 0x0, 0x10000000002)
[ 507.459988][T29904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 507.479630][T29904] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 507.488045][T29904] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 507.496183][T29904] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 507.504183][T29904] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 507.512249][T29904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:39:11 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000060000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 507.520223][T29904] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 507.528209][T29904]
18:39:11 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x43, 0x0, 0x6, 0x10000000002)
18:39:11 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 27)
18:39:11 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000009000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:11 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2, 0x0, 0x0, 0x10000000002)
18:39:11 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:11 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000a000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 507.665240][T29929] loop4: detected capacity change from 0 to 264192
[ 507.685880][T29921] FAULT_INJECTION: forcing a failure.
[ 507.685880][T29921] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 507.699180][T29921] CPU: 0 PID: 29921 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 507.710202][T29921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 507.720330][T29921] Call Trace:
[ 507.723610][T29921]
[ 507.726532][T29921] dump_stack_lvl+0xd6/0x122
[ 507.731223][T29921] dump_stack+0x11/0x1b
[ 507.735417][T29921] should_fail+0x23c/0x250
[ 507.739823][T29921] __alloc_pages+0x102/0x330
[ 507.744417][T29921] alloc_pages_vma+0x67e/0x810
[ 507.749176][T29921] ? PageHuge+0x59/0xc0
[ 507.753374][T29921] new_page+0x121/0x170
[ 507.757517][T29921] migrate_pages+0x465/0x1810
[ 507.762281][T29921] ? do_mbind+0x760/0x760
[ 507.766620][T29921] ? remove_migration_ptes+0x90/0x90
[ 507.771935][T29921] do_mbind+0x5b7/0x760
[ 507.776084][T29921] __se_sys_mbind+0x151/0x410
[ 507.780770][T29921] __x64_sys_mbind+0x74/0x80
[ 507.785360][T29921] do_syscall_64+0x44/0xd0
[ 507.789764][T29921] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 507.795770][T29921] RIP: 0033:0x7f7e86279059
[ 507.800189][T29921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 507.819791][T29921] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 507.828188][T29921] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 507.836145][T29921] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 507.844110][T29921] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 507.852184][T29921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:39:11 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffff9e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 507.860215][T29921] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 507.868223][T29921]
18:39:11 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 28)
18:39:11 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x5, 0x0, 0x0, 0x10000000002)
18:39:11 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000b000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 507.936734][T29941] loop5: detected capacity change from 0 to 264192
18:39:11 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2b, 0x0, 0x0, 0x10000000002)
18:39:11 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffffef000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:11 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x44, 0x0, 0x6, 0x10000000002)
18:39:11 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:11 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x7, 0x0, 0x0, 0x10000000002)
[ 508.041200][T29943] FAULT_INJECTION: forcing a failure.
[ 508.041200][T29943] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 508.054874][T29943] CPU: 0 PID: 29943 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 508.065938][T29943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 508.075989][T29943] Call Trace:
[ 508.079261][T29943]
[ 508.082255][T29943] dump_stack_lvl+0xd6/0x122
[ 508.086910][T29943] dump_stack+0x11/0x1b
[ 508.091081][T29943] should_fail+0x23c/0x250
[ 508.095502][T29943] __alloc_pages+0x102/0x330
[ 508.100088][T29943] alloc_pages_vma+0x67e/0x810
[ 508.104958][T29943] ? PageHuge+0x59/0xc0
[ 508.109114][T29943] new_page+0x121/0x170
[ 508.113306][T29943] migrate_pages+0x465/0x1810
[ 508.117995][T29943] ? do_mbind+0x760/0x760
[ 508.122373][T29943] ? remove_migration_ptes+0x90/0x90
[ 508.127670][T29943] do_mbind+0x5b7/0x760
[ 508.131890][T29943] __se_sys_mbind+0x151/0x410
[ 508.136607][T29943] __x64_sys_mbind+0x74/0x80
18:39:11 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x8, 0x0, 0x0, 0x10000000002)
[ 508.141193][T29943] do_syscall_64+0x44/0xd0
[ 508.145636][T29943] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 508.152065][T29943] RIP: 0033:0x7f7e86279059
[ 508.156475][T29943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 508.176211][T29943] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:11 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff0000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:11 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 29)
[ 508.184645][T29943] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 508.192620][T29943] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 508.200595][T29943] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 508.208576][T29943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 508.216643][T29943] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 508.224615][T29943]
18:39:12 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000d000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff5000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xc, 0x0, 0x0, 0x10000000002)
[ 508.286612][T29960] loop4: detected capacity change from 0 to 264192
[ 508.343585][T29966] loop5: detected capacity change from 0 to 264192
[ 508.385075][T29967] FAULT_INJECTION: forcing a failure.
[ 508.385075][T29967] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 508.398331][T29967] CPU: 1 PID: 29967 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 508.409356][T29967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 508.419408][T29967] Call Trace:
[ 508.422697][T29967]
[ 508.425665][T29967] dump_stack_lvl+0xd6/0x122
[ 508.430306][T29967] dump_stack+0x11/0x1b
[ 508.434595][T29967] should_fail+0x23c/0x250
[ 508.439086][T29967] __alloc_pages+0x102/0x330
[ 508.443675][T29967] alloc_pages_vma+0x67e/0x810
[ 508.448609][T29967] ? PageHuge+0x59/0xc0
[ 508.452799][T29967] new_page+0x121/0x170
[ 508.456953][T29967] migrate_pages+0x465/0x1810
[ 508.461707][T29967] ? do_mbind+0x760/0x760
[ 508.466117][T29967] ? remove_migration_ptes+0x90/0x90
[ 508.471476][T29967] do_mbind+0x5b7/0x760
[ 508.475635][T29967] __se_sys_mbind+0x151/0x410
[ 508.480358][T29967] __x64_sys_mbind+0x74/0x80
[ 508.484989][T29967] do_syscall_64+0x44/0xd0
[ 508.489453][T29967] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 508.495424][T29967] RIP: 0033:0x7f7e86279059
[ 508.499848][T29967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 508.519540][T29967] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 508.527972][T29967] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
18:39:12 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 508.536024][T29967] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 508.543989][T29967] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 508.551955][T29967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 508.559925][T29967] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 508.567982][T29967]
18:39:12 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2c, 0x0, 0x0, 0x10000000002)
18:39:12 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffffe000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x45, 0x0, 0x6, 0x10000000002)
18:39:12 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 30)
18:39:12 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000000f000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x12, 0x0, 0x0, 0x10000000002)
18:39:12 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007fffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000010000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 508.709036][T29985] loop5: detected capacity change from 0 to 264192
[ 508.725296][T29989] loop4: detected capacity change from 0 to 264192
[ 508.736218][T29982] FAULT_INJECTION: forcing a failure.
[ 508.736218][T29982] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 508.749527][T29982] CPU: 0 PID: 29982 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 508.760546][T29982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 508.770621][T29982] Call Trace:
[ 508.773898][T29982]
[ 508.776823][T29982] dump_stack_lvl+0xd6/0x122
[ 508.781443][T29982] dump_stack+0x11/0x1b
[ 508.785600][T29982] should_fail+0x23c/0x250
[ 508.790018][T29982] __alloc_pages+0x102/0x330
[ 508.794665][T29982] alloc_pages_vma+0x67e/0x810
[ 508.799425][T29982] ? PageHuge+0x59/0xc0
[ 508.803587][T29982] new_page+0x121/0x170
[ 508.807803][T29982] migrate_pages+0x465/0x1810
[ 508.812486][T29982] ? do_mbind+0x760/0x760
[ 508.816813][T29982] ? remove_migration_ptes+0x90/0x90
[ 508.822102][T29982] do_mbind+0x5b7/0x760
[ 508.826341][T29982] __se_sys_mbind+0x151/0x410
[ 508.831026][T29982] __x64_sys_mbind+0x74/0x80
[ 508.835626][T29982] do_syscall_64+0x44/0xd0
[ 508.840048][T29982] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 508.845951][T29982] RIP: 0033:0x7f7e86279059
18:39:12 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x13, 0x0, 0x0, 0x10000000002)
[ 508.850365][T29982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 508.869975][T29982] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 508.878390][T29982] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 508.886365][T29982] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 508.894357][T29982] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
18:39:12 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000009effffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x46, 0x0, 0x6, 0x10000000002)
[ 508.902328][T29982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 508.910326][T29982] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 508.918352][T29982]
18:39:12 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 31)
18:39:12 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2d, 0x0, 0x0, 0x10000000002)
18:39:12 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000011000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x14, 0x0, 0x0, 0x10000000002)
18:39:12 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000efffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:12 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x47, 0x0, 0x6, 0x10000000002)
[ 509.078741][T30016] loop5: detected capacity change from 0 to 264192
[ 509.081576][T30006] FAULT_INJECTION: forcing a failure.
[ 509.081576][T30006] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 509.098509][T30006] CPU: 1 PID: 30006 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 509.110056][T30006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 509.120106][T30006] Call Trace:
[ 509.123375][T30006]
[ 509.126316][T30006] dump_stack_lvl+0xd6/0x122
[ 509.130961][T30006] dump_stack+0x11/0x1b
[ 509.135194][T30006] should_fail+0x23c/0x250
[ 509.139643][T30006] __alloc_pages+0x102/0x330
[ 509.144296][T30006] alloc_pages_vma+0x67e/0x810
[ 509.149088][T30006] ? PageHuge+0x59/0xc0
[ 509.153254][T30006] new_page+0x121/0x170
[ 509.157406][T30006] migrate_pages+0x465/0x1810
[ 509.162087][T30006] ? do_mbind+0x760/0x760
[ 509.166458][T30006] ? remove_migration_ptes+0x90/0x90
[ 509.171797][T30006] do_mbind+0x5b7/0x760
[ 509.175987][T30006] __se_sys_mbind+0x151/0x410
[ 509.180660][T30006] __x64_sys_mbind+0x74/0x80
[ 509.185250][T30006] do_syscall_64+0x44/0xd0
[ 509.190427][T30006] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 509.196315][T30006] RIP: 0033:0x7f7e86279059
[ 509.200725][T30006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 509.220518][T30006] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:12 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000012000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f0ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 509.228951][T30006] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 509.236923][T30006] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 509.244899][T30006] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 509.252902][T30006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 509.260872][T30006] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 509.268915][T30006]
18:39:13 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x15, 0x0, 0x0, 0x10000000002)
18:39:13 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 32)
18:39:13 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000014000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 509.310350][T30022] loop4: detected capacity change from 0 to 264192
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f5ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x48, 0x0, 0x6, 0x10000000002)
18:39:13 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2e, 0x0, 0x0, 0x10000000002)
18:39:13 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000016000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 509.457108][T30027] FAULT_INJECTION: forcing a failure.
[ 509.457108][T30027] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 509.470405][T30027] CPU: 0 PID: 30027 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 509.481422][T30027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 509.491524][T30027] Call Trace:
[ 509.494784][T30027]
[ 509.497698][T30027] dump_stack_lvl+0xd6/0x122
[ 509.502282][T30027] dump_stack+0x11/0x1b
[ 509.506509][T30027] should_fail+0x23c/0x250
[ 509.510913][T30027] __alloc_pages+0x102/0x330
[ 509.515551][T30027] alloc_pages_vma+0x67e/0x810
[ 509.520312][T30027] ? PageHuge+0x59/0xc0
[ 509.524507][T30027] new_page+0x121/0x170
[ 509.528648][T30027] migrate_pages+0x465/0x1810
[ 509.533342][T30027] ? do_mbind+0x760/0x760
[ 509.537661][T30027] ? remove_migration_ptes+0x90/0x90
[ 509.542960][T30027] do_mbind+0x5b7/0x760
[ 509.547102][T30027] __se_sys_mbind+0x151/0x410
[ 509.551832][T30027] __x64_sys_mbind+0x74/0x80
[ 509.556406][T30027] do_syscall_64+0x44/0xd0
[ 509.560866][T30027] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 509.566821][T30027] RIP: 0033:0x7f7e86279059
[ 509.571230][T30027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 509.590970][T30027] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 509.599369][T30027] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:13 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x16, 0x0, 0x0, 0x10000000002)
[ 509.607384][T30027] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 509.615374][T30027] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 509.623329][T30027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 509.631305][T30027] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 509.639301][T30027]
18:39:13 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 33)
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000feffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 509.691220][T30041] loop5: detected capacity change from 0 to 264192
[ 509.691244][T30039] loop4: detected capacity change from 0 to 264192
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x17, 0x0, 0x0, 0x10000000002)
18:39:13 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000018000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2f, 0x0, 0x0, 0x10000000002)
18:39:13 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x49, 0x0, 0x6, 0x10000000002)
[ 509.807955][T30052] FAULT_INJECTION: forcing a failure.
[ 509.807955][T30052] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 509.821250][T30052] CPU: 0 PID: 30052 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 509.832287][T30052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 509.842461][T30052] Call Trace:
[ 509.845732][T30052]
[ 509.848651][T30052] dump_stack_lvl+0xd6/0x122
[ 509.853296][T30052] dump_stack+0x11/0x1b
[ 509.857463][T30052] should_fail+0x23c/0x250
[ 509.861944][T30052] __alloc_pages+0x102/0x330
[ 509.866538][T30052] alloc_pages_vma+0x67e/0x810
[ 509.871307][T30052] ? PageHuge+0x59/0xc0
[ 509.875470][T30052] new_page+0x121/0x170
[ 509.879806][T30052] migrate_pages+0x465/0x1810
[ 509.884542][T30052] ? do_mbind+0x760/0x760
[ 509.888868][T30052] ? remove_migration_ptes+0x90/0x90
[ 509.894171][T30052] do_mbind+0x5b7/0x760
[ 509.898433][T30052] __se_sys_mbind+0x151/0x410
[ 509.903123][T30052] __x64_sys_mbind+0x74/0x80
[ 509.907710][T30052] do_syscall_64+0x44/0xd0
[ 509.912118][T30052] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 509.918026][T30052] RIP: 0033:0x7f7e86279059
[ 509.922439][T30052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 509.942101][T30052] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 509.950564][T30052] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
18:39:13 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x18, 0x0, 0x0, 0x10000000002)
[ 509.958530][T30052] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 509.966487][T30052] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 509.974486][T30052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 509.982548][T30052] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 509.990506][T30052]
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000010a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000019000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000020a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.019316][T30059] loop5: detected capacity change from 0 to 264192
[ 510.032785][T30060] loop4: detected capacity change from 0 to 264192
18:39:13 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000025000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 34)
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x19, 0x0, 0x0, 0x10000000002)
18:39:13 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4a, 0x0, 0x6, 0x10000000002)
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000040a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x30, 0x0, 0x0, 0x10000000002)
18:39:13 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:13 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000040000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.225232][T30083] loop5: detected capacity change from 0 to 264192
[ 510.246143][T30087] FAULT_INJECTION: forcing a failure.
[ 510.246143][T30087] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 510.259415][T30087] CPU: 1 PID: 30087 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 510.270437][T30087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 510.280487][T30087] Call Trace:
[ 510.283754][T30087]
[ 510.286671][T30087] dump_stack_lvl+0xd6/0x122
[ 510.291266][T30087] dump_stack+0x11/0x1b
[ 510.295475][T30087] should_fail+0x23c/0x250
[ 510.299890][T30087] __alloc_pages+0x102/0x330
[ 510.304505][T30087] alloc_pages_vma+0x67e/0x810
[ 510.309255][T30087] ? PageHuge+0x59/0xc0
[ 510.313406][T30087] new_page+0x121/0x170
[ 510.317550][T30087] migrate_pages+0x465/0x1810
[ 510.322294][T30087] ? do_mbind+0x760/0x760
[ 510.326609][T30087] ? remove_migration_ptes+0x90/0x90
[ 510.331941][T30087] do_mbind+0x5b7/0x760
[ 510.336088][T30087] __se_sys_mbind+0x151/0x410
[ 510.340758][T30087] __x64_sys_mbind+0x74/0x80
[ 510.345338][T30087] do_syscall_64+0x44/0xd0
[ 510.349748][T30087] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 510.355672][T30087] RIP: 0033:0x7f7e86279059
[ 510.360086][T30087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 510.379787][T30087] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 510.388205][T30087] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 510.396208][T30087] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 510.404187][T30087] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 510.412145][T30087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:14 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a, 0x0, 0x0, 0x10000000002)
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.420153][T30087] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 510.428110][T30087]
18:39:14 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 35)
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000080a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:14 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000005c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.496683][T30099] loop4: detected capacity change from 0 to 264192
18:39:14 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x6a, 0x0, 0x6, 0x10000000002)
18:39:14 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000060000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.589864][T30100] FAULT_INJECTION: forcing a failure.
[ 510.589864][T30100] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 510.603198][T30100] CPU: 1 PID: 30100 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 510.614383][T30100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 510.624432][T30100] Call Trace:
[ 510.627731][T30100]
[ 510.630681][T30100] dump_stack_lvl+0xd6/0x122
[ 510.635341][T30100] dump_stack+0x11/0x1b
18:39:14 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x31, 0x0, 0x0, 0x10000000002)
18:39:14 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1b, 0x0, 0x0, 0x10000000002)
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.639495][T30100] should_fail+0x23c/0x250
[ 510.643934][T30100] __alloc_pages+0x102/0x330
[ 510.648599][T30100] alloc_pages_vma+0x67e/0x810
[ 510.653358][T30100] ? PageHuge+0x59/0xc0
[ 510.657522][T30100] new_page+0x121/0x170
[ 510.661681][T30100] migrate_pages+0x465/0x1810
[ 510.666463][T30100] ? do_mbind+0x760/0x760
[ 510.670791][T30100] ? remove_migration_ptes+0x90/0x90
[ 510.676120][T30100] do_mbind+0x5b7/0x760
[ 510.680305][T30100] __se_sys_mbind+0x151/0x410
[ 510.685097][T30100] __x64_sys_mbind+0x74/0x80
[ 510.689708][T30100] do_syscall_64+0x44/0xd0
[ 510.694128][T30100] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 510.700036][T30100] RIP: 0033:0x7f7e86279059
[ 510.704446][T30100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 510.724051][T30100] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 510.732519][T30100] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:14 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1c, 0x0, 0x0, 0x10000000002)
18:39:14 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 36)
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000d0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:14 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000000000007c000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.740511][T30100] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 510.748567][T30100] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 510.756787][T30100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 510.764789][T30100] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 510.772856][T30100]
18:39:14 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 510.842054][T30130] loop5: detected capacity change from 0 to 264192
[ 510.894708][T30127] FAULT_INJECTION: forcing a failure.
[ 510.894708][T30127] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 510.908074][T30127] CPU: 0 PID: 30127 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 510.919099][T30127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 510.929768][T30127] Call Trace:
[ 510.933044][T30127]
[ 510.935970][T30127] dump_stack_lvl+0xd6/0x122
[ 510.940629][T30127] dump_stack+0x11/0x1b
18:39:14 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x6b, 0x0, 0x6, 0x10000000002)
18:39:14 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1d, 0x0, 0x0, 0x10000000002)
[ 510.944787][T30127] should_fail+0x23c/0x250
[ 510.949201][T30127] __alloc_pages+0x102/0x330
[ 510.953790][T30127] alloc_pages_vma+0x67e/0x810
[ 510.958585][T30127] ? PageHuge+0x59/0xc0
[ 510.962836][T30127] new_page+0x121/0x170
[ 510.966989][T30127] migrate_pages+0x465/0x1810
[ 510.971675][T30127] ? do_mbind+0x760/0x760
[ 510.976002][T30127] ? remove_migration_ptes+0x90/0x90
[ 510.981289][T30127] do_mbind+0x5b7/0x760
[ 510.985449][T30127] __se_sys_mbind+0x151/0x410
[ 510.990168][T30127] __x64_sys_mbind+0x74/0x80
[ 510.994796][T30127] do_syscall_64+0x44/0xd0
[ 510.999215][T30127] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 511.005121][T30127] RIP: 0033:0x7f7e86279059
[ 511.009531][T30127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 511.029254][T30127] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 511.037649][T30127] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 511.045620][T30127] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 511.053647][T30127] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 511.061735][T30127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 511.069707][T30127] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 511.077673][T30127]
[ 511.106761][T30139] loop4: detected capacity change from 0 to 264192
[ 511.140595][ T2193] ==================================================================
[ 511.148683][ T2193] BUG: KCSAN: data-race in __filemap_remove_folio / folio_mapping
[ 511.156468][ T2193]
[ 511.158764][ T2193] write to 0xffffea0004d580d8 of 8 bytes by task 30139 on cpu 0:
[ 511.166718][ T2193] __filemap_remove_folio+0x1b7/0x2c0
[ 511.172088][ T2193] filemap_remove_folio+0x69/0x210
[ 511.177192][ T2193] truncate_inode_folio+0x14c/0x160
[ 511.182375][ T2193] truncate_inode_pages_range+0x6a2/0x8b0
[ 511.188135][ T2193] truncate_inode_pages+0x20/0x30
[ 511.193147][ T2193] set_blocksize+0x24e/0x270
[ 511.197715][ T2193] sb_set_blocksize+0x2c/0xa0
[ 511.202389][ T2193] fat_fill_super+0x135e/0x2af0
[ 511.207250][ T2193] msdos_fill_super+0x29/0x30
[ 511.212099][ T2193] mount_bdev+0x1e8/0x290
[ 511.216411][ T2193] msdos_mount+0x2d/0x40
[ 511.220631][ T2193] legacy_get_tree+0x70/0xc0
[ 511.225212][ T2193] vfs_get_tree+0x4a/0x1a0
[ 511.229669][ T2193] path_mount+0x11cf/0x1c40
[ 511.234149][ T2193] __se_sys_mount+0x24b/0x2f0
[ 511.238800][ T2193] __x64_sys_mount+0x63/0x70
[ 511.243377][ T2193] do_syscall_64+0x44/0xd0
[ 511.247768][ T2193] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 511.253640][ T2193]
[ 511.255955][ T2193] read to 0xffffea0004d580d8 of 8 bytes by task 2193 on cpu 1:
[ 511.263476][ T2193] folio_mapping+0x92/0x120
[ 511.267957][ T2193] __pagevec_lru_add_fn+0x81/0x380
[ 511.273047][ T2193] __pagevec_lru_add+0x1c3/0x270
[ 511.277960][ T2193] folio_add_lru+0x11a/0x160
[ 511.282525][ T2193] filemap_add_folio+0xf8/0x150
[ 511.287359][ T2193] page_cache_ra_unbounded+0x274/0x400
[ 511.292792][ T2193] force_page_cache_ra+0x1e6/0x220
[ 511.297880][ T2193] page_cache_sync_ra+0xcc/0xe0
[ 511.302707][ T2193] filemap_read+0x3ed/0x1430
[ 511.307275][ T2193] blkdev_read_iter+0x2cc/0x380
[ 511.312109][ T2193] vfs_read+0x66c/0x750
[ 511.316246][ T2193] ksys_read+0xd9/0x190
[ 511.320374][ T2193] __x64_sys_read+0x3e/0x50
[ 511.324860][ T2193] do_syscall_64+0x44/0xd0
[ 511.329249][ T2193] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 511.335126][ T2193]
[ 511.337427][ T2193] value changed: 0xffff888101b93bf0 -> 0x0000000000000000
[ 511.344501][ T2193]
[ 511.346797][ T2193] Reported by Kernel Concurrency Sanitizer on:
[ 511.352927][ T2193] CPU: 1 PID: 2193 Comm: udevd Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 511.363056][ T2193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 511.373084][ T2193] ==================================================================
18:39:15 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x32, 0x0, 0x0, 0x10000000002)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1e, 0x0, 0x0, 0x10000000002)
18:39:15 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffff9e000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 37)
[ 511.406187][T30142] loop5: detected capacity change from 0 to 264192
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000100a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x500, 0x0, 0x6, 0x10000000002)
18:39:15 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000005bb000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000110a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 511.547571][T30156] loop4: detected capacity change from 0 to 264192
[ 511.552674][T30149] FAULT_INJECTION: forcing a failure.
[ 511.552674][T30149] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 511.567374][T30149] CPU: 1 PID: 30149 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 511.578402][T30149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 511.588454][T30149] Call Trace:
[ 511.591722][T30149]
[ 511.594708][T30149] dump_stack_lvl+0xd6/0x122
[ 511.599312][T30149] dump_stack+0x11/0x1b
[ 511.603472][T30149] should_fail+0x23c/0x250
[ 511.607887][T30149] __alloc_pages+0x102/0x330
[ 511.612480][T30149] alloc_pages_vma+0x67e/0x810
[ 511.617245][T30149] ? PageHuge+0x59/0xc0
[ 511.621407][T30149] new_page+0x121/0x170
[ 511.625562][T30149] migrate_pages+0x465/0x1810
[ 511.630244][T30149] ? do_mbind+0x760/0x760
[ 511.634629][T30149] ? remove_migration_ptes+0x90/0x90
[ 511.639940][T30149] do_mbind+0x5b7/0x760
[ 511.644123][T30149] __se_sys_mbind+0x151/0x410
[ 511.648809][T30149] __x64_sys_mbind+0x74/0x80
[ 511.653426][T30149] do_syscall_64+0x44/0xd0
[ 511.657849][T30149] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 511.663856][T30149] RIP: 0033:0x7f7e86279059
[ 511.668269][T30149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 511.688052][T30149] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:15 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x33, 0x0, 0x0, 0x10000000002)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000120a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000140a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x21, 0x0, 0x0, 0x10000000002)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000160a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000180a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 38)
[ 511.696551][T30149] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 511.704523][T30149] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 511.712494][T30149] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 511.720526][T30149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 511.728495][T30149] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 511.736541][T30149]
18:39:15 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000ffffffef000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000190a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 511.799839][T30175] loop5: detected capacity change from 0 to 264192
[ 511.865688][T30171] FAULT_INJECTION: forcing a failure.
[ 511.865688][T30171] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 511.878946][T30171] CPU: 0 PID: 30171 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 511.889974][T30171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 511.900029][T30171] Call Trace:
[ 511.903312][T30171]
[ 511.906236][T30171] dump_stack_lvl+0xd6/0x122
[ 511.910835][T30171] dump_stack+0x11/0x1b
18:39:15 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x600, 0x0, 0x6, 0x10000000002)
18:39:15 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x22, 0x0, 0x0, 0x10000000002)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000250a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 511.915027][T30171] should_fail+0x23c/0x250
[ 511.919453][T30171] __alloc_pages+0x102/0x330
[ 511.924054][T30171] alloc_pages_vma+0x67e/0x810
[ 511.928831][T30171] ? PageHuge+0x59/0xc0
[ 511.933041][T30171] new_page+0x121/0x170
[ 511.937239][T30171] migrate_pages+0x465/0x1810
[ 511.941895][T30182] loop4: detected capacity change from 0 to 264192
[ 511.941996][T30171] ? do_mbind+0x760/0x760
[ 511.952781][T30171] ? remove_migration_ptes+0x90/0x90
[ 511.958128][T30171] do_mbind+0x5b7/0x760
[ 511.962289][T30171] __se_sys_mbind+0x151/0x410
[ 511.967046][T30171] __x64_sys_mbind+0x74/0x80
[ 511.971641][T30171] do_syscall_64+0x44/0xd0
[ 511.976125][T30171] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 511.982127][T30171] RIP: 0033:0x7f7e86279059
[ 511.986624][T30171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 512.006247][T30171] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:15 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x34, 0x0, 0x0, 0x10000000002)
18:39:15 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff0000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000400a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 512.014728][T30171] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 512.022696][T30171] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 512.030731][T30171] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 512.038725][T30171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 512.046773][T30171] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 512.054745][T30171]
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000006490a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 39)
18:39:15 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffff5000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x23, 0x0, 0x0, 0x10000000002)
18:39:15 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000005c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:15 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000fffffffe000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 512.140358][T30197] loop4: detected capacity change from 0 to 264192
[ 512.166887][T30199] loop5: detected capacity change from 0 to 264192
18:39:16 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x700, 0x0, 0x6, 0x10000000002)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000600a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x35, 0x0, 0x0, 0x10000000002)
18:39:16 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000007fffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x24, 0x0, 0x0, 0x10000000002)
[ 512.315631][T30216] loop4: detected capacity change from 0 to 264192
[ 512.339083][T30210] FAULT_INJECTION: forcing a failure.
[ 512.339083][T30210] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 512.352391][T30210] CPU: 0 PID: 30210 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 512.363445][T30210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 512.373493][T30210] Call Trace:
[ 512.376770][T30210]
[ 512.379704][T30210] dump_stack_lvl+0xd6/0x122
[ 512.384361][T30210] dump_stack+0x11/0x1b
[ 512.388590][T30210] should_fail+0x23c/0x250
[ 512.393087][T30210] __alloc_pages+0x102/0x330
[ 512.397676][T30210] alloc_pages_vma+0x67e/0x810
[ 512.402498][T30210] ? PageHuge+0x59/0xc0
[ 512.406714][T30210] new_page+0x121/0x170
[ 512.410873][T30210] migrate_pages+0x465/0x1810
[ 512.415598][T30210] ? do_mbind+0x760/0x760
[ 512.419941][T30210] ? remove_migration_ptes+0x90/0x90
[ 512.425277][T30210] do_mbind+0x5b7/0x760
[ 512.429468][T30210] __se_sys_mbind+0x151/0x410
[ 512.434147][T30210] __x64_sys_mbind+0x74/0x80
[ 512.438797][T30210] do_syscall_64+0x44/0xd0
[ 512.443210][T30210] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 512.449121][T30210] RIP: 0033:0x7f7e86279059
18:39:16 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x25, 0x0, 0x0, 0x10000000002)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000007c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 512.453554][T30210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 512.473318][T30210] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 512.481774][T30210] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 512.489818][T30210] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 512.497790][T30210] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 512.505799][T30210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 512.513844][T30210] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 512.521836][T30210]
18:39:16 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 40)
18:39:16 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x26, 0x0, 0x0, 0x10000000002)
18:39:16 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000100001000000009effffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000800a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x36, 0x0, 0x0, 0x10000000002)
[ 512.573620][T30232] loop5: detected capacity change from 0 to 264192
[ 512.673346][T30242] FAULT_INJECTION: forcing a failure.
[ 512.673346][T30242] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 512.686607][T30242] CPU: 1 PID: 30242 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 512.697640][T30242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 512.707697][T30242] Call Trace:
[ 512.710973][T30242]
[ 512.713902][T30242] dump_stack_lvl+0xd6/0x122
[ 512.718501][T30242] dump_stack+0x11/0x1b
[ 512.722662][T30242] should_fail+0x23c/0x250
[ 512.727189][T30242] __alloc_pages+0x102/0x330
[ 512.731774][T30242] alloc_pages_vma+0x67e/0x810
[ 512.736538][T30242] ? PageHuge+0x59/0xc0
[ 512.740703][T30242] new_page+0x121/0x170
[ 512.744916][T30242] migrate_pages+0x465/0x1810
[ 512.749600][T30242] ? do_mbind+0x760/0x760
[ 512.753926][T30242] ? remove_migration_ptes+0x90/0x90
[ 512.759269][T30242] do_mbind+0x5b7/0x760
[ 512.763441][T30242] __se_sys_mbind+0x151/0x410
[ 512.768167][T30242] __x64_sys_mbind+0x74/0x80
[ 512.772760][T30242] do_syscall_64+0x44/0xd0
[ 512.777175][T30242] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 512.783157][T30242] RIP: 0033:0x7f7e86279059
[ 512.787569][T30242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 512.807232][T30242] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 512.815728][T30242] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
18:39:16 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x900, 0x0, 0x6, 0x10000000002)
18:39:16 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000efffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffff9e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x27, 0x0, 0x0, 0x10000000002)
18:39:16 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x28, 0x0, 0x0, 0x10000000002)
18:39:16 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 41)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffef0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 512.823815][T30242] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 512.831812][T30242] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 512.839778][T30242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 512.847811][T30242] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 512.855812][T30242]
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff00a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f0ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x29, 0x0, 0x0, 0x10000000002)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff50a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 512.920671][T30260] loop4: detected capacity change from 0 to 264192
[ 512.963509][T30266] loop5: detected capacity change from 0 to 264192
[ 513.011507][T30259] FAULT_INJECTION: forcing a failure.
[ 513.011507][T30259] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 513.024844][T30259] CPU: 0 PID: 30259 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 513.035927][T30259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 513.046089][T30259] Call Trace:
[ 513.049381][T30259]
[ 513.052322][T30259] dump_stack_lvl+0xd6/0x122
[ 513.056985][T30259] dump_stack+0x11/0x1b
[ 513.061224][T30259] should_fail+0x23c/0x250
[ 513.065720][T30259] __alloc_pages+0x102/0x330
[ 513.070313][T30259] alloc_pages_vma+0x67e/0x810
[ 513.075080][T30259] ? PageHuge+0x59/0xc0
[ 513.079295][T30259] new_page+0x121/0x170
[ 513.083464][T30259] migrate_pages+0x465/0x1810
[ 513.088148][T30259] ? do_mbind+0x760/0x760
[ 513.092486][T30259] ? remove_migration_ptes+0x90/0x90
[ 513.097778][T30259] do_mbind+0x5b7/0x760
[ 513.101942][T30259] __se_sys_mbind+0x151/0x410
[ 513.106720][T30259] __x64_sys_mbind+0x74/0x80
[ 513.111341][T30259] do_syscall_64+0x44/0xd0
[ 513.115766][T30259] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 513.121657][T30259] RIP: 0033:0x7f7e86279059
[ 513.126075][T30259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 513.145686][T30259] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 513.154122][T30259] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:16 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x37, 0x0, 0x0, 0x10000000002)
[ 513.162095][T30259] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 513.170121][T30259] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 513.178097][T30259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 513.186095][T30259] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 513.194077][T30259]
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffffe0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xd00, 0x0, 0x6, 0x10000000002)
18:39:16 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000f5ffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2a, 0x0, 0x0, 0x10000000002)
18:39:16 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 42)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000007fffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:16 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000feffffff000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 513.311590][T30287] loop4: detected capacity change from 0 to 264192
[ 513.340108][T30292] loop5: detected capacity change from 0 to 264192
[ 513.351827][T30280] FAULT_INJECTION: forcing a failure.
[ 513.351827][T30280] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 513.365078][T30280] CPU: 1 PID: 30280 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 513.376321][T30280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 513.386374][T30280] Call Trace:
[ 513.389705][T30280]
[ 513.392628][T30280] dump_stack_lvl+0xd6/0x122
[ 513.397223][T30280] dump_stack+0x11/0x1b
[ 513.401423][T30280] should_fail+0x23c/0x250
[ 513.405914][T30280] __alloc_pages+0x102/0x330
18:39:17 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0xf00, 0x0, 0x6, 0x10000000002)
[ 513.410521][T30280] alloc_pages_vma+0x67e/0x810
[ 513.415282][T30280] ? PageHuge+0x59/0xc0
[ 513.419444][T30280] new_page+0x121/0x170
[ 513.423657][T30280] migrate_pages+0x465/0x1810
[ 513.428343][T30280] ? do_mbind+0x760/0x760
[ 513.432796][T30280] ? remove_migration_ptes+0x90/0x90
[ 513.438081][T30280] do_mbind+0x5b7/0x760
[ 513.442310][T30280] __se_sys_mbind+0x151/0x410
[ 513.446991][T30280] __x64_sys_mbind+0x74/0x80
[ 513.451585][T30280] do_syscall_64+0x44/0xd0
[ 513.456004][T30280] entry_SYSCALL_64_after_hwframe+0x44/0xae
18:39:17 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2b, 0x0, 0x0, 0x10000000002)
[ 513.461911][T30280] RIP: 0033:0x7f7e86279059
[ 513.466337][T30280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 513.485948][T30280] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 513.494366][T30280] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 513.502337][T30280] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
18:39:17 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x38, 0x0, 0x0, 0x10000000002)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000001000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 513.510313][T30280] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 513.518323][T30280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 513.526304][T30280] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 513.534281][T30280]
18:39:17 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000010a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 43)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000020a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2c, 0x0, 0x0, 0x10000000002)
18:39:17 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 513.621990][T30310] loop4: detected capacity change from 0 to 264192
[ 513.653639][T30306] loop5: detected capacity change from 0 to 264192
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000040a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 513.712549][T30313] FAULT_INJECTION: forcing a failure.
[ 513.712549][T30313] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 513.725914][T30313] CPU: 1 PID: 30313 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 513.736943][T30313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 513.746994][T30313] Call Trace:
[ 513.750270][T30313]
[ 513.753199][T30313] dump_stack_lvl+0xd6/0x122
[ 513.757797][T30313] dump_stack+0x11/0x1b
[ 513.761995][T30313] should_fail+0x23c/0x250
[ 513.766409][T30313] __alloc_pages+0x102/0x330
[ 513.770998][T30313] alloc_pages_vma+0x67e/0x810
[ 513.775821][T30313] ? PageHuge+0x59/0xc0
[ 513.780010][T30313] new_page+0x121/0x170
[ 513.784164][T30313] migrate_pages+0x465/0x1810
[ 513.788882][T30313] ? do_mbind+0x760/0x760
[ 513.793304][T30313] ? remove_migration_ptes+0x90/0x90
[ 513.798660][T30313] do_mbind+0x5b7/0x760
[ 513.802863][T30313] __se_sys_mbind+0x151/0x410
[ 513.807573][T30313] __x64_sys_mbind+0x74/0x80
[ 513.812160][T30313] do_syscall_64+0x44/0xd0
[ 513.816576][T30313] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 513.822492][T30313] RIP: 0033:0x7f7e86279059
[ 513.826920][T30313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 513.846612][T30313] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 513.855036][T30313] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:17 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1100, 0x0, 0x6, 0x10000000002)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2d, 0x0, 0x0, 0x10000000002)
18:39:17 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x39, 0x0, 0x0, 0x10000000002)
18:39:17 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 513.863005][T30313] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 513.871030][T30313] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 513.879058][T30313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 513.887080][T30313] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 513.895105][T30313]
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 44)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000080a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000070000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 514.039693][T30346] loop4: detected capacity change from 0 to 264192
[ 514.050971][T30342] loop5: detected capacity change from 0 to 264192
[ 514.103613][T30335] FAULT_INJECTION: forcing a failure.
[ 514.103613][T30335] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 514.116879][T30335] CPU: 1 PID: 30335 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 514.127901][T30335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 514.137958][T30335] Call Trace:
[ 514.141301][T30335]
[ 514.144230][T30335] dump_stack_lvl+0xd6/0x122
[ 514.148829][T30335] dump_stack+0x11/0x1b
18:39:17 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1200, 0x0, 0x6, 0x10000000002)
18:39:17 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:17 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2e, 0x0, 0x0, 0x10000000002)
18:39:17 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3a, 0x0, 0x0, 0x10000000002)
[ 514.152991][T30335] should_fail+0x23c/0x250
[ 514.157407][T30335] __alloc_pages+0x102/0x330
[ 514.162069][T30335] alloc_pages_vma+0x67e/0x810
[ 514.166837][T30335] ? PageHuge+0x59/0xc0
[ 514.170998][T30335] new_page+0x121/0x170
[ 514.175164][T30335] migrate_pages+0x465/0x1810
[ 514.179879][T30335] ? do_mbind+0x760/0x760
[ 514.184225][T30335] ? remove_migration_ptes+0x90/0x90
[ 514.189591][T30335] do_mbind+0x5b7/0x760
[ 514.193756][T30335] __se_sys_mbind+0x151/0x410
[ 514.198574][T30335] __x64_sys_mbind+0x74/0x80
[ 514.203192][T30335] do_syscall_64+0x44/0xd0
[ 514.207613][T30335] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 514.213540][T30335] RIP: 0033:0x7f7e86279059
[ 514.217947][T30335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 514.237700][T30335] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 514.246121][T30335] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000080000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 45)
[ 514.254103][T30335] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 514.262124][T30335] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 514.270096][T30335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 514.278062][T30335] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 514.286039][T30335]
18:39:18 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x2f, 0x0, 0x0, 0x10000000002)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000090000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000d0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 514.359102][T30366] loop5: detected capacity change from 0 to 264192
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000a0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 514.449075][T30375] FAULT_INJECTION: forcing a failure.
[ 514.449075][T30375] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 514.462385][T30375] CPU: 0 PID: 30375 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 514.473416][T30375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 514.483574][T30375] Call Trace:
[ 514.486848][T30375]
[ 514.489716][T30378] loop4: detected capacity change from 0 to 264192
18:39:18 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1300, 0x0, 0x6, 0x10000000002)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 514.489766][T30375] dump_stack_lvl+0xd6/0x122
[ 514.500834][T30375] dump_stack+0x11/0x1b
[ 514.504998][T30375] should_fail+0x23c/0x250
[ 514.509422][T30375] __alloc_pages+0x102/0x330
[ 514.514067][T30375] alloc_pages_vma+0x67e/0x810
[ 514.518833][T30375] ? PageHuge+0x59/0xc0
[ 514.523003][T30375] new_page+0x121/0x170
[ 514.527196][T30375] migrate_pages+0x465/0x1810
[ 514.531879][T30375] ? do_mbind+0x760/0x760
[ 514.536257][T30375] ? remove_migration_ptes+0x90/0x90
[ 514.541550][T30375] do_mbind+0x5b7/0x760
[ 514.545766][T30375] __se_sys_mbind+0x151/0x410
[ 514.550445][T30375] __x64_sys_mbind+0x74/0x80
[ 514.555039][T30375] do_syscall_64+0x44/0xd0
[ 514.559487][T30375] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 514.565389][T30375] RIP: 0033:0x7f7e86279059
[ 514.569809][T30375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 514.589573][T30375] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 514.598422][T30375] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 514.606407][T30375] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 514.614376][T30375] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 514.622338][T30375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 514.630558][T30375] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 514.638616][T30375]
18:39:18 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3b, 0x0, 0x0, 0x10000000002)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000100a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000b0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 46)
18:39:18 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x30, 0x0, 0x0, 0x10000000002)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000110a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000120a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000d0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 514.762102][T30399] loop5: detected capacity change from 0 to 264192
[ 514.766464][T30400] loop4: detected capacity change from 0 to 264192
[ 514.813632][T30394] FAULT_INJECTION: forcing a failure.
[ 514.813632][T30394] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 514.826884][T30394] CPU: 0 PID: 30394 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 514.837909][T30394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 514.847960][T30394] Call Trace:
[ 514.851272][T30394]
[ 514.854214][T30394] dump_stack_lvl+0xd6/0x122
[ 514.858837][T30394] dump_stack+0x11/0x1b
18:39:18 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1400, 0x0, 0x6, 0x10000000002)
[ 514.863037][T30394] should_fail+0x23c/0x250
[ 514.867506][T30394] __alloc_pages+0x102/0x330
[ 514.872170][T30394] alloc_pages_vma+0x67e/0x810
[ 514.876939][T30394] ? PageHuge+0x59/0xc0
[ 514.881100][T30394] new_page+0x121/0x170
[ 514.885445][T30394] migrate_pages+0x465/0x1810
[ 514.890194][T30394] ? do_mbind+0x760/0x760
[ 514.894525][T30394] ? remove_migration_ptes+0x90/0x90
[ 514.899995][T30394] do_mbind+0x5b7/0x760
[ 514.904238][T30394] __se_sys_mbind+0x151/0x410
[ 514.908919][T30394] __x64_sys_mbind+0x74/0x80
18:39:18 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x31, 0x0, 0x0, 0x10000000002)
[ 514.913553][T30394] do_syscall_64+0x44/0xd0
[ 514.918070][T30394] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 514.924001][T30394] RIP: 0033:0x7f7e86279059
[ 514.928421][T30394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 514.948061][T30394] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 514.956480][T30394] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000140a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 514.964506][T30394] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 514.972524][T30394] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 514.980502][T30394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 514.988505][T30394] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 514.996521][T30394]
18:39:18 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3c, 0x0, 0x0, 0x10000000002)
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000e0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000160a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 47)
18:39:18 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x32, 0x0, 0x0, 0x10000000002)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000180a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000f0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:18 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000190a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 515.116220][T30428] loop5: detected capacity change from 0 to 264192
[ 515.150381][T30434] loop4: detected capacity change from 0 to 264192
[ 515.199684][T30425] FAULT_INJECTION: forcing a failure.
[ 515.199684][T30425] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 515.212962][T30425] CPU: 1 PID: 30425 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 515.224088][T30425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 515.234150][T30425] Call Trace:
[ 515.237421][T30425]
[ 515.240388][T30425] dump_stack_lvl+0xd6/0x122
[ 515.245043][T30425] dump_stack+0x11/0x1b
[ 515.249794][T30425] should_fail+0x23c/0x250
[ 515.254199][T30425] __alloc_pages+0x102/0x330
[ 515.258777][T30425] alloc_pages_vma+0x67e/0x810
[ 515.263572][T30425] ? PageHuge+0x59/0xc0
[ 515.267723][T30425] new_page+0x121/0x170
[ 515.271924][T30425] migrate_pages+0x465/0x1810
[ 515.276673][T30425] ? do_mbind+0x760/0x760
[ 515.281044][T30425] ? remove_migration_ptes+0x90/0x90
[ 515.286331][T30425] do_mbind+0x5b7/0x760
[ 515.290507][T30425] __se_sys_mbind+0x151/0x410
[ 515.295186][T30425] __x64_sys_mbind+0x74/0x80
[ 515.299766][T30425] do_syscall_64+0x44/0xd0
[ 515.304173][T30425] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 515.310146][T30425] RIP: 0033:0x7f7e86279059
[ 515.314588][T30425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 515.334239][T30425] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:18 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000100000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1500, 0x0, 0x6, 0x10000000002)
18:39:19 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x33, 0x0, 0x0, 0x10000000002)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000250a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 515.342640][T30425] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 515.350639][T30425] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 515.358595][T30425] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 515.366550][T30425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 515.374504][T30425] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 515.382474][T30425]
18:39:19 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3d, 0x0, 0x0, 0x10000000002)
18:39:19 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 48)
18:39:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000110000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000400a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000005c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x34, 0x0, 0x0, 0x10000000002)
18:39:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000120000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000600a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 515.513087][T30457] loop5: detected capacity change from 0 to 264192
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000000000007c0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 515.566331][T30463] loop4: detected capacity change from 0 to 264192
[ 515.578096][T30449] FAULT_INJECTION: forcing a failure.
[ 515.578096][T30449] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 515.591469][T30449] CPU: 0 PID: 30449 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 515.602559][T30449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 515.612699][T30449] Call Trace:
[ 515.616054][T30449]
[ 515.618984][T30449] dump_stack_lvl+0xd6/0x122
[ 515.623585][T30449] dump_stack+0x11/0x1b
[ 515.627865][T30449] should_fail+0x23c/0x250
[ 515.632318][T30449] __alloc_pages+0x102/0x330
[ 515.636934][T30449] alloc_pages_vma+0x67e/0x810
[ 515.641725][T30449] ? PageHuge+0x59/0xc0
[ 515.645895][T30449] new_page+0x121/0x170
[ 515.650103][T30449] migrate_pages+0x465/0x1810
[ 515.654795][T30449] ? do_mbind+0x760/0x760
[ 515.659175][T30449] ? remove_migration_ptes+0x90/0x90
[ 515.664512][T30449] do_mbind+0x5b7/0x760
[ 515.668680][T30449] __se_sys_mbind+0x151/0x410
[ 515.673356][T30449] __x64_sys_mbind+0x74/0x80
[ 515.677949][T30449] do_syscall_64+0x44/0xd0
[ 515.682362][T30449] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 515.688264][T30449] RIP: 0033:0x7f7e86279059
[ 515.692678][T30449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 515.712292][T30449] RSP: 002b:00007f7e853ef168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 515.720715][T30449] RAX: ffffffffffffffda RBX: 00007f7e8638bf60 RCX: 00007f7e86279059
[ 515.728691][T30449] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 515.736663][T30449] RBP: 00007f7e853ef1d0 R08: 0000000000000000 R09: 0000010000000002
[ 515.744690][T30449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 515.752665][T30449] R13: 00007ffc19a6cfdf R14: 00007f7e853ef300 R15: 0000000000022000
[ 515.760760][T30449]
18:39:19 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1600, 0x0, 0x6, 0x10000000002)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000800a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x35, 0x0, 0x0, 0x10000000002)
18:39:19 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3e, 0x0, 0x0, 0x10000000002)
18:39:19 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 49)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffff9e0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000140000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000005bb0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 515.849827][T30481] loop4: detected capacity change from 0 to 264192
[ 515.881500][T30484] FAULT_INJECTION: forcing a failure.
[ 515.881500][T30484] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 515.894784][T30484] CPU: 0 PID: 30484 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 515.905808][T30484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 515.916021][T30484] Call Trace:
[ 515.919309][T30484]
[ 515.922254][T30484] dump_stack_lvl+0xd6/0x122
[ 515.926908][T30484] dump_stack+0x11/0x1b
[ 515.931066][T30484] should_fail+0x23c/0x250
[ 515.935484][T30484] __alloc_pages+0x102/0x330
[ 515.940076][T30484] alloc_pages_vma+0x67e/0x810
[ 515.944848][T30484] new_page+0x121/0x170
18:39:19 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x41, 0x0, 0x0, 0x10000000002)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffef0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x36, 0x0, 0x0, 0x10000000002)
[ 515.949080][T30484] migrate_pages+0x465/0x1810
[ 515.953823][T30484] ? do_mbind+0x760/0x760
[ 515.958171][T30484] ? remove_migration_ptes+0x90/0x90
[ 515.963554][T30484] do_mbind+0x5b7/0x760
[ 515.967844][T30484] __se_sys_mbind+0x151/0x410
[ 515.972605][T30484] __x64_sys_mbind+0x74/0x80
[ 515.977227][T30484] do_syscall_64+0x44/0xd0
[ 515.981699][T30484] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 515.987617][T30484] RIP: 0033:0x7f7e86279059
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff00a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 515.992038][T30484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 516.012534][T30484] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
[ 516.021128][T30484] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 516.029214][T30484] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 516.037220][T30484] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 516.045564][T30484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 516.053543][T30484] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 516.061577][T30484]
[ 516.090233][T30497] loop5: detected capacity change from 0 to 264192
18:39:19 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1700, 0x0, 0x6, 0x10000000002)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff50a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000160000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 50)
18:39:19 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x37, 0x0, 0x0, 0x10000000002)
[ 516.141633][T30499] loop4: detected capacity change from 0 to 264192
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000fffffffe0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000180000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000000007fffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:19 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x42, 0x0, 0x0, 0x10000000002)
[ 516.269110][T30514] FAULT_INJECTION: forcing a failure.
[ 516.269110][T30514] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 516.282501][T30514] CPU: 1 PID: 30514 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 516.293549][T30514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 516.303647][T30514] Call Trace:
[ 516.306954][T30514]
[ 516.309891][T30514] dump_stack_lvl+0xd6/0x122
[ 516.314608][T30514] dump_stack+0x11/0x1b
[ 516.318769][T30514] should_fail+0x23c/0x250
[ 516.323186][T30514] __alloc_pages+0x102/0x330
[ 516.327812][T30514] alloc_pages_vma+0x67e/0x810
[ 516.332581][T30514] ? PageHuge+0x59/0xc0
[ 516.336851][T30514] new_page+0x121/0x170
[ 516.341011][T30514] migrate_pages+0x465/0x1810
[ 516.345769][T30514] ? do_mbind+0x760/0x760
[ 516.348155][T30519] loop5: detected capacity change from 0 to 264192
[ 516.350126][T30514] ? remove_migration_ptes+0x90/0x90
[ 516.361908][T30514] do_mbind+0x5b7/0x760
[ 516.366104][T30514] __se_sys_mbind+0x151/0x410
[ 516.370847][T30514] __x64_sys_mbind+0x74/0x80
[ 516.375446][T30514] do_syscall_64+0x44/0xd0
[ 516.379867][T30514] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 516.385766][T30514] RIP: 0033:0x7f7e86279059
[ 516.390258][T30514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 516.409944][T30514] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000ffffffff0a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:20 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x38, 0x0, 0x0, 0x10000000002)
18:39:20 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1800, 0x0, 0x6, 0x10000000002)
[ 516.418388][T30514] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 516.426360][T30514] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 516.434345][T30514] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 516.442316][T30514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 516.450280][T30514] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 516.458308][T30514]
18:39:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000190000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000020000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 516.493034][T30525] loop4: detected capacity change from 0 to 264192
18:39:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000250000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 516.621751][T30535] loop5: detected capacity change from 0 to 264192
18:39:20 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 51)
18:39:20 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x39, 0x0, 0x0, 0x10000000002)
18:39:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000030000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x43, 0x0, 0x0, 0x10000000002)
18:39:20 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1900, 0x0, 0x6, 0x10000000002)
18:39:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000005c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 516.776470][T30544] loop4: detected capacity change from 0 to 264192
18:39:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000600000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:20 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000050000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:20 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3a, 0x0, 0x0, 0x10000000002)
[ 516.847887][T30550] loop5: detected capacity change from 0 to 264192
[ 516.905130][T30548] FAULT_INJECTION: forcing a failure.
[ 516.905130][T30548] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 516.918428][T30548] CPU: 0 PID: 30548 Comm: syz-executor.1 Not tainted 5.17.0-rc5-syzkaller-00004-g038101e6b2cd-dirty #0
[ 516.929533][T30548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 516.939587][T30548] Call Trace:
[ 516.942866][T30548]
[ 516.945800][T30548] dump_stack_lvl+0xd6/0x122
[ 516.950403][T30548] dump_stack+0x11/0x1b
[ 516.954568][T30548] should_fail+0x23c/0x250
[ 516.959030][T30548] __alloc_pages+0x102/0x330
[ 516.963620][T30548] alloc_pages_vma+0x67e/0x810
[ 516.968386][T30548] ? PageHuge+0x59/0xc0
[ 516.972602][T30548] new_page+0x121/0x170
[ 516.976761][T30548] migrate_pages+0x465/0x1810
[ 516.981507][T30548] ? do_mbind+0x760/0x760
[ 516.985862][T30548] ? remove_migration_ptes+0x90/0x90
[ 516.991155][T30548] do_mbind+0x5b7/0x760
[ 516.995461][T30548] __se_sys_mbind+0x151/0x410
[ 517.000157][T30548] __x64_sys_mbind+0x74/0x80
18:39:20 executing program 0:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x3b, 0x0, 0x0, 0x10000000002)
[ 517.004853][T30548] do_syscall_64+0x44/0xd0
[ 517.009717][T30548] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 517.015649][T30548] RIP: 0033:0x7f7e86279059
[ 517.020318][T30548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 517.040206][T30548] RSP: 002b:00007f7e853ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed
18:39:20 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000007c0000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
[ 517.048730][T30548] RAX: ffffffffffffffda RBX: 00007f7e8638c030 RCX: 00007f7e86279059
[ 517.056757][T30548] RDX: 0000000000000004 RSI: 0000000000c00007 RDI: 0000000020012000
[ 517.064733][T30548] RBP: 00007f7e853ce1d0 R08: 0000000000000000 R09: 0000010000000002
[ 517.072708][T30548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 517.080685][T30548] R13: 00007ffc19a6cfdf R14: 00007f7e853ce300 R15: 0000000000022000
[ 517.088665][T30548]
18:39:21 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x10000000002) (fail_nth: 52)
18:39:21 executing program 5:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), 0x4)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1a00, 0x0, 0x6, 0x10000000002)
18:39:21 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f0000000080)=0x35, 0x20)
sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000060000000000000a20000000000a03000000000000000000000000080900010073797a300000000048000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020c001180070001007274"], 0x90}}, 0x0)
18:39:21 executing program 4:
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x44, 0x0, 0x0, 0x10000000002)
18:39:21 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
set_mempolicy(0x3, &(0x7f00