fff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09024beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @multicast1}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 17:51:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000415, 0x10000000080005, 0xffe) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) getpeername$ax25(r1, &(0x7f0000000040)={{0x3, @bcast}, [@remote, @rose, @rose, @remote, @rose, @rose, @bcast, @default]}, &(0x7f00000000c0)=0x48) 17:51:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="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") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x200, 0x8001) sendmsg$rds(r1, &(0x7f0000003a80)={0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/125, 0x7d}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000000100)=""/64, 0x40}, {&(0x7f0000003200)=""/225, 0xe1}, {&(0x7f0000003300)=""/211, 0xd3}], 0x7, &(0x7f0000003900)=[@rdma_args={0x48, 0x114, 0x1, {{0x67d, 0x7}, {&(0x7f0000003480)=""/4, 0x4}, &(0x7f0000003580)=[{&(0x7f00000034c0)=""/158, 0x9e}], 0x1, 0x25, 0x8001}}, @cswp={0x58, 0x114, 0x7, {{0x2, 0x9}, &(0x7f00000035c0), &(0x7f0000003600)=0x9, 0x100, 0x3, 0x15, 0x8000, 0x40, 0x10000}}, @rdma_args={0x48, 0x114, 0x1, {{0xffff, 0x2}, {&(0x7f0000003640)=""/161, 0xa1}, &(0x7f0000003780)=[{&(0x7f0000003700)=""/65, 0x41}], 0x1, 0xc, 0x2}}, @fadd={0x58, 0x114, 0x6, {{0x9835, 0x4a}, &(0x7f00000037c0)=0x10001, &(0x7f0000003800)=0xf422d5a, 0x5, 0x2bda23df, 0xffff, 0x20, 0x10, 0x2}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000003840)=""/100, 0x64}, &(0x7f00000038c0), 0x12}}], 0x170, 0x4000}, 0x4000) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000080)={0x0, 0x0, {0x7fff, 0x1, 0x301f, 0x7, 0xc, 0x7, 0x0, 0x2}}) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2722, 0x0, &(0x7f0000000040)=0xffffffffffffffe6) socket$inet_udplite(0x2, 0x2, 0x88) 17:51:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09044beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2055.197942] net_ratelimit: 22 callbacks suppressed [ 2055.197949] protocol 88fb is buggy, dev hsr_slave_0 [ 2055.208029] protocol 88fb is buggy, dev hsr_slave_1 17:51:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000100)) ioctl(r0, 0x801, &(0x7f00000000c0)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000140)={{0x3, 0x5, 0x6, 0x7, '\x00', 0x9}, 0x0, [0x2, 0x0, 0x6, 0xb4c7, 0x4, 0xfffffffffffffff7, 0x9, 0x800, 0xffffffffffffffc1, 0x3, 0x1, 0xffffffffffffff94, 0x200, 0x1f, 0x2, 0xfd, 0x5, 0xffffffff7fffffff, 0x8, 0x9, 0x3e34ef5e, 0x8, 0x400, 0x100, 0x1, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x9, 0xc000000000000000, 0x1, 0x6, 0x7fff, 0x9, 0x3, 0x6, 0x2, 0x7ff, 0x400, 0x9000000000000, 0x2, 0x81, 0x5, 0x2, 0x27, 0x4b4, 0xb5, 0x20, 0x2, 0x50, 0x25f1, 0x6, 0xb73, 0x9, 0x7, 0x1, 0x2, 0x6, 0xf6, 0xfffffffffffffff9, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x5, 0x7, 0x2, 0xff76, 0xe9, 0x8, 0x1, 0xffffffff, 0xdd, 0x4, 0x80000001, 0x4, 0x5, 0x1, 0xf339, 0x1f, 0x0, 0x8, 0x7, 0x325, 0x2, 0x1, 0x5, 0x0, 0x12, 0x9, 0x20, 0x83, 0x80000000000, 0x50ea, 0x1000, 0x20, 0x81, 0x6, 0x7, 0xffff, 0x0, 0xfff, 0x0, 0x9, 0x7a, 0x6, 0x7ff, 0xa204, 0x8, 0x3, 0x1000, 0x7, 0x81, 0x952, 0x20, 0x1, 0x3, 0x1, 0x7f, 0x1426bc8f, 0x8e, 0x7, 0x8cb, 0x3ff, 0x6, 0x6], {0x77359400}}) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0af51f023c123f2a88a070") syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x200, 0x200020040) r1 = socket(0x848000000015, 0x805, 0x0) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x4e23, @broadcast}}) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)=0x7a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@rand_addr="80891c12565823a06e5c39d99d114986", 0x16b0, 0x1, 0x2, 0xe, 0x8, 0x4}, 0x20) socket(0xb, 0x807, 0x0) fcntl$getown(r2, 0x9) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x5b, 0x80000) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000240)={0x3, r4}) 17:51:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09084beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2055.437914] protocol 88fb is buggy, dev hsr_slave_0 [ 2055.443168] protocol 88fb is buggy, dev hsr_slave_1 17:51:04 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271b, 0x0, &(0x7f0000000000)) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) 17:51:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000180)="bbb6296fb0802e5c4217f84ac895c1dac6d5bc928680e31f3786aee7bfff42014b5741dc924e6935b08f2bf4846d279fa6156b9dbaee687f5592e5abe5ae830e5800f5c51d8cc81ad55b651b7e3bfb54fd98438969d86926df574580a459217dc2312b260c3597b07235224984b74b45085856798135cc3fabe8e494eaeab3ccc11b3e21e987d1951046e446267d143dd2c83608f9a5ab77bf4730bb9ff710c3add8d1e5d32589e945406d0153f686ba4e2797c4cad01d35732d6586ff8935d641811074b6fe5f0995d7fd22d94145359c99824c6bd5fa7b06ee0cd1fce36fc29445673791b0bc0242e7bf69dacb055da4e0fabdd342e72c38cd0f3497f7ff4472c21424c775fe585beb68559b6a55add3a7133bb2e6cdbd0de64f5686011eca87bea77fdd52cb9aee9b77975e8aac7b5c5f649bbf4f48461732d13e53e59bff23f6e598451ab148a36facb0c4b2a7ecadedde4bb72d4ca17c40ad17b7be936c76c5d56c47d67f48f60c323af21939a599dbbf012efaab183a8f4878a1a758baa24231f48acbbb6093af1660beb4b1edc7994bc4286a76523fa96601df4f961f464d62162a4f132e2b05ee207b336773a07267cc9a68cdf9e10d63e58ecc1d87f9f36af9e06a549e8e1a98023efb66ddb927fe93acec35544ffdd353cd63b8d36244e9b93e7cd7e5dd3b10ae3a3dea6c127a03c358cc5724db42ee66e6fc3af0678a3081686293561819a4cbac982929d334201218c0e7213c26a47758776f2abd2d8f6fcd4e8f1a273d5a5985fa68dff69ccf1c4760fadd460226b0b0b2c80c01b0b7237f4988bf6c8231c2dc9e44e8d71283f9f53d95f45ee7a166b8a3e463a3d65d8ecbe6898fb9748a75ad78985a4132585bec2bf5b6cea4f4f23a351b84fddbb8524f97305ca76584cce6c947fed00edfece2f34b10f2795afb0f42c209edbc5e6951f1844caea5c4e53cdba493b88ad6ccee9376f2867086937a9db12aa4cb9874023118402f0456e79cda1225e0506cec2eacaaff8772ae82ecf1c828f9f849e81b7e82459b3343fad0e1a18a9c994de25ee9f4962c0ef6b0a64b019845e45fd6e8e2b59c654943425d6cb78918fe4ffb52869707837d9fa355e16f6aabe3a9d61078ca7df939487eb99dac0cc44079fb44c7c99609330f573df5bdfd255ed460cc04633cc4066b007cb50f6cedfc6d8b656776c18d7bb6c8badbe2b7abec374a6ff496f1dfc63d3dd10d50b80bb611107599a3977509cb1077cc422018e9b235aeb7c5e352463c527de6b177e4617678a198de478e79a3d7b282c96af4b6a62506943cee809f291fadb72f6ff7cb0816969d93008c5bbd7ba3d0471a598df61ea26ddc6cffb9ab79adb3434b0564cdc76fae4952cf787cf88ff494b5671244f7b8e90d3eaf9dd36d369dde8fc145bc725292d1c2ee013423496601e8d7feaf773271181f9c1b2e72e40dbfa20aacb0f93eb6dc97aac82ed10f7af4b07c82f72f65a62426211c80de9fbcbf2892a97755c346cd197acc8d15e171710f50adf9b7781cada7d119e24a942762cf7728212d2c23283e7eb36d51fdb7a677f71d7dd6edf9be8edb31476261e405b5ecccfe500b5615d217843e95b441370ee59b26df5e04b4cbd4d062510be0ab39bce805f996a8950ce679f7ed0546f3b2279b84f6c12a584bcac03c8075f76aa07d77af9b639c889ad62206e1c2921bd246555ad3fc202d4c7517d16af43c2a894db1e9e3499724aa11f3abe5aec9384026beb61d5f9f0af1b7544463c1d7f365c447ff27ea03fa00b70a99e3aff9a7cc4c20ae0d63d6de7f67b3e671feedf9b972aeca9d0ba8649f8f22afa9109637636da321b22a57f60c9b01b0caac229fd501e96f26dc10a5ac99d09e6ccf67e4b821db9193d3468c684dbec75df783fc0ea89d9057a16cb2d9b5c8ca899596c0a7b4d6ff0a0fe2c08d87c2f5cabeb540be754618d05c8501420c7ad59d44d04eb09995a20fc8d5d40f0c5f02f733614dfc4e5e976aa6279abdffe3279f46c8ddd0979048d1fdf9e55a13527a73a315b2e0af9527ea5e38ebe5c78089f65c58ae168cb4c21e90f98d6760145fd7ef134a26895865d06d9fb7a25541284836375c4372ffe7979b0f7b77f14e4629cc5f401ca29c3657b53de7996a5b2bf6e58b42e71b6a6c06bb26f27b9fe129469bde699e98543645abf6d76bdb242e8a424608534769cc6c0be71563583b9b5d5c53e13dc73b6a906074a9c68418f940bf41d807e746e02710e94e554a6c3dd50aaef7a6fddd4de325a5087a6a81e110c4f86bd40c5714c2c9b98b4ff5e43bae975538cb5464d03ec0ec7a6b56b6940544b366bd416d767e7681ab225f8c59745a04f9e05a11ea665696ef4edc9975e469a5709da947150f8753cf6cd7e12dbcc7a89855f9b9bd75f52538640d80a4772b498ca9fe2d6b14e41dc6c6160ee3eada610d9ae28b04cd75a6cba5ec9ea91419272130c2af38c3d4216b8c73b8923428e271192b78f87d3f301c61f0e83b4c6fbf1268b82793f8810d88b259a6dba1ed502bc05fca06cfa244c0c89da6c3ebd9b6b0b0f3f3283365d8434c83ac8f23c66dcf5505304c16043092275604204a26949307fc7e58ca306b65611ac97cbb18b2a69c4fe66eca2b0be9055fe350eccfb17a43c7acebb0ba0424702e51f3e0fdbeb2de83d7f5206b2e591b71a48d4b44cfb8a66e7517fa95b7f8156c06804027e48867a7b194528e1c2d44f3fdf828db3fbc1bbceba4beace2fe3c0da3f66c6866b3193a399fb67b3a2d8535a16bc35288504c2cf8c4cd57b6b3c026034a622c6b0802f017fdc899e55fd341ebac28bb2912a72f859acda249b5d704ef96dd766623708e591adeeb6fdf6a6f9a57d9fc05b309aa744af677258b2fb46a5cde6122a0c1fddf11f1306df24f32e39d37f99c67b77421e996c930ab20dcfd7eb3ff24dd3a0958c395d31d7b988eabf4c65a23b14254ecc7e72580a784759d2eeda967b036a432d60d071804d0bc46c061465a99c106bbec2af11d8689e7882aebcb384f1397fef197a7916fff945ddb36260511f9474f4401088191b2560d02ea9e250d80e2d905786e3f7d7c2e66473f81ffeb70ad87d9a43bdd7178b130d303d7d3e5baf909cfc963b55d68beefb3bb65d33ac0714ffc69700789226a705002188b53a4b1fc3685b9d2210976ba098e1692294a70669573494508be5f9a60062cb50a6cb81aecf0639298917179d3ff82e604cdb8a469a132badcb64c9d561f82955bacc267e93f1baf8999b058e18728eecb9eee69f3f60ff733095e16cd789907364a4279ee5e3c94d598bf861197da21549fe9411b97b63ea9ee5120e01ca8cc3cddba4d69071841e2976cb1e99dacbcd0695d382b571b90ca5e7797e7aeb2721af98c0c8b8f6eb1e6232faa7403a27ce94306bf315770ebdef3ab2380a2a3f65b162a936548329ba8e8b67757287e322d09ff3aa335e3d4a09846aa225ff2289b3a571b5204af25e2d15b021da2b45216ad67e4ba8acd88258bb9b1cfb17918b1bd9766706897ca22fbc7f7bb95d1d132c219c8f6cc3cb2e78e10f7fb30729efad0fb05b9248f778afbbc58c33c45e9d0c6585cd998d262cea53468e63c6535ff3e06585be4db60401158b761a9a7d2e287a5863541f6cf6faf9cfabb0ef331f1bcb5ec318ddb6fcb75f50b3e89a1abae66cfdd4691a7f16cda87556487fdfe91e3f90420070796a81989a9fadc225cd5e6510443e12ca3719601c9904bbf4c7ecd486f2a5cc40de0fc4114cfe14a192a8f1b75a354c01ad2c320ad5e73287fb6f29cc9550475eb836c9f9fe9dbc55438af02f27a8bc8d91f1e85e56401902f68d23cd548ab4de8a45cde060c68ba8ceaa2f64445432236aeca5985ede8db0465aeab597c621b3d87b9e895e7f6b78a12f80ddc6878e9297c7908cae15abbde52149b1e41650bba2e16f457377d305e0fa758d4a9f50100ef3b2c905b9a0f2ba4cad028253c4e2fcb8c95e8234b0fa0f6708e03c2ccec6583aa81a8ba7935fb769383dc0cef1317d8e66aa689d1a11c7b62234b5f7ad2e32e2a1055126a3fab186680bbceaa234083dd545b55e66e02cb498762a652c2e34cf5b7e0c87c727d08974e3b445f90b63c21eee350b83a8beb6d373c653954f8173f120f8d68e881636c0809d4dfe996b2924a324438947c1fa033b8610b431fdad58d7fbc92a70231f2fc6cf993ccaa718ccf6f8211bd6098c60a672c633b17461cf4c6b4bedbd48577ae82d4b4f5095add75ce898f64c5476c6dddb1ec4dfa3033dd68388bec12a13c8c73259a14911233f15ff3608ce8e8514e3f54253aab5275c116b729a5cc9966c3aad8591ae4d14a3e493310ec26d90bae8bb2f2c473ba853d649a9c63c15d8dd7fe6b5a960f604ba23c3d8c4b67be8f5c7aa848a1fba6e8dd66d6fc709bed7667dc70eef25cdfea83d3925753107270c25954a00cf1e6b8453a97ba1c6e40d2a2e24782b202f4a4ad1889704e5404ae1e847c3a2e0066d91ba9f243ea2c47a05968c941a81f6e0c4a51982e1396e7334a4f9b7bd156713ae7aeba4237265f18a453bf68a2ec39647e875cdeee7ce983f73f4e26363d4172555fba425e3c2ee13534c4f1711c148730c3a7ffd80564a0ec51d694cec8cd7a8bd342b10e1ab7e435c3e126d7d166cfd3c743fee025c2a42e07feee7433b0971856608390f5ba242697eaa10ddf08317bcd7f71b5906e8faa09eefb90c9af2bd02b320e1452d484642aedce304c2da31a255b512775ba6b6940775483128868158397f86b9d7b59ae9ee0b403d0129a4014e4065b7f42454b11d172efe1980b7bdf6ea283f7da4299e896a2d0d87e7ba06985a75a12dfcfd564af33e736ac754d6792be6cc4e8878b2a73905206e6d17fa57a9360658e6aebb8e39b25d64a7e625cbbd8da2cfc68ef18fabfbc5533c5953c9529440270e77b4aa6814ceee1f0444603ce5cf71437be3c9edfdc725e2f56a618f4cd49a9651d9a6d18ea895c2796be2b8f803c716caac031c02b805a18adcf0cd72e2ebaeb9c97cf2546b2a6f34f8f59eb001218be11289aca99e5c07f069a681ee428bbc58c53fb26b953fbfcf7308c5a463a071d117ebde404eaa724fa5abb96d45cbe426215163bc8607f0a0b52b14764c8b246de8fda8be695457ac808e423e153efca9902c31a605645d3b1f83d8ad3f4e606f0246beb56c12cd654aef05bc85c0389cd4cda5b168b5dbce03a05e968b8a0b6ce40be454247814eb28bf3dd262a5345023473148bf8efc43755a2eb2e4edcf6475ca7d5f804c0cd52f4b40fe94c9dbfc244b907b1a20d79ff2cf7b19785d412cac2cc598340938e09ceb7512360a533bb3b76cddf424b7ad948ea022015ea03cee6dc15375895a6782fec3f25676fbcbc463c03169cba42c6681243fd8e465f3f5b0071117f16247aab6e4867ea950ffe5f4ed008da5816dfc1dcc65b1209f0f950456d43ceda2cc09e2f645faadbf46fe8138bacd26532f73c0ccab18c40f405443cee0c2f3052d24f51916c266ce04edc7d4ebf962d5dd0288b74189c77166183a3d0f96887c0a03169f21a4184900fdf1ffbb406ecfd0286bd04ad9ce167b4bb1a0aa8432e78e23b8c2c5f23240af745944158cbb096d249835f7aa18401e3e2e876e49e9330d81b5cfd6a7193270818ce96b7910f3cadc1973806c38f36a758e78adf2f1dade285d452c47755aa7679f5b48f30b6e1f59b8d23150ce8315e2fcbc9d3c613cb1f53db4b68af80d6", 0x1000}, {&(0x7f0000000040)="01ec82d7f8033407c76c22cf5fd5b605f8584a62507f5c9157466e75c1aae6dc4c5ff2705b6b7d79ca3f7b22534b9d3e2b436709aebdf8b6aa100478278b67682ff69ff570eaec2eafa1d11785b4a1a93f0c07ea120204133bf86c77dd8bd46983a1b2227fe22c3a51a384e57d08e8a71634801634f838476f9dd46103695daa5d23", 0x82}, {&(0x7f0000001180)="f12d8cb02d215f960fcdc424e55b2ae757bd1d91616cde437dcbf6e36b274e3acb9383f0f5116a0299d1d17bd79d45789eb76d65b3696c1d03a6fc48cc2a71452815a52ff25077844b73032557e36864ea9d1c5f950a4c5c8281b4fd153cebfee8e86f3d0a642e23ea34bf38fc107f696ce978b34e6951eb65d14357c1c38a", 0x7f}, {&(0x7f0000001200)="3f0a9944a5c73262887b05ad502aedb843f01309e191a38ebdb69b65c4617d760d29dc1b804084763f608df380792922ce9d2be5afde8ec26a1e6e8ee1e2f7a7fbd6c0fa07460d677da0888b456ea0d72c5317108ed3cbf1a4c0dcc749b17a144711c93fcbb7388c457a03b8d79d2a5074a13b3894e4dd57b9aff08c96f6f5d5ffa282a6c45b54afcaed2bfd21251e2092ec5b0915ce7f225970f74b8e22236487ce1da260e387baba02139c7a20891c24ef1762f1b8df1620911105fb16a12a2b86", 0xc2}, {&(0x7f0000001300)="cda1a776f6b154ea12769208c07176e187636b6fb82b44e06aeba7a2cafb767101179d8c5c4044b4cd397415ce602e6e25697f761703aca751b3f049f354d26a34cd4e4828f555f362677dbfa97b2c6caedf00f93f0c15e9fdeb84f04ab4a33f88ea8b189de5b913a7e751c9d2a031c5f7b9792bcf9143d47614b646e4a91417", 0x80}, {&(0x7f0000001380)="8b3ee4825a0136d3f3638640d0c3f990696922608449a2a79e9876e770638ad1eafc0b3e17c80d0b6b8e7f3f01759d15d8a56c7313421aa41bb41d5e8ce0811b83fc16fa3b54eeac7f0fa7face50c3bcdfc08c206e0b124ccf33", 0x5a}, {&(0x7f0000001400)="ca6f28626577e15d9026379f7f3b947fecb8f03d5bb5361c5c4cc46dc774fde0faa1872c54112839f34ee89ac85a632ee92b4b0599eb16d3db3f034236e1d00df05427905514562b382708380436dabaefcc0d81f8848e7e7f60bc650adfca3107f73afa4eb4492446082055fc5dc1f06edaca961552669a1b780cadb1faf3b1b821e3255123747ad39b07e3855401", 0x8f}], 0x7}, 0x3}, {{&(0x7f0000001540)=@llc={0x1a, 0x104, 0x0, 0x4026a114, 0x3, 0x10000, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000015c0)="c375dd8ca82c080326810b6f16728a7101e698b2a1577814f248878662cfa0943f1b3548a9007f85ecdc766598eded3d65e942469acc3c1ba2ec3af18bf8dc32fbea82400aaf41dbb8405d684cd28f0ee33ea0e7444c465abc14e93e2dc192d8a56e4869be074cb878fd6a40138cd346adc166a90009e1bd525a37", 0x7b}, {&(0x7f0000001640)="1f2fc94e8b1d6f1fbe8399f53830970d3cf1fcd1ef9d3ff79f8c13ad9887a0a2784f9cafd755a797be41aa86109495feaf089b85ac7c6dd182111e17cc0c53b05fc67134a75727dd8e911650c048693d7911ad81cc1f28dc7a1424909c519604df657a3dd1dffbc602176097fbc9738e9ff06fa524ee02a5f3be2ea38fb5d387626030aa80bf67b82fccca2778a7a2f4d235f8821f59b915dae80320c11784ff7075f5f1314d55e1", 0xa8}, {&(0x7f0000001700)="0be56d3f757787e608edd57a6ef738fe17ab07a96c6401f4acceec5ab1da49762e2a1f74e5f91305ee4e0881db733a6b21a980c8d01b31b681d616ceb4b0d02ca711f47c44899fe411fcc8a8bf7de9ce51a2d7b427cfeeebc87684078de963d9d5574e171cfc0ddb495e33173d6f814078b5c45105194f3ecc05ae10cec20fb575131069fd339f863c2e12ea26847632e8e1c5cbb15bfccd094d21794dcc24", 0x9f}, {&(0x7f00000017c0)="dd348da4aeaf0bfd01ba56c7b9dc1beaac5e3d19b814f0b7aeef35cccf3cb4e6b0a7c23d066eb24208b9b6b6cf25e1908058f20e00add5b004b934adeaf929f144fef8cd6b8186a6dd8057270997613dcb0e3c104b42a6341a4c6acdfbcc2971e48cfed20b7cd877864e55a4", 0x6c}], 0x4, &(0x7f0000001840)=[{0xb8, 0xbe, 0x0, "cf1e23b1b03e8b1857adc58e5e401be65a2eb899287b2c8e4260bd89e37bf73489df99bb7790c0f352411c184f33786d47c8a218b32d73c41dd9c9bb195aa6c8274569c644b73bc5a16535d82e0e105043a88b4f13c6e346f44ef8f85e8969e2581927c29de00296e013fc8ddeb349fb57297f249eb340d1fbd6d80ecfa5ed1936dffd749d29f5529ef808bd33b34d2a5b0a1e7fcf684d8653bd6dfd3a296c2079d960"}, {0xa0, 0x118, 0x6, "048ef6a68fc1e07dd43c86532011dab64608e9a078f760553676257e07fbaa8559511dd63c45cb02c53545f45ebe3e9f28ddceba0fe83d5a57a9a608874ebdcc0ec55cf6c77ff28c687b07e96b644d494eb8734c516d0481fef1ad4ddee6e0ac0263dfc9968d4cc6416612127ab8de6f0e1ea7d31626f8e012cf1d216177593fa83c340c0f72e3b97d8f"}, {0x78, 0x7, 0x81, "adfd216ce83ba4bfd1a8eed414c0604481724c60a829a35ae1a61a69c22b8d1eba7a323bc8400754e746670a44559385486c1ea8d2b212ca7d64f481feab275526359230855b9bbae90b984dad9720ae4e1674dd1d228de3d033b7bbda13bee3f3d61d7f698261"}, {0x98, 0x19f, 0xffffffffffffffe1, "d3ea6ce190b39ec5699f765591e5a58486c09816e458f21025ee2a4937fc41d6da03c8b4d37acb6aa260dd176fa36ad3990d6e4a9c2a972481c9c559440408e4214062ad84bdb592c396bba6721922c92672d2ff8b577229032093e6127e499f5cdf94b65d071c1376818675b885650bdfe5396416ec9efefa1fbd5a1dddde5a31acb9ff74c3"}, {0xa8, 0x114, 0x1ff, "6f450f85cfebdefe38ad8fe7bc606359428234aecc91a332e412f5c0fd64b855ef31b822c101c3f0e4274635a7c17d29fd9037623d9c9424ef4efcd82c11fb14ce2b19b1dc62c8c74d400954a8564d5e2456d343b16075f200e6f305513a7e83586512df4408ff839f0df7baba6374b87a5af840c45099c3b7bdb7b967717f9acf784b95d9aef5eee8c31509d1b6a05a5ece"}, {0x40, 0x1, 0x101, "4fe0cee2c1fb6720a42675c0dfac7fbc29be91060aa873094a11fde178daa6c5bea31336ca673b7a644553a314"}, {0x88, 0x1ff, 0x629, "c95c37fd519b0665ed077add595941834babfd7ac3ca1e856242e4a6ade7387a1503c4e565a8ef79c8c5d0b9501dcc97a788334b8778dfb993c7f81c3d4b02b9ab80950a3f4a3aef85988d9528317faa535bd310df70345f40d7ca9517eae9c4391652c822f5833d3973964aab0607a9cb8bedec75c3"}, {0xd8, 0x10d, 0x1000, "9191f21ef6ffc118c621d63782583f66f96322dd390b2c4806338ca2598829f582a37b0c62a1604a09a62c48ff29d5623a2392654ddc3f16d8591d440ff8a73957123c1448d9ff09800a4a9d70793b504b716db2b3f4b223fbb8e459b4b6c9ff26ab202bbd6516b3b3da0c17baddb4444c928e7f185a1ada40cde4caf8a575887df30373170d71fb841dd94aadadc59e0ed75563ba3868d3e580b93658f3ee15d113d03868228dda082876ac92be1a0ba807a50b9dfd867a637de7d9730ac1abfd"}], 0x4b0}, 0x3}], 0x2, 0x20008084) r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d090a4beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x2, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}}}, 0x88) r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x3f000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d090e4beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x10000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000080)={0x1, 0x3}, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x9, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000000, 0x200) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000080)={0x20, 0x6}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000035, 0x805, 0x5) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x18800, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0xffff) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d090f4beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2056.077877] protocol 88fb is buggy, dev hsr_slave_0 [ 2056.083028] protocol 88fb is buggy, dev hsr_slave_1 17:51:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000040)=0x8) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) 17:51:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r0, 0xdc6b, &(0x7f0000000280)="0a080000006ab020c3c0c4286b0ae862a6f4cfc694540dafd677f0d087707a0ca28795add0b796e68fb0abf74eaabc9f9311bb6fe2c290f90bc405f3aef54457781d8ad763220979bdefdb25defc8cf71efb1044adbad2a7b05b0229d7490f312cc0fdf1b38d195dec2e1cb8bd0f2ff9be3ce1a488cfb2221a0d55b8bad2f439bbfd3e4269c96f69097d1114474905190964eaf4e4d38850a81fd5d947239b9d67d0f570367f427800a69edb06b973b90c76f6650000970000002a9b5a089b7acc67f113f9239273f9818cf0c3f9a4ece000000000000000000000b32af00000000000000000000000000000") r1 = socket(0x848000000015, 0x805, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x2, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0xeb348159730b336) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09104beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x4, 0x32aa}]}, 0xc, 0x1) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0x40) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000140)={0x26, 0xd77, 0x1}) ioctl(r0, 0x40000000000080, &(0x7f00000000c0)="0af51f023c123f4488a070") r2 = socket(0x848000000013, 0x805, 0xfffffffffffffffd) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) getsockopt(r2, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09604beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2056.397933] protocol 88fb is buggy, dev hsr_slave_0 [ 2056.403153] protocol 88fb is buggy, dev hsr_slave_1 [ 2056.408312] protocol 88fb is buggy, dev hsr_slave_0 [ 2056.413401] protocol 88fb is buggy, dev hsr_slave_1 17:51:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") socket(0x848000000015, 0x805, 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101400, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000040)={0xfffffffffffff000, 0x2, 0x8}) 17:51:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09974beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = semget(0x0, 0x1, 0x8) semop(r1, &(0x7f0000000100)=[{0x3, 0x9a3e, 0x800}], 0x1) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x271b, 0x0, &(0x7f0000000000)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000000c0)="8ccf71") r4 = fcntl$getown(r2, 0x9) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) kcmp(r4, r5, 0x5, r0, r0) [ 2056.647706] QAT: Invalid ioctl [ 2056.662362] QAT: Invalid ioctl 17:51:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x3f000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2056.690006] QAT: Invalid ioctl 17:51:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x2, &(0x7f00000000c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000001c0)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x121401, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) getpgrp(r3) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000080)={0x9, 0x1, {0x52, 0x3, 0xfffffffffffff80d, {0x8, 0xba}, {0x1, 0x6}, @cond=[{0x3, 0x9, 0x7ea55fee, 0x694, 0x9af6}, {0x8, 0x7, 0x23a, 0x5, 0x27, 0x8}]}, {0x51, 0xfffffffffffffffa, 0x9, {0x65, 0x100}, {0x1, 0xbe}, @const={0x20, {0x5, 0x8001, 0xfe, 0x8}}}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0xfffffffffffffffd, 0x4) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c562c8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x9, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) sync() syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) clone(0x2102801ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x9903000000000000, &(0x7f0000000040)={0x40000000000005, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") setsockopt$sock_void(r0, 0x1, 0x1000000001b, 0x0, 0x0) socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x111, 0x271b, 0x0, &(0x7f0000000000)) 17:51:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447020bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x280000, 0x0) write$UHID_CREATE(r1, &(0x7f0000000280)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000180)=""/244, 0xf4, 0xfffffffffffffbff, 0x1, 0x9, 0x0, 0xfffffffffffffffd}, 0x120) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") prctl$PR_GET_THP_DISABLE(0x2a) r2 = socket(0x848000000015, 0x805, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt(r2, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x8000, 0x0) r2 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="d929bb0f74f6b17bdb6e3106ab183137649a292e3e8f5849569429dea22898efd76a2b59bd552ebbec59f8241b6fe0b28c5860084aa78877168a34bdc89e218915bdc966ac480ac012cceaf776880ef1e4609d0abddbb6e6526a81f8e71d37288a1582b44ad9b0999649592e1c16e73ac82b2f48a80c3c5cbc573c9aed561e9be81023c7f2c2a2e555d8064fd07a468a91c3176f1f09e633b6e41edc379d371d3cfca2654395277a88022b486a73d9384f8163298ebdb4d615de190a821a6379948bca2d7deca118e932cfdf7b78a4", 0xcf, 0xffffffffffffffff) r3 = getuid() fstat(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r2, r3, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) fchownat(r1, &(0x7f00000000c0)='./file0\x00', r5, r6, 0x1400) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000540)={0x3, 0xb, 0x3, "93912427d93d19915380cf208b39b790b672d503f39abed366fafc7de572289c", 0x7b76775b}) r7 = socket(0x848000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271b, 0x0, &(0x7f0000000000)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2000, 0x0) 17:51:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447040bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) prctl$PR_GET_FP_MODE(0x2e) 17:51:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447080bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6b, 0x90080) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000080)="f14eec9c08792e7a5e9e9c225961df6537a1cb3f7805cb6e26c4fbeb32607cec78b03b871666838f84b2946d266344f6e0dcedffe1f80d682fde46b75b29a8e5343f47d0c6435b2199ce32353aef5252cea39c") getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080)=0x5, 0x4) dup2(r0, r1) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x271b, 0x0, &(0x7f0000000000)) socket(0x10, 0x80000, 0x0) 17:51:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x6a, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470a0bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40, 0x0) r2 = socket(0x848000000001, 0x80a, 0xfffffffffffffffd) getsockopt(r0, 0xbe, 0x100000004, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000180)={0x3, @default, r3}) utimensat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x100) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e22, @local}, {0x2, 0x4e23}, 0x90, 0x0, 0x0, 0x0, 0x343d, &(0x7f00000001c0)='rose0\x00', 0xc0, 0x20, 0x8}) 17:51:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x48040, 0x0) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x271b, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x7d}, &(0x7f00000000c0)=0x8) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r3, 0x1}, &(0x7f0000000180)=0x8) 17:51:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x0, 0x89b}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r3 = socket(0x848000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470e0bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x3f00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = socket(0x848000000015, 0x805, 0x7) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f0000000000)) 17:51:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000080)) 17:51:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 17:51:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470f0bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) chmod(&(0x7f0000000040)='./file0\x00', 0x0) utime(&(0x7f0000000000)='./file0\x00', 0x0) 17:51:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x64, 0x30}, &(0x7f0000000080)=0xc) accept4$x25(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x12, 0x800) accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x7ff}, 0x8) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447100bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = dup(r0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x3}, 0x4) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 3: r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f0000000200)=0x10, 0x80820) fadvise64(r0, 0x4, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="88f5b1030a4271d260bee7829c552f96bb5cdb35dd5e4a29269c6c81bc0511ec66711c257cd96e180fd9f2aeceb954a70f7468cc9d669246f88295069fbc2d5d6c64024fe3dd268efa12fa01e43fac15e51ceea54221dfc61789d9b6b95cdc3eccfe9eceb74429eb1205be7945c237795de646de17e24f0a20a4733fcf50") r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x480000, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000100)=""/125) socket$rds(0x15, 0x5, 0x0) r3 = socket(0x9, 0xa, 0xfffffffffffffffe) getsockopt(r3, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:07 executing program 4: io_setup(0x9, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/67) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) 17:51:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447600bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x16200, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x6) 17:51:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x0) write$P9_ROPEN(r2, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0x8, 0x0, 0x3}, 0x6}}, 0x18) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0xfff, 0x9, 0x400, 0x101}]}) 17:51:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x06\x00') mkdirat$cgroup(r0, &(0x7f0000000140)='s\xf9z0\x00', 0x1ff) 17:51:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447970bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x4) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 17:51:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x801, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470040ffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2059.446322] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 2059.465272] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 2059.488256] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 17:51:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x3f00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2059.525678] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 2059.554900] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget(0x1, 0x20) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000180)=""/70) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x809, 0x0) r3 = accept$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) bind$packet(r2, &(0x7f00000000c0)={0x11, 0xc, r4, 0x1, 0x80, 0x6, @random="478abb118eb1"}, 0x14) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000100)) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2059.581571] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 2059.597260] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 2059.611032] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") getsockopt(0xffffffffffffffff, 0x114, 0x2721, 0x0, &(0x7f0000000000)) io_setup(0x3ff, &(0x7f0000000180)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7ff, 0x101000) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x4040, 0x0) io_submit(r1, 0x3, &(0x7f00000004c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf, 0x4, r0, &(0x7f00000001c0)="354bc4129ef13d71054573c4988ef70d17a7d6f3200c50d7a319937ca8f67a937d6ab03e4fe28af3ab4e903b5cc6a1d1a4c8092d9c56de236f7bb969a9e24e97f187ee748dfe96c4f0f3cf1650bf5e37b4a857aea28357c461f399032bfc4cc02b3fdc1eb44f3018aeae17045a2c0e33f1c33d4d2549de002d790e49798416e2410e0112f72ce98367ae5e604b310bbc415e66e0d0c9127c7f575483f9658853a4a6d64874e6fceefdafe5dbab944649", 0xb0, 0x9959, 0x0, 0x2, r2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xf, 0x99, r0, &(0x7f0000000300)="0b9599452d3e6d91d8e55268469a42d9a8456a340666c694f6e1d2ea5d71c33910d8a91268b95e9ed5d9e36f3aeab0d12e553a0ef13377be45d1c794e8c8f383f58a61dcac9f2bc55433dd8c4656d4976dc4c8f7561aed234ea9b4e922b160a4200e451d08dd34a735a6500254a21a6a8376e837", 0x74, 0x9, 0x0, 0x1, r3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000400)="c714ee8733febb21ed796816d1efffc78c799361fb830e19535513955393731ec90777cad9a08bd4fa3c877997b6fb921d3c099fbbbe158748ed400bc0258655d2e9b7bc09adfb75d84c2dbf38d79c10d2dae1404868e97e0fd8f08a507b3c2d71021fd92f7c1e9d9d770c727a671beca0c8dc2bf41d8b23daaf", 0x7a, 0x10001, 0x0, 0x3, 0xffffffffffffff9c}]) r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x420200) getsockopt$netlink(r4, 0x10e, 0x7, &(0x7f0000000080)=""/107, &(0x7f0000000100)=0x6b) [ 2059.661237] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 2059.692939] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 17:51:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f02000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:08 executing program 4: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) [ 2059.715989] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 2059.741804] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 17:51:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x4, 0x3, 0x8000, 0x400}, {0x3f, 0x7, 0x2, 0x9}, {0x1, 0x1}, {0x3, 0x0, 0xcf9b, 0x3}, {0x822, 0x7, 0x5, 0xfffffffffffffffb}, {0x0, 0x0, 0x5}, {0x6, 0x7, 0xd35d, 0x3}]}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000880)={0x400, 0x40, 0x8, 0x0, 0x7, 0xffffffff, 0x6, 0x6, 0x0}, &(0x7f00000008c0)=0x20) r4 = shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000640)=""/127) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000900)={r3, @in6={{0xa, 0x4e20, 0x10001, @local, 0x957}}, 0x0, 0x6, 0xfff, 0x5, 0x4}, &(0x7f00000009c0)=0x98) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @loopback, @remote}, &(0x7f0000000180)=0xc) sendmmsg(r0, &(0x7f0000000840)=[{{&(0x7f00000001c0)=@ll={0x11, 0xfd, r5, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)="e9bd234e4a7ae1abf85c5739afdb885f7cbe6137965dee67aff38ccacfea1552291b80d2ca650009d79d405fff0c3e8a2e72743a955aa04c2804c2a72e2478b49397c0e5ed4195002f7b895e6177b2f5e22f276bf3aedd48dc5ccf68a9e7617a5296e823269b5b9b3aa0f53fdae48c3582a8fff63b0beeb45d89d3c943b5b1ddf4d6f95a0e1e04d3f5448301895e2d34c3ef20da", 0x94}, {&(0x7f0000000300)="4eeaf221f1ed7db83db94098724bc43c7767ed3f7e2a1eac5aa41854869f1bdb86caf6ab7addac51b6e589f4d86e", 0x2e}, {&(0x7f0000000340)="1e01442894dffcc3135e876d202467793cfe3b2f3bcafdc4d8f07fd49ec7976354d745c24a47eb23d0a710b7285dfad9f01dff53b452f1f5716850a63b67e89a28cd1e4a380fad8f284bb8a75c64ce36be8eafebaccda58fd6469802c36a582aef298b42c66208525bc9d73fe751aeed4ae35e66e555de2842eb7c22350a32ed79e83d9a433ef75396d3e029", 0x8c}, {&(0x7f0000000400)="6ef0b9cb049a8fe8b514bb5ea389914c54544fd7368496882a577e8a05ae49760adee9ba27d2d0cdb580336523a8146391cc43bfe4337f62723958c57e9609497b7c543021116cd9ab69f9c5d5778a80", 0x50}, {&(0x7f0000000480)="6a78183e5c42904220058f786c0387545fde6f1dc7ab13301f590e8de46e78c14f03baf86717d79685ab23e39c78363c1a676b18d0bc8eb32dc368f75013c96658d01e850048d2e95f9771e9693070f5751c17d05496b38f4fd478c005a2dbb6118af30a925adb04b98dd393dfb438005fa9a3e0b9889fad34a39ff87cb851c217d29570aacece01b9ca51f1c2aa2bd996bcfcedf1724f8fa86f1cb12826f33a9d368fc6d7c046ea6bc21d56c9e93ad52185bb59d3e010ba212aa3b01749ca48f3", 0xc1}, {&(0x7f0000000580)="ee647476f3f50078f9fc47e019a6219ae8b146d751556bae534da71f48ba33115bfc", 0x22}], 0x6, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1c8}, 0xd7}], 0x1, 0x80) 17:51:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f04000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x3, 0x7, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f08000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2060.237933] net_ratelimit: 18 callbacks suppressed [ 2060.237940] protocol 88fb is buggy, dev hsr_slave_0 [ 2060.248033] protocol 88fb is buggy, dev hsr_slave_1 17:51:09 executing program 4: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) 17:51:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0af51f0256abe79b5764703c123f2a88c6a0700a1d7b4357bff94a69fe5ce00656cdfa95a674a92e58ee97c877dc512ecb67582513d8a253ed0046b4c71d93bf672a0af7415b0871a71c098b62dd1bd8afc4b53408e9c4e2c48a41e75c447514cd9cbd69b2fe38853f5d9e9308ddbbb69d1af4594a75e78582661fc496af30fb171afa913bedc051c8cff0ee4f70fb0ed8e668a439a50c32dd78c6867020d691fb7e218e8e0a2df2c32ba5444f35d61409ffb760045e8196a3980628e9b203747ce091b9664dabcaf8c7a0d13a6a11d9d42d0085284ca4bfa1f58ce7d0587adf75da01907a4b14d52fab914d87554b767f29cc2bfeb30920c0e190e5cb7c881f9a8fafce9e713add8e5f36cfadfeb8859b5bccf5e6ffebc88548720e7b786711b64c11d5529189e9da5500ef540ee0b5") r1 = socket(0x848000000015, 0x805, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x282, 0x0) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000080)) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)=0xfffffffffffffea6) 17:51:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0a000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setpipe(r0, 0x407, 0x63bf) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0e000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2060.557915] protocol 88fb is buggy, dev hsr_slave_0 [ 2060.563607] protocol 88fb is buggy, dev hsr_slave_1 [ 2060.568787] protocol 88fb is buggy, dev hsr_slave_0 [ 2060.573863] protocol 88fb is buggy, dev hsr_slave_1 [ 2060.579015] protocol 88fb is buggy, dev hsr_slave_0 [ 2060.584117] protocol 88fb is buggy, dev hsr_slave_1 17:51:09 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x8000) socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x18}) r1 = socket(0x848000000017, 0x805, 0x2000000000) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) setsockopt$inet6_dccp_int(r1, 0x21, 0x4, &(0x7f0000000080), 0x4) 17:51:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") getsockopt(r0, 0xd2, 0x7e67, 0x0, &(0x7f0000000040)) 17:51:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0f000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x2, 0x8800) write$ppp(r1, &(0x7f0000000080)="e8672e7f7f5fdbf6a291546da3716a1f1ac7e679164dd518aef2bbb6fdf28c2576f9f0ad6a56436619aa6ccb29f3ae94118fa252b8bb43ee4c6e1fa0262b55d867a7c2bb", 0x44) r2 = socket(0x848000000015, 0x805, 0x0) r3 = fcntl$getown(r1, 0x9) r4 = geteuid() sendmsg$nl_generic(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd8, 0x14, 0x8, 0x70bd29, 0x25dfdbfc, {0x1b}, [@nested={0xbc, 0x26, [@typed={0x14, 0x36, @ipv6=@ipv4={[], [], @multicast1}}, @typed={0x8, 0x35, @pid=r3}, @generic="184c4ce6544ffaa210c42bef7d1817c970c084a444a9", @typed={0x8, 0x8, @str='\x00'}, @typed={0x8, 0x27, @uid=r4}, @generic="75375c163d50e799b6c4e5cc8954995a8635bd6f3996e3250cd5def4ca4a28e2e69049eaa38517afcc34afe8adb2e649f408a1eae984e9a8c57065215468de73eacf4d184b6bb09513fa4f45f866663548062d7c1b585075acface2a37d44ce527f4ebc3825e62af00dc2f461b", @typed={0x8, 0x81, @fd=r1}]}, @typed={0x8, 0x3f, @fd=r2}]}, 0xd8}, 0x1, 0x0, 0x0, 0x50}, 0x8000) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f10000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2061.088788] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3f00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7ff, &(0x7f0000000100)="0af51f023c123f2a88a070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x140, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) socket(0x848000000015, 0x805, 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000180)=@v2={0x7, 0x3, 0xa, 0x100000000, 0x70, "a80084b6f0bf968726f8104792fdba51be7d7c3d90729896640c3e93406dcfb6a2849a62162664486526c6cf2ad6480911570b74c743911d685f9e7e843c89ec83d804877eb5a9caa5d674a44272111de1d7bac92b7c0cdefd5fa66435d28e609cbad430e2b1ae717f93d3f25e49d59b"}, 0x7a, 0x3) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x13}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) getsockopt(r0, 0x114, 0x2721, 0x0, &(0x7f0000000000)=0xffffffffffffffb6) [ 2061.258725] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f60000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2e, 0x8000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000140)={r3, 0x80000, r4}) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) [ 2061.437973] protocol 88fb is buggy, dev hsr_slave_0 [ 2061.443150] protocol 88fb is buggy, dev hsr_slave_1 17:51:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f97000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2061.513500] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230ff0000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81, &(0x7f0000000180)="0af51f023c123f2a883ff750bef7c89e635dde6f87a0706e2cc36e1ac4343b82b931f79d58e9986ad1f9c675fcc2cfce632b6cb4b17987258ce743d5a74517fe026ffefd2901d38da13bbb8ae2f0174e6c334862c71093cea109fa158f94724e49be2f1c81a206bf661525ab445fe72119a24ccd401d45afa7b2d2d7a41ec0d9f40f6d87fc65071c10dd5712c846f47f88cd4f06eb6d002a192b2cea0c43303e7e563dcc9a589d4db4e4669ec6") r1 = socket(0x9, 0x7, 0xfffffffffffffffc) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) [ 2061.791235] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000180)="1f12743288e42a87395964f380ff59bae703712d2f2e31ef32beb779ea", 0xfffffddd) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80698, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f00000001c0)={0xa, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) r3 = socket(0x848000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2721, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e21, 0x400, @empty, 0x3f}}, 0x0, 0xff, 0x0, "c1c4ee6855583cd23cb91eaea9f3e0a86272349f9741bb01bf9a36b7e4d0892ad355ba6e26fe9f43d11fa368fcd2d4f28b1396347f113f2b0bb589fea90c68106d560c69ed05ed3587dec10f66ad7338"}, 0xd8) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000000c0)={r4, 0x2, 0x200, 0x8f}, &(0x7f0000000100)=0x10) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) 17:51:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000a0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2062.125136] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000e0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x1, 0x2000000000006, 0x0, &(0x7f00000000c0)=0xfffffffffffffe95) 17:51:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KDENABIO(r1, 0x4b36) ioctl$TIOCSCTTY(r1, 0x540e, 0x2) dup3(r0, r1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = dup3(r0, r0, 0x80000) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5eaa, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r3 = socket(0x848000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x4, 0x0, &(0x7f0000000000)) 17:51:11 executing program 4: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230fc00e0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") getsockopt(0xffffffffffffffff, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:11 executing program 4: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000f0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000040)={0x0, @empty, 0x4e20, 0x0, 'sed\x00', 0x8, 0x0, 0x47}, 0x2c) r2 = dup(r1) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000080)={0x3, {0x0, 0x40000000004, 0x3f, 0x1400000000000000, 0x808e, 0x401}}) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3f00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 4: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f003f0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000000)={@my=0x0}) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000080)=0x1000000000000000) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000100)) 17:51:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00600000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000040)="0af51f023c123f2aa8a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3f000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00970000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x4c, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xfb}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40010}, 0x10) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x200000) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x24) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)=0xfffffffffffffed4) fchmod(r0, 0x42) r3 = fcntl$dupfd(r0, 0x0, r0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000180)=0x9, 0x4) write$capi20(r3, &(0x7f0000000040)={0x10, 0x6, 0x8f, 0x81, 0x50985d44, 0x4}, 0x10) 17:51:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0ec00000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:12 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:51:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x16040) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000080)={0x8, 0x0, [{0xa8a, 0x0, 0x8}, {0x39f, 0x0, 0x4}, {0x2ca, 0x0, 0x5}, {0xbff, 0x0, 0x5}, {0x0, 0x0, 0x8}, {0x356, 0x0, 0x1f}, {0x0, 0x0, 0xffffffffffffff5d}, {0xbfb, 0x0, 0x4aea9895}]}) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x4, 0x0, &(0x7f0000000000)) 17:51:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2063.896134] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00f00000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x20002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000080)='mime_type\x00', 0xffffffffffffffff}, 0x30) write$FUSE_LK(r2, &(0x7f0000000100)={0x28, 0x0, 0x8, {{0x8, 0xfffffffffffffc71, 0x1, r3}}}, 0x28) 17:51:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:51:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000240)=""/94, &(0x7f00000002c0)=0x5e) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@local, @in6=@mcast1}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00400300a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2064.184381] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:12 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x10440) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000000}, 0x1c) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000180)={"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"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:51:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00034000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000000c0)={'security\x00', 0x2, [{}, {}]}, 0x48) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a88f5588a2a4ea05eb2de860e5f8899056952da37a8300d47b64ce8664bb43e677c99a44c00000000000000000000000000") r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2064.505847] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)=0xfffffffffffffecf) 17:51:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)) 17:51:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230ffffff000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) socket$inet(0x2, 0x80007, 0xde) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) [ 2064.790270] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3f000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000001a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)) 17:51:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x820004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x20, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0x6, 0x7, 0x3}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}}, 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000040)={r1, 0x5, 0x100, "beb2b5eb2e031570a69e5f380ee70dbcdc5dfdc9b5d15f16df8eb7e9a2da5eb0b132127c3e749fe6a3195a5553dc5f3cb296c7b8ecc6ceda3598d3a5d3"}) 17:51:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000002a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2065.094501] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x78, 0x541000) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@gettaction={0x178, 0x32, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x9}, @action_gd=@TCA_ACT_TAB={0xa4, 0x1, [{0x10, 0xb, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x20, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0x18, 0xd, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}, @action_gd=@TCA_ACT_TAB={0x50, 0x1, [{0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x12, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffffffff7fff}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x4}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0x10, 0x4, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffffffffff80}}]}]}, 0x178}}, 0x8000) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)) 17:51:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000004a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0xd2f8f39f9437dcca) ioctl$NBD_DO_IT(r1, 0xab03) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x298, 0x0, &(0x7f0000000040)) 17:51:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2065.343036] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 17:51:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000008a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000380)="08f51f023c123f3688a070338eabbc5572da0bcfcd474094ba3ad0054f80f63db4daf9352529aaff75b583dc214e5c64078de54cf9eaf99ead1e5a6738fbec7c8a454937698442dc96c2ff98ee46879e9e4e72ce2be0ad2bd12171a17538711427208f7777e38058d499b074dd9973c27ee735467c6f7d6ce003c854e82f1274a5fa6818fb6acf736486aae6212b8e1907222bace9a9757133c00ccaecfe92c3d8c0c7f3aa0d2049ddf4915841c17dfe2f21ecb1e5537fd1feb34c2f55bcc42e15fa4d683eb000000000000000") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80000, 0x0) write$eventfd(r1, &(0x7f0000000080)=0x7, 0x8) r2 = socket(0x848000000015, 0x805, 0x0) connect$ax25(r1, &(0x7f00000000c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @default, @default, @null, @default, @null, @default, @bcast]}, 0x48) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2065.597907] net_ratelimit: 22 callbacks suppressed [ 2065.597913] protocol 88fb is buggy, dev hsr_slave_0 [ 2065.608025] protocol 88fb is buggy, dev hsr_slave_1 17:51:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 4: 17:51:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000aa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:14 executing program 4: 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x44000, 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f00000001c0)={0x7fff, 0x3, "91f40777859309eeaa75dfb051075a12b7b7e6675d91e91c0fd76409f97ba616", 0x401, 0x7fff, 0x8001, 0x7, 0x2}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x666) r2 = socket(0x848000000015, 0x805, 0x0) getpeername$netrom(r2, &(0x7f0000000080)={{}, [@bcast, @null, @rose, @rose, @netrom, @netrom, @null]}, &(0x7f0000000100)=0x48) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000180)=0x101, 0x4) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 4: 17:51:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2065.837940] protocol 88fb is buggy, dev hsr_slave_0 [ 2065.843092] protocol 88fb is buggy, dev hsr_slave_1 17:51:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:14 executing program 4: 17:51:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:14 executing program 4: 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@generic={0x2, 0x7f, 0x1}) r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000010a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000010004002) io_setup(0x3, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000003700)=[&(0x7f00000016c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2ad}]) 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket(0x848000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848040000015, 0x8000f, 0x0) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2066.478239] protocol 88fb is buggy, dev hsr_slave_0 [ 2066.483355] protocol 88fb is buggy, dev hsr_slave_1 17:51:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000003fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:15 executing program 4: 17:51:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000040)="0af51f023c123f2a88a070") r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3f, 0x200) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000180)={0x15, 0x9f, &(0x7f00000000c0)="1a4707092609fefe06a6630d798963167818fbcb7b03d2956e28c9ebdb6a8c5197dc3a2b5cde8ebe995076eb23821963977bcf58c2e571db21a857695ed10b07ef8d0c30d84f06509c437e0a43eb548b1cd641dec1f9aa7a5fff9d114704fd41d214bbb4630fbb97c6b7199aea0c8afe18c081489f3498ec9dd287ab85f8b40dcbf6c440a37d6c4e337be5d8c8e2fec15f5a8ebc7f3e6e8b3fbc525429f636"}) r2 = socket(0x11, 0x1, 0x0) getsockopt(r2, 0x8, 0x2721, 0x0, &(0x7f0000000080)) accept4$nfc_llcp(r1, &(0x7f00000001c0), &(0x7f0000000240)=0x60, 0x800) 17:51:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 4: 17:51:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000060a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x22}}, 0x14) r2 = socket(0x848000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:15 executing program 4: [ 2066.797903] protocol 88fb is buggy, dev hsr_slave_0 [ 2066.803125] protocol 88fb is buggy, dev hsr_slave_1 [ 2066.808247] protocol 88fb is buggy, dev hsr_slave_0 [ 2066.813322] protocol 88fb is buggy, dev hsr_slave_1 17:51:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001000008912, &(0x7f00000024c0)="0af51f023c123f2a88308836d85acc675ab0c9ffea659e64fea070") r1 = socket(0x4, 0x4000800, 0x8b5d) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000002480)={&(0x7f0000000040)=@ax25={{}, [@rose, @bcast, @default, @bcast, @bcast, @rose, @default]}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/160, 0xa0}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/146, 0x92}, {&(0x7f0000002300)=""/183, 0xb7}], 0x5, &(0x7f00000023c0)=""/134, 0x86}, 0x40) 17:51:15 executing program 4: 17:51:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000097a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:15 executing program 4: 17:51:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x0) sendto$unix(r1, &(0x7f0000000040)="f21380ed28489c61e570053e5af8d040fa3fd1ee03e3944860f892f109173f89c48d38d77a14179144feaf1e3df55cf0de0737c3f19a988d6bdde8434a4437e36e5907831fac8dd868fb81ba603b2220fd5f2fb3d24ea40c2347845e6a0590df40b415c9e9a330e063e9bb7a6e5f2c045a", 0x71, 0x20000000, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 4: 17:51:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230fffffff9ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae64, 0x0) 17:51:15 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt(0xffffffffffffffff, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000ec0a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0af51f023c123f2a88a070") r1 = socket(0x848000000015, 0x805, 0x1000000000) getsockopt(r1, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 17:51:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230ffffffff0a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8e2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x4, &(0x7f0000000200)='@]{\x00'}, 0x30) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x5, 0xfa, 0xa7ce, 0x0, 0x1, 0x1142, 0x4, 0x9, 0x6, 0x0, 0x1, 0x1, 0x8, 0x0, 0x0, 0xfffffffffffffffc, 0x9, 0x0, 0x1ff, 0x4, 0x0, 0x7fff, 0x2, 0x1, 0x1ff, 0x1, 0x3, 0x6, 0x0, 0xffffffff, 0x100, 0x0, 0x0, 0xb938, 0x8000, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x2}, 0x20000, 0x0, 0x200, 0x0, 0x0, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x3) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000024c0)}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 17:51:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00f0ffffa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f9effffffa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f00000004c0)={0x1, {0x0, 0x0, 0x0}}, 0x68) 17:51:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230ff0ffffffa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00020000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:17 executing program 3: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 17:51:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x3e6) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000005c0)="04f4a2c970de1d9c3776a9481255ced5dbc57fe63cd931916a02bae17f7850aea473b1c2395dcc0f572febcadeb7fa0f2ee9dc78ccc69169ccfc0bf46dbaba25f3f5a75b77654c0cb9989ea026da080991348232bc2541328a29ec7e06", 0x5d, 0x7, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f0000005380)=[{&(0x7f0000000680)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, 0x0, 0x0, 0x800}, 0x4) 17:51:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00040000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00080000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 3: r0 = socket(0x0, 0x0, 0x0) unshare(0x24020400) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) socket$isdn(0x22, 0x3, 0x0) bind$isdn(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x1000, 0x0) unlink(&(0x7f0000000040)='./file0\x00') recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:51:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000a0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000180)) 17:51:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000e0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:18 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f00000014c0)="18", 0x1}], 0x1, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r3, 0x0, 0x1ea71, 0x0) 17:51:18 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000180)) 17:51:18 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000180)) 17:51:18 executing program 3: r0 = memfd_create(&(0x7f0000000140)='(\x00', 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000003c0)) 17:51:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000f0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:18 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 3: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) unshare(0x8020000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') setns(r0, 0x0) clone(0x10262100, 0x0, 0x0, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 17:51:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00100000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2069.830048] audit: type=1326 audit(1549648278.486:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13391 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac9a code=0xffff0000 17:51:18 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2070.615750] audit: type=1326 audit(1549648279.266:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13391 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac9a code=0xffff0000 [ 2070.637929] net_ratelimit: 18 callbacks suppressed [ 2070.637935] protocol 88fb is buggy, dev hsr_slave_0 [ 2070.647948] protocol 88fb is buggy, dev hsr_slave_1 [ 2070.958090] protocol 88fb is buggy, dev hsr_slave_0 [ 2070.963187] protocol 88fb is buggy, dev hsr_slave_1 [ 2070.968412] protocol 88fb is buggy, dev hsr_slave_0 [ 2070.973491] protocol 88fb is buggy, dev hsr_slave_1 [ 2070.978642] protocol 88fb is buggy, dev hsr_slave_0 [ 2070.983698] protocol 88fb is buggy, dev hsr_slave_1 [ 2071.837946] protocol 88fb is buggy, dev hsr_slave_0 [ 2071.843022] protocol 88fb is buggy, dev hsr_slave_1 [ 2072.262992] IPVS: ftp: loaded support on port[0] = 21 [ 2072.413482] chnl_net:caif_netlink_parms(): no params data found [ 2072.537174] bridge0: port 1(bridge_slave_0) entered blocking state [ 2072.543670] bridge0: port 1(bridge_slave_0) entered disabled state [ 2072.551163] device bridge_slave_0 entered promiscuous mode [ 2072.557991] bridge0: port 2(bridge_slave_1) entered blocking state [ 2072.564574] bridge0: port 2(bridge_slave_1) entered disabled state [ 2072.571564] device bridge_slave_1 entered promiscuous mode [ 2072.583268] device bridge_slave_1 left promiscuous mode [ 2072.589873] bridge0: port 2(bridge_slave_1) entered disabled state [ 2072.638943] device bridge_slave_0 left promiscuous mode [ 2072.644394] bridge0: port 1(bridge_slave_0) entered disabled state [ 2075.939602] device hsr_slave_1 left promiscuous mode [ 2075.992907] device hsr_slave_0 left promiscuous mode [ 2076.052690] team0 (unregistering): Port device team_slave_1 removed [ 2076.063310] team0 (unregistering): Port device team_slave_0 removed [ 2076.075293] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2076.135553] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2076.224500] bond0 (unregistering): Released all slaves [ 2076.238112] net_ratelimit: 20 callbacks suppressed [ 2076.238119] protocol 88fb is buggy, dev hsr_slave_0 [ 2076.243115] protocol 88fb is buggy, dev hsr_slave_1 [ 2076.339859] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2076.349611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2076.368152] IPVS: ftp: loaded support on port[0] = 21 [ 2076.376053] team0: Port device team_slave_0 added [ 2076.383072] team0: Port device team_slave_1 added [ 2076.440505] device hsr_slave_0 entered promiscuous mode [ 2076.498223] device hsr_slave_1 entered promiscuous mode [ 2076.639197] chnl_net:caif_netlink_parms(): no params data found [ 2076.683758] bridge0: port 1(bridge_slave_0) entered blocking state [ 2076.690278] bridge0: port 1(bridge_slave_0) entered disabled state [ 2076.697200] device bridge_slave_0 entered promiscuous mode [ 2076.710575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2076.759588] bridge0: port 2(bridge_slave_1) entered blocking state [ 2076.766031] bridge0: port 2(bridge_slave_1) entered disabled state [ 2076.773502] device bridge_slave_1 entered promiscuous mode [ 2076.787517] 8021q: adding VLAN 0 to HW filter on device team0 [ 2076.797381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2076.804736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2076.834693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2076.843661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2076.851947] bridge0: port 1(bridge_slave_0) entered blocking state [ 2076.858363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2076.866000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2076.873968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2076.881381] protocol 88fb is buggy, dev hsr_slave_0 [ 2076.881434] protocol 88fb is buggy, dev hsr_slave_1 [ 2076.892306] bridge0: port 2(bridge_slave_1) entered blocking state [ 2076.898717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2076.905786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2076.916501] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2076.939371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2076.946592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2076.955316] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2076.963688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2076.974152] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2076.995541] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2077.015681] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2077.025966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2077.038400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2077.046105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2077.055675] team0: Port device team_slave_0 added [ 2077.068313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2077.079187] team0: Port device team_slave_1 added [ 2077.101132] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2077.147994] protocol 88fb is buggy, dev hsr_slave_0 [ 2077.153069] protocol 88fb is buggy, dev hsr_slave_1 [ 2077.170850] device hsr_slave_0 entered promiscuous mode [ 2077.207936] protocol 88fb is buggy, dev hsr_slave_0 [ 2077.213141] protocol 88fb is buggy, dev hsr_slave_1 [ 2077.218295] protocol 88fb is buggy, dev hsr_slave_0 [ 2077.223367] protocol 88fb is buggy, dev hsr_slave_1 [ 2077.238237] device hsr_slave_1 entered promiscuous mode [ 2077.307106] bridge0: port 2(bridge_slave_1) entered blocking state [ 2077.313531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2077.320266] bridge0: port 1(bridge_slave_0) entered blocking state [ 2077.326640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2077.348428] bridge0: port 1(bridge_slave_0) entered disabled state [ 2077.355826] bridge0: port 2(bridge_slave_1) entered disabled state [ 2077.428308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2077.451909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2077.459569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:51:26 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r0, 0x4030ae7b, &(0x7f0000000180)) 17:51:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00600000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) accept$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, 0x0, 0xffffffffffffff64, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getpeername(r1, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000540)='trusted.overlay.redirect\x00', &(0x7f0000000640)='./file0\x00', 0x8, 0x1) sendto$inet(r1, &(0x7f0000000580)="a3c0f7f541e5dc1a55924e73", 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xfffffe47) sendto$inet(r1, &(0x7f00000001c0)="d4", 0x1, 0x20000001, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000400)="0adc1f123c123f319bc070") write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000140)={0x29, 0x4, 0x0, {0x3, 0x7, 0x1, 0x0, [0x0]}}, 0x29) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)=@ll={0x11, 0xc, 0x0, 0x1, 0xfff, 0x6, @local}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000440)="2c9e90b16c13bc68e0a7081b4cd33ff33020fdbfc88b15ee2b5ccd2a7742ff4342cb36bd", 0x24}], 0x1}, 0x40001) r2 = getpid() sendto$inet(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, r2, 0x6, &(0x7f00000005c0)={0x27, 0x4}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000300)) [ 2077.473505] 8021q: adding VLAN 0 to HW filter on device team0 [ 2077.514136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2077.533796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 17:51:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2077.567798] bridge0: port 1(bridge_slave_0) entered blocking state [ 2077.574301] bridge0: port 1(bridge_slave_0) entered forwarding state 17:51:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2077.608863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2077.625657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 17:51:26 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r0, 0x4030ae7b, &(0x7f0000000180)) [ 2077.656119] bridge0: port 2(bridge_slave_1) entered blocking state [ 2077.662600] bridge0: port 2(bridge_slave_1) entered forwarding state 17:51:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00970000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2077.724762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 17:51:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2077.809819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2077.824286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2077.889915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2077.934835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2077.973508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2078.002529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2078.030490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2078.043407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2078.051256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2078.061270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2078.070379] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2078.106822] 8021q: adding VLAN 0 to HW filter on device batadv0 17:51:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:26 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r0, 0x4030ae7b, &(0x7f0000000180)) 17:51:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00f00000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:27 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd956fa283b724a600800000000000c41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881000000000000000000000000", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x87}}], 0xd5050c, 0x3a, &(0x7f0000000200)={0x77359400}) 17:51:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000a00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2078.560458] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 17:51:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) [ 2078.622731] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 17:51:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000e00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2078.684951] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2078.698480] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 17:51:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2078.763087] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2078.815964] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2078.838779] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2078.887717] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2078.932515] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2078.964736] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 17:51:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x2000006) 17:51:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r0, 0x4030ae7b, &(0x7f0000000180)) 17:51:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00c00e00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r0, 0x4030ae7b, &(0x7f0000000180)) 17:51:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) poll(0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 17:51:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000f00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r0, 0x4030ae7b, &(0x7f0000000180)) 17:51:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00003f00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) poll(0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 17:51:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00006000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00009700a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) poll(0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 17:51:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000ec000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:28 executing program 3: r0 = creat(&(0x7f0000000480)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfffffd66) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file2\x00') rmdir(&(0x7f0000000000)='./file1\x00') 17:51:29 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000f000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:29 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000200a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:29 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) restart_syscall() 17:51:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000400a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2081.357942] net_ratelimit: 34 callbacks suppressed [ 2081.357979] protocol 88fb is buggy, dev hsr_slave_0 [ 2081.368041] protocol 88fb is buggy, dev hsr_slave_1 [ 2081.373179] protocol 88fb is buggy, dev hsr_slave_0 [ 2081.378295] protocol 88fb is buggy, dev hsr_slave_1 [ 2081.383455] protocol 88fb is buggy, dev hsr_slave_0 [ 2081.388542] protocol 88fb is buggy, dev hsr_slave_1 17:51:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000800a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2081.598057] protocol 88fb is buggy, dev hsr_slave_0 [ 2081.603209] protocol 88fb is buggy, dev hsr_slave_1 17:51:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) close(r0) 17:51:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000a00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000e00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:30 executing program 3: unshare(0x24020400) mknod(&(0x7f0000000080)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, r2) fcntl$setsig(r0, 0xa, 0x12) openat(0xffffffffffffff9c, 0x0, 0x0, 0x2a) dup2(r0, r1) tkill(r2, 0x16) 17:51:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000f00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00001000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2082.488039] protocol 88fb is buggy, dev hsr_slave_0 [ 2082.493169] protocol 88fb is buggy, dev hsr_slave_1 17:51:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 3: 17:51:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000180)) 17:51:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00006000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 3: 17:51:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00009700a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 3: 17:51:32 executing program 3: 17:51:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000180)) 17:51:32 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000f000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:32 executing program 3: 17:51:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 3: 17:51:32 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000aa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 3: 17:51:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000180)) 17:51:32 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 3: 17:51:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:32 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:32 executing program 3: 17:51:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000c00ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:33 executing program 3: 17:51:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, 0x0) 17:51:33 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 3: 17:51:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:33 executing program 3: 17:51:33 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000003fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:33 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 3: 17:51:33 executing program 3: 17:51:33 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000060a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, 0x0) 17:51:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 3: [ 2085.118535] device bridge_slave_1 left promiscuous mode [ 2085.150175] bridge0: port 2(bridge_slave_1) entered disabled state 17:51:33 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 3: 17:51:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000097a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2085.194942] device bridge_slave_0 left promiscuous mode [ 2085.210057] bridge0: port 1(bridge_slave_0) entered disabled state 17:51:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:33 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000ec0a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:34 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:34 executing program 3: 17:51:34 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2086.638032] net_ratelimit: 24 callbacks suppressed [ 2086.638054] protocol 88fb is buggy, dev hsr_slave_0 [ 2086.648124] protocol 88fb is buggy, dev hsr_slave_1 [ 2086.797960] protocol 88fb is buggy, dev hsr_slave_0 [ 2086.803013] protocol 88fb is buggy, dev hsr_slave_1 [ 2087.277960] protocol 88fb is buggy, dev hsr_slave_0 [ 2087.283056] protocol 88fb is buggy, dev hsr_slave_1 [ 2087.598047] protocol 88fb is buggy, dev hsr_slave_0 [ 2087.603132] protocol 88fb is buggy, dev hsr_slave_1 [ 2087.608263] protocol 88fb is buggy, dev hsr_slave_0 [ 2087.613325] protocol 88fb is buggy, dev hsr_slave_1 [ 2088.440730] device hsr_slave_1 left promiscuous mode [ 2088.503514] device hsr_slave_0 left promiscuous mode [ 2088.562629] team0 (unregistering): Port device team_slave_1 removed [ 2088.573813] team0 (unregistering): Port device team_slave_0 removed [ 2088.586262] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2088.623570] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2088.706878] bond0 (unregistering): Released all slaves 17:51:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, 0x0) 17:51:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 3: 17:51:37 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f000000f0a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 17:51:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000002a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:37 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) write$cgroup_type(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) 17:51:37 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x400000002, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0'}, 0xb) 17:51:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 17:51:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000004a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:37 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 3: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0/file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x57}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:51:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:37 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000008a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:38 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:38 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:38 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0xeffdffff00000000, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000aa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:39 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2091.758164] net_ratelimit: 20 callbacks suppressed [ 2091.763181] protocol 88fb is buggy, dev hsr_slave_0 [ 2091.768198] protocol 88fb is buggy, dev hsr_slave_1 [ 2091.773250] protocol 88fb is buggy, dev hsr_slave_0 [ 2091.778273] protocol 88fb is buggy, dev hsr_slave_1 [ 2091.997950] protocol 88fb is buggy, dev hsr_slave_0 [ 2092.003115] protocol 88fb is buggy, dev hsr_slave_1 17:51:40 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:40 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:40 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:40 executing program 4 (fault-call:4 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:41 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:41 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2092.347875] FAULT_INJECTION: forcing a failure. [ 2092.347875] name failslab, interval 1, probability 0, space 0, times 0 [ 2092.425883] CPU: 0 PID: 14252 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2092.433212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2092.442564] Call Trace: [ 2092.445159] dump_stack+0x172/0x1f0 [ 2092.448815] should_fail.cold+0xa/0x1b [ 2092.452702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2092.457855] ? lock_downgrade+0x810/0x810 [ 2092.462018] ? ___might_sleep+0x163/0x280 [ 2092.466169] __should_failslab+0x121/0x190 [ 2092.470459] should_failslab+0x9/0x14 [ 2092.474303] __kmalloc+0x2dc/0x740 [ 2092.477856] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2092.483406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2092.483418] ? strnlen_user+0x1f0/0x280 [ 2092.483431] ? __x64_sys_memfd_create+0x13c/0x470 [ 2092.483454] __x64_sys_memfd_create+0x13c/0x470 [ 2092.502477] ? memfd_fcntl+0x1550/0x1550 [ 2092.506548] ? do_syscall_64+0x26/0x610 [ 2092.510533] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2092.515118] ? trace_hardirqs_on+0x67/0x230 [ 2092.519496] do_syscall_64+0x103/0x610 17:51:41 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2092.523385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2092.528569] RIP: 0033:0x457e39 [ 2092.531797] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2092.550708] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2092.550723] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 2092.550731] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 17:51:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f0000000fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)) 17:51:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2092.550756] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2092.550765] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9d4e4e6d4 [ 2092.550772] R13: 00000000004c6776 R14: 00000000004dbc38 R15: 0000000000000003 17:51:41 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:41 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:41 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000010a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:41 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x2, &(0x7f0000000180)) 17:51:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2092.796502] FAULT_INJECTION: forcing a failure. [ 2092.796502] name failslab, interval 1, probability 0, space 0, times 0 17:51:41 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2092.877971] protocol 88fb is buggy, dev hsr_slave_0 [ 2092.883032] protocol 88fb is buggy, dev hsr_slave_1 17:51:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000060a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x5421, &(0x7f0000000180)) [ 2092.963835] CPU: 0 PID: 14290 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2092.971133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2092.980482] Call Trace: [ 2092.983074] dump_stack+0x172/0x1f0 [ 2092.986704] should_fail.cold+0xa/0x1b [ 2092.990597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2092.995703] ? lock_downgrade+0x810/0x810 [ 2092.999899] ? ___might_sleep+0x163/0x280 [ 2093.004092] __should_failslab+0x121/0x190 [ 2093.008340] should_failslab+0x9/0x14 17:51:41 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2093.012161] kmem_cache_alloc+0x2be/0x710 [ 2093.016322] ? __alloc_fd+0x430/0x530 [ 2093.020129] ? shmem_destroy_callback+0xc0/0xc0 [ 2093.024834] shmem_alloc_inode+0x1c/0x50 [ 2093.028944] alloc_inode+0x66/0x190 [ 2093.032570] new_inode_pseudo+0x19/0xf0 [ 2093.036542] new_inode+0x1f/0x40 [ 2093.036555] shmem_get_inode+0x84/0x780 [ 2093.036572] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2093.036591] shmem_file_setup+0x66/0x90 [ 2093.040059] protocol 88fb is buggy, dev hsr_slave_0 [ 2093.043933] __x64_sys_memfd_create+0x2a2/0x470 17:51:41 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2093.048806] protocol 88fb is buggy, dev hsr_slave_1 [ 2093.052703] ? memfd_fcntl+0x1550/0x1550 [ 2093.052717] ? do_syscall_64+0x26/0x610 [ 2093.052729] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2093.080098] ? trace_hardirqs_on+0x67/0x230 [ 2093.084425] do_syscall_64+0x103/0x610 [ 2093.088385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2093.093574] RIP: 0033:0x457e39 [ 2093.093587] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2093.093593] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2093.093604] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 2093.093611] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 2093.093620] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2093.145164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9d4e4e6d4 [ 2093.152420] R13: 00000000004c6776 R14: 00000000004dbc38 R15: 0000000000000003 17:51:41 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:41 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:41 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000097a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:42 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x5450, &(0x7f0000000180)) 17:51:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2093.410837] FAULT_INJECTION: forcing a failure. [ 2093.410837] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.459940] CPU: 1 PID: 14346 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2093.467243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.467249] Call Trace: [ 2093.467269] dump_stack+0x172/0x1f0 [ 2093.467294] should_fail.cold+0xa/0x1b [ 2093.486751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2093.491850] ? lock_downgrade+0x810/0x810 [ 2093.496008] ? ___might_sleep+0x163/0x280 [ 2093.500171] __should_failslab+0x121/0x190 [ 2093.500187] should_failslab+0x9/0x14 [ 2093.500199] kmem_cache_alloc+0x2be/0x710 [ 2093.500212] ? current_time+0x6b/0x140 [ 2093.500237] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2093.500250] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2093.512402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2093.512432] ? timespec64_trunc+0xf0/0x180 [ 2093.521493] __d_alloc+0x2e/0x8c0 [ 2093.521513] d_alloc_pseudo+0x1e/0x30 [ 2093.521529] alloc_file_pseudo+0xe2/0x280 [ 2093.521545] ? alloc_file+0x4d0/0x4d0 [ 2093.521561] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2093.531657] ? kasan_check_write+0x14/0x20 [ 2093.531677] __shmem_file_setup.part.0+0x108/0x2b0 [ 2093.531695] shmem_file_setup+0x66/0x90 [ 2093.531715] __x64_sys_memfd_create+0x2a2/0x470 [ 2093.539397] ? memfd_fcntl+0x1550/0x1550 [ 2093.539428] ? do_syscall_64+0x26/0x610 [ 2093.539450] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2093.539465] ? trace_hardirqs_on+0x67/0x230 [ 2093.539480] do_syscall_64+0x103/0x610 [ 2093.560976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2093.560987] RIP: 0033:0x457e39 [ 2093.560999] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2093.561006] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2093.561017] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 2093.561025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 2093.561034] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2093.570172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9d4e4e6d4 17:51:42 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2093.570180] R13: 00000000004c6776 R14: 00000000004dbc38 R15: 0000000000000003 17:51:42 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5602ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:42 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x5451, &(0x7f0000000180)) 17:51:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2093.815338] FAULT_INJECTION: forcing a failure. [ 2093.815338] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.906919] CPU: 0 PID: 14374 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2093.914216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.914221] Call Trace: [ 2093.914242] dump_stack+0x172/0x1f0 [ 2093.914271] should_fail.cold+0xa/0x1b [ 2093.926214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2093.926228] ? lock_downgrade+0x810/0x810 [ 2093.926246] ? ___might_sleep+0x163/0x280 [ 2093.933756] __should_failslab+0x121/0x190 [ 2093.942981] should_failslab+0x9/0x14 [ 2093.942994] kmem_cache_alloc+0x2be/0x710 [ 2093.943014] __alloc_file+0x27/0x300 [ 2093.963034] alloc_empty_file+0x72/0x170 [ 2093.967105] alloc_file+0x5e/0x4d0 [ 2093.970643] alloc_file_pseudo+0x189/0x280 [ 2093.975008] ? alloc_file+0x4d0/0x4d0 [ 2093.978826] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2093.978841] ? kasan_check_write+0x14/0x20 [ 2093.978858] __shmem_file_setup.part.0+0x108/0x2b0 [ 2093.978875] shmem_file_setup+0x66/0x90 [ 2093.978892] __x64_sys_memfd_create+0x2a2/0x470 [ 2093.988667] ? memfd_fcntl+0x1550/0x1550 [ 2093.988681] ? do_syscall_64+0x26/0x610 [ 2093.988692] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2093.988705] ? trace_hardirqs_on+0x67/0x230 [ 2093.988720] do_syscall_64+0x103/0x610 [ 2093.988734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2094.028255] RIP: 0033:0x457e39 [ 2094.031478] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:51:42 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2094.050369] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2094.058067] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 2094.065356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 2094.072615] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2094.079874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9d4e4e6d4 [ 2094.087147] R13: 00000000004c6776 R14: 00000000004dbc38 R15: 0000000000000003 17:51:42 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x5452, &(0x7f0000000180)) 17:51:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5604ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:42 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:42 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5605ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x5460, &(0x7f0000000180)) [ 2094.348543] FAULT_INJECTION: forcing a failure. [ 2094.348543] name failslab, interval 1, probability 0, space 0, times 0 17:51:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2094.494772] CPU: 0 PID: 14416 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2094.502106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.511463] Call Trace: [ 2094.514052] dump_stack+0x172/0x1f0 [ 2094.517721] should_fail.cold+0xa/0x1b [ 2094.521634] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2094.526767] ? lock_downgrade+0x810/0x810 [ 2094.530921] ? ___might_sleep+0x163/0x280 [ 2094.535075] __should_failslab+0x121/0x190 [ 2094.539311] should_failslab+0x9/0x14 [ 2094.543121] kmem_cache_alloc_trace+0x2d1/0x760 [ 2094.547807] ? ___might_sleep+0x163/0x280 [ 2094.551955] ? __might_sleep+0x95/0x190 [ 2094.555946] apparmor_file_alloc_security+0x112/0x940 [ 2094.561203] security_file_alloc+0x69/0xb0 [ 2094.565961] __alloc_file+0xac/0x300 [ 2094.569711] alloc_empty_file+0x72/0x170 [ 2094.573807] alloc_file+0x5e/0x4d0 [ 2094.577361] alloc_file_pseudo+0x189/0x280 [ 2094.581619] ? alloc_file+0x4d0/0x4d0 [ 2094.585460] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2094.590997] ? kasan_check_write+0x14/0x20 17:51:43 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2094.595251] __shmem_file_setup.part.0+0x108/0x2b0 [ 2094.600230] shmem_file_setup+0x66/0x90 [ 2094.604204] __x64_sys_memfd_create+0x2a2/0x470 [ 2094.608905] ? memfd_fcntl+0x1550/0x1550 [ 2094.612981] ? do_syscall_64+0x26/0x610 [ 2094.612994] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2094.613007] ? trace_hardirqs_on+0x67/0x230 [ 2094.613020] do_syscall_64+0x103/0x610 [ 2094.621566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2094.621576] RIP: 0033:0x457e39 17:51:43 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2094.621588] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2094.621594] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2094.621605] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 2094.621612] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 2094.621618] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2094.621625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9d4e4e6d4 17:51:43 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2094.621632] R13: 00000000004c6776 R14: 00000000004dbc38 R15: 0000000000000003 17:51:43 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca02000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae03, &(0x7f0000000180)) 17:51:43 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2094.955191] FAULT_INJECTION: forcing a failure. [ 2094.955191] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.999390] CPU: 1 PID: 14477 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2095.006665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.016009] Call Trace: [ 2095.018610] dump_stack+0x172/0x1f0 [ 2095.022281] should_fail.cold+0xa/0x1b [ 2095.022304] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2095.022318] ? lock_downgrade+0x810/0x810 [ 2095.031293] ? ___might_sleep+0x163/0x280 [ 2095.031314] __should_failslab+0x121/0x190 [ 2095.031344] should_failslab+0x9/0x14 [ 2095.047628] kmem_cache_alloc+0x2be/0x710 [ 2095.051771] ? notify_change+0x6d5/0xfb0 [ 2095.055824] ? do_sys_ftruncate+0x41e/0x550 [ 2095.060158] getname_flags+0xd6/0x5b0 [ 2095.063954] getname+0x1a/0x20 [ 2095.067137] do_sys_open+0x2c9/0x5d0 [ 2095.070985] ? filp_open+0x80/0x80 [ 2095.074552] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2095.079335] ? do_syscall_64+0x26/0x610 [ 2095.083320] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2095.088690] ? do_syscall_64+0x26/0x610 [ 2095.092678] __x64_sys_open+0x7e/0xc0 [ 2095.096488] do_syscall_64+0x103/0x610 [ 2095.100373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2095.105563] RIP: 0033:0x411f21 [ 2095.108747] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2095.127668] RSP: 002b:00007fc9d4e4da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2095.135378] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 2095.142632] RDX: 00007fc9d4e4dafa RSI: 0000000000000002 RDI: 00007fc9d4e4daf0 17:51:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca04000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:43 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2095.149903] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2095.157193] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2095.164459] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae41, &(0x7f0000000180)) 17:51:44 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:44 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca08000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:44 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae44, &(0x7f0000000180)) 17:51:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca0a000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:44 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2095.502967] FAULT_INJECTION: forcing a failure. [ 2095.502967] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.604912] CPU: 1 PID: 14521 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2095.612201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.621717] Call Trace: [ 2095.624308] dump_stack+0x172/0x1f0 [ 2095.627969] should_fail.cold+0xa/0x1b [ 2095.631887] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2095.636985] ? lock_downgrade+0x810/0x810 [ 2095.641151] ? ___might_sleep+0x163/0x280 [ 2095.645318] __should_failslab+0x121/0x190 [ 2095.649553] should_failslab+0x9/0x14 [ 2095.653380] kmem_cache_alloc+0x2be/0x710 [ 2095.657521] ? notify_change+0x6d5/0xfb0 [ 2095.661582] ? do_sys_ftruncate+0x41e/0x550 [ 2095.665923] getname_flags+0xd6/0x5b0 [ 2095.669722] getname+0x1a/0x20 [ 2095.672930] do_sys_open+0x2c9/0x5d0 [ 2095.676660] ? filp_open+0x80/0x80 [ 2095.680200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2095.684950] ? do_syscall_64+0x26/0x610 [ 2095.688938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2095.694299] ? do_syscall_64+0x26/0x610 [ 2095.698304] __x64_sys_open+0x7e/0xc0 [ 2095.702103] do_syscall_64+0x103/0x610 [ 2095.706003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2095.711199] RIP: 0033:0x411f21 [ 2095.714386] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2095.733296] RSP: 002b:00007fc9d4e4da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2095.740997] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 2095.748279] RDX: 00007fc9d4e4dafa RSI: 0000000000000002 RDI: 00007fc9d4e4daf0 17:51:44 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2095.755545] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2095.762821] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2095.770097] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:44 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae45, &(0x7f0000000180)) 17:51:44 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:44 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca0e000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:44 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2096.036593] FAULT_INJECTION: forcing a failure. [ 2096.036593] name failslab, interval 1, probability 0, space 0, times 0 [ 2096.108111] CPU: 0 PID: 14564 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2096.115465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.124818] Call Trace: [ 2096.127451] dump_stack+0x172/0x1f0 [ 2096.131083] should_fail.cold+0xa/0x1b [ 2096.134967] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2096.140101] ? lock_downgrade+0x810/0x810 [ 2096.144251] ? ___might_sleep+0x163/0x280 [ 2096.148461] __should_failslab+0x121/0x190 [ 2096.152711] should_failslab+0x9/0x14 [ 2096.156506] kmem_cache_alloc+0x2be/0x710 [ 2096.160651] ? __save_stack_trace+0x8a/0xf0 [ 2096.164976] __alloc_file+0x27/0x300 [ 2096.168691] alloc_empty_file+0x72/0x170 [ 2096.172754] path_openat+0xef/0x4690 [ 2096.176468] ? __lock_acquire+0x53b/0x4700 [ 2096.180752] ? getname+0x1a/0x20 [ 2096.184133] ? do_sys_open+0x2c9/0x5d0 [ 2096.188028] ? __x64_sys_open+0x7e/0xc0 [ 2096.192004] ? do_syscall_64+0x103/0x610 [ 2096.196055] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2096.201445] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2096.206106] ? __lock_is_held+0xb6/0x140 [ 2096.210170] ? __alloc_fd+0x430/0x530 [ 2096.214011] do_filp_open+0x1a1/0x280 [ 2096.217858] ? may_open_dev+0x100/0x100 [ 2096.221874] ? lock_downgrade+0x810/0x810 [ 2096.226051] ? kasan_check_read+0x11/0x20 [ 2096.230200] ? do_raw_spin_unlock+0x57/0x270 [ 2096.234649] ? _raw_spin_unlock+0x2d/0x50 [ 2096.238829] ? __alloc_fd+0x430/0x530 [ 2096.242647] do_sys_open+0x3fe/0x5d0 [ 2096.246412] ? filp_open+0x80/0x80 [ 2096.249961] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2096.254751] ? do_syscall_64+0x26/0x610 [ 2096.258719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2096.264072] ? do_syscall_64+0x26/0x610 [ 2096.268138] __x64_sys_open+0x7e/0xc0 [ 2096.271953] do_syscall_64+0x103/0x610 [ 2096.275871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2096.281065] RIP: 0033:0x411f21 [ 2096.284280] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 17:51:44 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae47, &(0x7f0000000180)) [ 2096.303188] RSP: 002b:00007fc9d4e4da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2096.310920] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 2096.318197] RDX: 00007fc9d4e4dafa RSI: 0000000000000002 RDI: 00007fc9d4e4daf0 [ 2096.325506] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2096.332770] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2096.340034] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:45 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae60, &(0x7f0000000180)) 17:51:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca0f000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2096.604957] FAULT_INJECTION: forcing a failure. [ 2096.604957] name failslab, interval 1, probability 0, space 0, times 0 17:51:45 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2096.715800] CPU: 0 PID: 14597 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2096.723084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.732467] Call Trace: [ 2096.735078] dump_stack+0x172/0x1f0 [ 2096.738736] should_fail.cold+0xa/0x1b [ 2096.742627] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2096.747741] ? lock_downgrade+0x810/0x810 [ 2096.751886] ? ___might_sleep+0x163/0x280 [ 2096.756040] __should_failslab+0x121/0x190 [ 2096.760270] should_failslab+0x9/0x14 [ 2096.764060] kmem_cache_alloc_trace+0x2d1/0x760 [ 2096.768721] ? ___might_sleep+0x163/0x280 [ 2096.772860] ? __might_sleep+0x95/0x190 [ 2096.776855] apparmor_file_alloc_security+0x112/0x940 [ 2096.782039] security_file_alloc+0x69/0xb0 [ 2096.786273] __alloc_file+0xac/0x300 [ 2096.789997] alloc_empty_file+0x72/0x170 [ 2096.794070] path_openat+0xef/0x4690 [ 2096.797775] ? __lock_acquire+0x53b/0x4700 [ 2096.802021] ? getname+0x1a/0x20 [ 2096.805372] ? do_sys_open+0x2c9/0x5d0 [ 2096.809247] ? __x64_sys_open+0x7e/0xc0 [ 2096.813241] ? do_syscall_64+0x103/0x610 [ 2096.817293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2096.822674] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2096.827348] ? __lock_is_held+0xb6/0x140 [ 2096.831403] ? __alloc_fd+0x430/0x530 [ 2096.835217] do_filp_open+0x1a1/0x280 [ 2096.839010] ? may_open_dev+0x100/0x100 [ 2096.842973] ? lock_downgrade+0x810/0x810 [ 2096.847113] ? kasan_check_read+0x11/0x20 [ 2096.851270] ? do_raw_spin_unlock+0x57/0x270 [ 2096.855705] ? _raw_spin_unlock+0x2d/0x50 [ 2096.859869] ? __alloc_fd+0x430/0x530 [ 2096.863747] do_sys_open+0x3fe/0x5d0 [ 2096.867460] ? filp_open+0x80/0x80 [ 2096.870996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2096.875757] ? do_syscall_64+0x26/0x610 [ 2096.879722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2096.885073] ? do_syscall_64+0x26/0x610 [ 2096.889058] __x64_sys_open+0x7e/0xc0 [ 2096.892867] do_syscall_64+0x103/0x610 [ 2096.896768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2096.901949] RIP: 0033:0x411f21 [ 2096.905145] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2096.924035] RSP: 002b:00007fc9d4e4da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2096.931748] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 2096.939007] RDX: 00007fc9d4e4dafa RSI: 0000000000000002 RDI: 00007fc9d4e4daf0 [ 2096.946272] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2096.953542] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 17:51:45 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2096.960816] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae64, &(0x7f0000000180)) [ 2097.038001] net_ratelimit: 20 callbacks suppressed [ 2097.038007] protocol 88fb is buggy, dev hsr_slave_0 [ 2097.048101] protocol 88fb is buggy, dev hsr_slave_1 17:51:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca10000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2097.198023] protocol 88fb is buggy, dev hsr_slave_0 [ 2097.203120] protocol 88fb is buggy, dev hsr_slave_1 17:51:45 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca60000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae71, &(0x7f0000000180)) 17:51:46 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2097.393809] FAULT_INJECTION: forcing a failure. [ 2097.393809] name failslab, interval 1, probability 0, space 0, times 0 [ 2097.417629] CPU: 1 PID: 14658 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2097.424925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.434271] Call Trace: [ 2097.436866] dump_stack+0x172/0x1f0 [ 2097.440536] should_fail.cold+0xa/0x1b [ 2097.444419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2097.449523] ? lock_downgrade+0x810/0x810 [ 2097.453666] ? ___might_sleep+0x163/0x280 [ 2097.457812] __should_failslab+0x121/0x190 [ 2097.462059] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2097.466828] should_failslab+0x9/0x14 [ 2097.470622] kmem_cache_alloc_trace+0x2d1/0x760 [ 2097.475320] ? lockdep_init_map+0x10c/0x5b0 [ 2097.479661] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2097.484410] __kthread_create_on_node+0xf2/0x460 [ 2097.489200] ? lock_acquire+0x16f/0x3f0 [ 2097.493171] ? kthread_parkme+0xb0/0xb0 [ 2097.497189] ? mutex_trylock+0x1e0/0x1e0 [ 2097.501278] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2097.506036] kthread_create_on_node+0xbb/0xf0 [ 2097.510528] ? __kthread_create_on_node+0x460/0x460 [ 2097.515542] ? lockdep_init_map+0x10c/0x5b0 [ 2097.519859] ? lockdep_init_map+0x10c/0x5b0 [ 2097.524184] lo_ioctl+0xafb/0x20d0 [ 2097.527731] ? lo_rw_aio+0x1530/0x1530 [ 2097.531660] blkdev_ioctl+0xee8/0x1c40 [ 2097.535563] ? blkpg_ioctl+0xa90/0xa90 [ 2097.539453] ? find_held_lock+0x35/0x130 [ 2097.543512] ? debug_check_no_obj_freed+0x200/0x464 [ 2097.548527] ? kasan_check_read+0x11/0x20 [ 2097.552671] ? __fget+0x340/0x540 [ 2097.556125] ? find_held_lock+0x35/0x130 [ 2097.560179] ? __fget+0x340/0x540 [ 2097.563633] block_ioctl+0xee/0x130 [ 2097.567251] ? blkdev_fallocate+0x410/0x410 [ 2097.571567] do_vfs_ioctl+0xd6e/0x1390 [ 2097.575477] ? ioctl_preallocate+0x210/0x210 [ 2097.579889] ? __fget+0x367/0x540 [ 2097.583343] ? iterate_fd+0x360/0x360 [ 2097.587155] ? do_sys_open+0x31d/0x5d0 [ 2097.591048] ? security_file_ioctl+0x93/0xc0 [ 2097.595473] ksys_ioctl+0xab/0xd0 [ 2097.598936] __x64_sys_ioctl+0x73/0xb0 [ 2097.602820] do_syscall_64+0x103/0x610 [ 2097.606705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2097.611896] RIP: 0033:0x457ca7 [ 2097.615101] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2097.634007] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:51:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:46 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2097.641704] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2097.649001] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2097.656291] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2097.663567] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2097.670961] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2097.678615] protocol 88fb is buggy, dev hsr_slave_0 [ 2097.683678] protocol 88fb is buggy, dev hsr_slave_1 17:51:46 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:46 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xae78, &(0x7f0000000180)) 17:51:46 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca97000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2097.871118] FAULT_INJECTION: forcing a failure. [ 2097.871118] name failslab, interval 1, probability 0, space 0, times 0 17:51:46 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x11}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:46 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2097.913776] CPU: 1 PID: 14684 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2097.921070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.930415] Call Trace: [ 2097.933036] dump_stack+0x172/0x1f0 [ 2097.936691] should_fail.cold+0xa/0x1b [ 2097.940564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2097.945658] ? lock_downgrade+0x810/0x810 [ 2097.949788] ? ___might_sleep+0x163/0x280 [ 2097.953942] __should_failslab+0x121/0x190 [ 2097.958173] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2097.962936] should_failslab+0x9/0x14 [ 2097.966730] kmem_cache_alloc_trace+0x2d1/0x760 [ 2097.971390] ? lockdep_init_map+0x10c/0x5b0 [ 2097.975711] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2097.980465] __kthread_create_on_node+0xf2/0x460 [ 2097.985197] ? lock_acquire+0x16f/0x3f0 [ 2097.989148] ? kthread_parkme+0xb0/0xb0 [ 2097.993126] ? mutex_trylock+0x1e0/0x1e0 [ 2097.997193] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2098.001961] kthread_create_on_node+0xbb/0xf0 [ 2098.006448] ? __kthread_create_on_node+0x460/0x460 [ 2098.011448] ? lockdep_init_map+0x10c/0x5b0 [ 2098.015747] ? lockdep_init_map+0x10c/0x5b0 [ 2098.020061] lo_ioctl+0xafb/0x20d0 [ 2098.023595] ? lo_rw_aio+0x1530/0x1530 [ 2098.027462] blkdev_ioctl+0xee8/0x1c40 [ 2098.031326] ? blkpg_ioctl+0xa90/0xa90 [ 2098.035193] ? find_held_lock+0x35/0x130 [ 2098.039229] ? debug_check_no_obj_freed+0x200/0x464 [ 2098.044226] ? kasan_check_read+0x11/0x20 [ 2098.048392] ? __fget+0x340/0x540 [ 2098.051835] ? find_held_lock+0x35/0x130 [ 2098.055871] ? __fget+0x340/0x540 [ 2098.059330] block_ioctl+0xee/0x130 [ 2098.062942] ? blkdev_fallocate+0x410/0x410 [ 2098.067241] do_vfs_ioctl+0xd6e/0x1390 [ 2098.071106] ? ioctl_preallocate+0x210/0x210 [ 2098.075509] ? __fget+0x367/0x540 [ 2098.078988] ? iterate_fd+0x360/0x360 [ 2098.082771] ? do_sys_open+0x31d/0x5d0 [ 2098.086658] ? security_file_ioctl+0x93/0xc0 [ 2098.091099] ksys_ioctl+0xab/0xd0 [ 2098.094531] __x64_sys_ioctl+0x73/0xb0 [ 2098.098414] do_syscall_64+0x103/0x610 [ 2098.102309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2098.107486] RIP: 0033:0x457ca7 [ 2098.110654] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2098.129556] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2098.137252] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2098.144526] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2098.151776] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 17:51:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2098.159057] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2098.166322] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2098.178034] protocol 88fb is buggy, dev hsr_slave_0 [ 2098.183131] protocol 88fb is buggy, dev hsr_slave_1 [ 2098.188297] protocol 88fb is buggy, dev hsr_slave_0 [ 2098.193366] protocol 88fb is buggy, dev hsr_slave_1 17:51:46 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x40049409, &(0x7f0000000180)) 17:51:47 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2098.359647] FAULT_INJECTION: forcing a failure. [ 2098.359647] name failslab, interval 1, probability 0, space 0, times 0 [ 2098.371593] CPU: 0 PID: 14711 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2098.378880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2098.388259] Call Trace: [ 2098.390886] dump_stack+0x172/0x1f0 [ 2098.394622] should_fail.cold+0xa/0x1b [ 2098.398514] ? kernel_text_address+0x73/0xf0 [ 2098.398529] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2098.398542] ? unwind_get_return_address+0x61/0xa0 [ 2098.398556] ? __save_stack_trace+0x8a/0xf0 [ 2098.398575] __should_failslab+0x121/0x190 [ 2098.398590] should_failslab+0x9/0x14 [ 2098.398602] kmem_cache_alloc+0x47/0x710 [ 2098.398628] ? save_stack+0xa9/0xd0 [ 2098.408109] ? save_stack+0x45/0xd0 [ 2098.408121] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2098.408131] ? kasan_slab_alloc+0xf/0x20 [ 2098.408147] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2098.408162] idr_get_free+0x425/0x8d0 [ 2098.408182] idr_alloc_u32+0x19e/0x330 [ 2098.417496] ? __fprop_inc_percpu_max+0x230/0x230 [ 2098.417515] ? __lock_is_held+0xb6/0x140 [ 2098.417530] ? check_preemption_disabled+0x48/0x290 [ 2098.425606] idr_alloc_cyclic+0x132/0x270 [ 2098.425625] ? idr_alloc+0x150/0x150 [ 2098.425651] __kernfs_new_node+0x171/0x690 [ 2098.459458] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2098.459471] ? __lock_acquire+0x53b/0x4700 [ 2098.459486] ? __lock_is_held+0xb6/0x140 [ 2098.468397] kernfs_new_node+0x99/0x130 [ 2098.468414] kernfs_create_dir_ns+0x52/0x160 [ 2098.468432] internal_create_group+0x7f8/0xc40 [ 2098.468453] ? bd_set_size+0x89/0xb0 [ 2098.468473] ? remove_files.isra.0+0x190/0x190 [ 2098.468495] sysfs_create_group+0x20/0x30 [ 2098.523969] lo_ioctl+0xf8f/0x20d0 [ 2098.527503] ? lo_rw_aio+0x1530/0x1530 [ 2098.531381] blkdev_ioctl+0xee8/0x1c40 [ 2098.535278] ? blkpg_ioctl+0xa90/0xa90 [ 2098.539174] ? find_held_lock+0x35/0x130 [ 2098.543236] ? debug_check_no_obj_freed+0x200/0x464 [ 2098.548264] ? kasan_check_read+0x11/0x20 [ 2098.552404] ? __fget+0x340/0x540 [ 2098.555878] ? find_held_lock+0x35/0x130 [ 2098.559973] ? __fget+0x340/0x540 [ 2098.563940] block_ioctl+0xee/0x130 [ 2098.567562] ? blkdev_fallocate+0x410/0x410 [ 2098.571897] do_vfs_ioctl+0xd6e/0x1390 [ 2098.575780] ? ioctl_preallocate+0x210/0x210 [ 2098.580231] ? __fget+0x367/0x540 [ 2098.583691] ? iterate_fd+0x360/0x360 [ 2098.587510] ? do_sys_open+0x31d/0x5d0 [ 2098.591410] ? security_file_ioctl+0x93/0xc0 [ 2098.595820] ksys_ioctl+0xab/0xd0 [ 2098.599286] __x64_sys_ioctl+0x73/0xb0 [ 2098.603166] do_syscall_64+0x103/0x610 [ 2098.607054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2098.612236] RIP: 0033:0x457ca7 [ 2098.615422] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2098.634319] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2098.642039] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2098.649369] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:51:47 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2098.656624] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2098.663898] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2098.671175] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4008ae48, &(0x7f0000000180)) 17:51:47 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2098.758307] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603caf0000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:47 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa00}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:47 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4008ae61, &(0x7f0000000180)) 17:51:47 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:47 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1100}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca000a0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:47 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2099.107741] FAULT_INJECTION: forcing a failure. [ 2099.107741] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.142569] CPU: 1 PID: 14768 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2099.149853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2099.159199] Call Trace: [ 2099.161782] dump_stack+0x172/0x1f0 [ 2099.165407] should_fail.cold+0xa/0x1b [ 2099.169330] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2099.174467] ? lock_downgrade+0x810/0x810 [ 2099.178626] ? ___might_sleep+0x163/0x280 [ 2099.182771] __should_failslab+0x121/0x190 [ 2099.187008] should_failslab+0x9/0x14 [ 2099.190820] kmem_cache_alloc+0x2be/0x710 [ 2099.194967] ? find_held_lock+0x35/0x130 [ 2099.199017] ? kernfs_activate+0x192/0x1f0 [ 2099.203250] __kernfs_new_node+0xef/0x690 [ 2099.207406] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2099.212149] ? lock_downgrade+0x810/0x810 [ 2099.216292] ? kasan_check_write+0x14/0x20 [ 2099.220551] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2099.225391] ? wait_for_completion+0x440/0x440 [ 2099.229972] kernfs_new_node+0x99/0x130 [ 2099.233956] __kernfs_create_file+0x51/0x340 [ 2099.238366] sysfs_add_file_mode_ns+0x222/0x560 [ 2099.243035] internal_create_group+0x35b/0xc40 [ 2099.247613] ? bd_set_size+0x89/0xb0 [ 2099.251338] ? remove_files.isra.0+0x190/0x190 [ 2099.255918] sysfs_create_group+0x20/0x30 [ 2099.260057] lo_ioctl+0xf8f/0x20d0 [ 2099.263588] ? lo_rw_aio+0x1530/0x1530 [ 2099.267470] blkdev_ioctl+0xee8/0x1c40 [ 2099.271389] ? blkpg_ioctl+0xa90/0xa90 [ 2099.275268] ? find_held_lock+0x35/0x130 [ 2099.279380] ? zap_class+0x460/0x460 [ 2099.283084] ? kasan_check_read+0x11/0x20 [ 2099.287233] ? __fget+0x340/0x540 [ 2099.290684] ? find_held_lock+0x35/0x130 [ 2099.294745] ? __fget+0x340/0x540 [ 2099.298214] block_ioctl+0xee/0x130 [ 2099.301847] ? blkdev_fallocate+0x410/0x410 [ 2099.306182] do_vfs_ioctl+0xd6e/0x1390 [ 2099.310108] ? ioctl_preallocate+0x210/0x210 [ 2099.314521] ? __fget+0x367/0x540 [ 2099.317974] ? iterate_fd+0x360/0x360 [ 2099.321783] ? do_sys_open+0x31d/0x5d0 [ 2099.325690] ? security_file_ioctl+0x93/0xc0 [ 2099.330112] ksys_ioctl+0xab/0xd0 [ 2099.333559] __x64_sys_ioctl+0x73/0xb0 [ 2099.337463] do_syscall_64+0x103/0x610 [ 2099.341351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2099.346529] RIP: 0033:0x457ca7 [ 2099.349741] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2099.368629] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2099.376329] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2099.383606] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2099.390864] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2099.398118] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:51:48 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3e80}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca000e0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:48 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2099.405390] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2099.494525] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4008ae6a, &(0x7f0000000180)) 17:51:48 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3ec0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603cac00e0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:48 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3f00}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca000f0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2099.829283] FAULT_INJECTION: forcing a failure. [ 2099.829283] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.840689] CPU: 0 PID: 14821 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2099.847958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2099.857303] Call Trace: [ 2099.859908] dump_stack+0x172/0x1f0 [ 2099.863558] should_fail.cold+0xa/0x1b [ 2099.867456] ? kernel_text_address+0x73/0xf0 [ 2099.871859] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2099.876950] ? __lock_is_held+0xb6/0x140 [ 2099.881016] ? check_preemption_disabled+0x48/0x290 [ 2099.886030] __should_failslab+0x121/0x190 [ 2099.890256] should_failslab+0x9/0x14 [ 2099.894048] kmem_cache_alloc+0x47/0x710 [ 2099.898097] ? save_stack+0xa9/0xd0 [ 2099.901711] ? save_stack+0x45/0xd0 [ 2099.905327] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2099.910485] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2099.916128] idr_get_free+0x425/0x8d0 [ 2099.919939] idr_alloc_u32+0x19e/0x330 [ 2099.923819] ? __fprop_inc_percpu_max+0x230/0x230 [ 2099.928658] ? __lock_is_held+0xb6/0x140 [ 2099.932710] ? check_preemption_disabled+0x48/0x290 [ 2099.937718] idr_alloc_cyclic+0x132/0x270 [ 2099.941861] ? idr_alloc+0x150/0x150 [ 2099.945607] __kernfs_new_node+0x171/0x690 [ 2099.949897] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2099.954658] ? __lock_acquire+0x53b/0x4700 [ 2099.958882] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2099.963370] ? __schedule+0x1387/0x1cc0 [ 2099.967342] kernfs_new_node+0x99/0x130 [ 2099.971350] kernfs_create_dir_ns+0x52/0x160 [ 2099.975804] internal_create_group+0x7f8/0xc40 [ 2099.980375] ? bd_set_size+0x89/0xb0 [ 2099.984090] ? remove_files.isra.0+0x190/0x190 [ 2099.988675] sysfs_create_group+0x20/0x30 [ 2099.992852] lo_ioctl+0xf8f/0x20d0 [ 2099.996402] ? lo_rw_aio+0x1530/0x1530 [ 2100.000293] blkdev_ioctl+0xee8/0x1c40 [ 2100.004171] ? blkpg_ioctl+0xa90/0xa90 [ 2100.008047] ? find_held_lock+0x35/0x130 [ 2100.012113] ? debug_check_no_obj_freed+0x200/0x464 [ 2100.017169] ? kasan_check_read+0x11/0x20 [ 2100.021341] ? __fget+0x340/0x540 [ 2100.024812] ? find_held_lock+0x35/0x130 [ 2100.028863] ? __fget+0x340/0x540 [ 2100.032306] block_ioctl+0xee/0x130 [ 2100.035923] ? blkdev_fallocate+0x410/0x410 [ 2100.040251] do_vfs_ioctl+0xd6e/0x1390 [ 2100.044128] ? ioctl_preallocate+0x210/0x210 [ 2100.048529] ? __fget+0x367/0x540 [ 2100.051992] ? iterate_fd+0x360/0x360 [ 2100.055806] ? do_sys_open+0x31d/0x5d0 [ 2100.059690] ? security_file_ioctl+0x93/0xc0 [ 2100.064100] ksys_ioctl+0xab/0xd0 [ 2100.067564] __x64_sys_ioctl+0x73/0xb0 [ 2100.071450] do_syscall_64+0x103/0x610 [ 2100.075332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2100.080521] RIP: 0033:0x457ca7 [ 2100.083710] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2100.102633] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2100.110333] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2100.117620] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2100.124884] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2100.132159] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2100.139464] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:48 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4010ae42, &(0x7f0000000180)) 17:51:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2100.191050] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:49 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:49 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca003f0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:49 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2100.405132] FAULT_INJECTION: forcing a failure. [ 2100.405132] name failslab, interval 1, probability 0, space 0, times 0 [ 2100.430597] CPU: 1 PID: 14862 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2100.437877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2100.447224] Call Trace: [ 2100.449812] dump_stack+0x172/0x1f0 [ 2100.453455] should_fail.cold+0xa/0x1b [ 2100.457356] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2100.462466] ? lock_downgrade+0x810/0x810 [ 2100.466615] ? ___might_sleep+0x163/0x280 [ 2100.470762] __should_failslab+0x121/0x190 [ 2100.474997] should_failslab+0x9/0x14 [ 2100.478789] kmem_cache_alloc+0x2be/0x710 [ 2100.482940] ? lock_downgrade+0x810/0x810 [ 2100.487131] ? kasan_check_read+0x11/0x20 [ 2100.491326] __kernfs_new_node+0xef/0x690 [ 2100.495509] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2100.500271] ? wait_for_completion+0x440/0x440 [ 2100.504854] ? mutex_unlock+0xd/0x10 [ 2100.508555] ? kernfs_activate+0x192/0x1f0 [ 2100.512783] kernfs_new_node+0x99/0x130 [ 2100.516762] __kernfs_create_file+0x51/0x340 [ 2100.521199] sysfs_add_file_mode_ns+0x222/0x560 [ 2100.525865] internal_create_group+0x35b/0xc40 [ 2100.530454] ? bd_set_size+0x89/0xb0 [ 2100.534194] ? remove_files.isra.0+0x190/0x190 [ 2100.538779] sysfs_create_group+0x20/0x30 [ 2100.542933] lo_ioctl+0xf8f/0x20d0 [ 2100.546482] ? lo_rw_aio+0x1530/0x1530 [ 2100.550361] blkdev_ioctl+0xee8/0x1c40 [ 2100.554254] ? blkpg_ioctl+0xa90/0xa90 [ 2100.558131] ? find_held_lock+0x35/0x130 [ 2100.562431] ? debug_check_no_obj_freed+0x200/0x464 [ 2100.567454] ? kasan_check_read+0x11/0x20 [ 2100.571607] ? __fget+0x340/0x540 [ 2100.575071] ? find_held_lock+0x35/0x130 [ 2100.579127] ? __fget+0x340/0x540 [ 2100.582588] block_ioctl+0xee/0x130 [ 2100.586202] ? blkdev_fallocate+0x410/0x410 [ 2100.590529] do_vfs_ioctl+0xd6e/0x1390 [ 2100.594408] ? ioctl_preallocate+0x210/0x210 [ 2100.598811] ? __fget+0x367/0x540 [ 2100.602256] ? iterate_fd+0x360/0x360 [ 2100.606045] ? do_sys_open+0x31d/0x5d0 [ 2100.609930] ? security_file_ioctl+0x93/0xc0 [ 2100.614343] ksys_ioctl+0xab/0xd0 [ 2100.617827] __x64_sys_ioctl+0x73/0xb0 [ 2100.621714] do_syscall_64+0x103/0x610 [ 2100.625598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2100.630791] RIP: 0033:0x457ca7 [ 2100.634021] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:51:49 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2100.652936] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2100.660633] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2100.667890] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2100.675179] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2100.682469] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2100.689727] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00600f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2100.758325] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:49 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x33fe0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4010ae67, &(0x7f0000000180)) 17:51:49 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00970f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2101.028256] FAULT_INJECTION: forcing a failure. [ 2101.028256] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.053878] CPU: 0 PID: 14904 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2101.061156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2101.061162] Call Trace: [ 2101.061200] dump_stack+0x172/0x1f0 [ 2101.061222] should_fail.cold+0xa/0x1b [ 2101.061247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2101.073180] ? lock_downgrade+0x810/0x810 [ 2101.073195] ? ___might_sleep+0x163/0x280 [ 2101.073214] __should_failslab+0x121/0x190 [ 2101.094123] should_failslab+0x9/0x14 [ 2101.094138] kmem_cache_alloc+0x2be/0x710 [ 2101.094154] ? lock_downgrade+0x810/0x810 [ 2101.110481] ? kasan_check_read+0x11/0x20 [ 2101.114643] __kernfs_new_node+0xef/0x690 [ 2101.118796] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2101.123568] ? wait_for_completion+0x440/0x440 [ 2101.128187] ? mutex_unlock+0xd/0x10 [ 2101.131911] ? kernfs_activate+0x192/0x1f0 [ 2101.136146] kernfs_new_node+0x99/0x130 [ 2101.140121] __kernfs_create_file+0x51/0x340 [ 2101.144528] sysfs_add_file_mode_ns+0x222/0x560 [ 2101.149199] internal_create_group+0x35b/0xc40 [ 2101.153783] ? bd_set_size+0x89/0xb0 [ 2101.157505] ? remove_files.isra.0+0x190/0x190 [ 2101.162126] sysfs_create_group+0x20/0x30 [ 2101.166286] lo_ioctl+0xf8f/0x20d0 [ 2101.169856] ? lo_rw_aio+0x1530/0x1530 [ 2101.173754] blkdev_ioctl+0xee8/0x1c40 [ 2101.177638] ? blkpg_ioctl+0xa90/0xa90 [ 2101.181525] ? find_held_lock+0x35/0x130 [ 2101.185584] ? debug_check_no_obj_freed+0x200/0x464 [ 2101.190601] ? kasan_check_read+0x11/0x20 [ 2101.194760] ? __fget+0x340/0x540 [ 2101.198243] ? find_held_lock+0x35/0x130 [ 2101.202357] ? __fget+0x340/0x540 [ 2101.205808] block_ioctl+0xee/0x130 [ 2101.209458] ? blkdev_fallocate+0x410/0x410 [ 2101.213780] do_vfs_ioctl+0xd6e/0x1390 [ 2101.217668] ? ioctl_preallocate+0x210/0x210 [ 2101.222068] ? __fget+0x367/0x540 [ 2101.225523] ? iterate_fd+0x360/0x360 [ 2101.229324] ? do_sys_open+0x31d/0x5d0 [ 2101.233227] ? security_file_ioctl+0x93/0xc0 [ 2101.237629] ksys_ioctl+0xab/0xd0 [ 2101.241096] __x64_sys_ioctl+0x73/0xb0 [ 2101.245057] do_syscall_64+0x103/0x610 [ 2101.248959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2101.254158] RIP: 0033:0x457ca7 [ 2101.257347] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:51:49 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x34000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2101.276237] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2101.283936] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2101.291212] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2101.298507] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2101.305765] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2101.313029] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:50 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4010ae68, &(0x7f0000000180)) 17:51:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca0ec00f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2101.420444] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:50 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:50 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x400300}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2101.586681] FAULT_INJECTION: forcing a failure. [ 2101.586681] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.607473] CPU: 0 PID: 14947 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2101.614748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2101.624103] Call Trace: [ 2101.626711] dump_stack+0x172/0x1f0 [ 2101.630366] should_fail.cold+0xa/0x1b 17:51:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4018aebd, &(0x7f0000000180)) [ 2101.634257] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2101.639361] ? lock_downgrade+0x810/0x810 [ 2101.643508] ? ___might_sleep+0x163/0x280 [ 2101.647688] __should_failslab+0x121/0x190 [ 2101.651938] should_failslab+0x9/0x14 [ 2101.655743] kmem_cache_alloc+0x2be/0x710 [ 2101.659883] ? lock_downgrade+0x810/0x810 [ 2101.664019] ? kasan_check_read+0x11/0x20 [ 2101.668185] __kernfs_new_node+0xef/0x690 [ 2101.672327] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2101.677086] ? wait_for_completion+0x440/0x440 [ 2101.681679] ? mutex_unlock+0xd/0x10 [ 2101.685377] ? kernfs_activate+0x192/0x1f0 [ 2101.689589] kernfs_new_node+0x99/0x130 [ 2101.693543] __kernfs_create_file+0x51/0x340 [ 2101.697943] sysfs_add_file_mode_ns+0x222/0x560 [ 2101.702613] internal_create_group+0x35b/0xc40 [ 2101.707179] ? bd_set_size+0x89/0xb0 [ 2101.710871] ? remove_files.isra.0+0x190/0x190 [ 2101.715441] sysfs_create_group+0x20/0x30 [ 2101.719600] lo_ioctl+0xf8f/0x20d0 [ 2101.723156] ? lo_rw_aio+0x1530/0x1530 [ 2101.727046] blkdev_ioctl+0xee8/0x1c40 [ 2101.730940] ? blkpg_ioctl+0xa90/0xa90 [ 2101.734806] ? find_held_lock+0x35/0x130 [ 2101.738857] ? debug_check_no_obj_freed+0x200/0x464 [ 2101.743863] ? kasan_check_read+0x11/0x20 [ 2101.748002] ? __fget+0x340/0x540 [ 2101.751443] ? find_held_lock+0x35/0x130 [ 2101.755483] ? __fget+0x340/0x540 [ 2101.758922] block_ioctl+0xee/0x130 [ 2101.762567] ? blkdev_fallocate+0x410/0x410 [ 2101.766873] do_vfs_ioctl+0xd6e/0x1390 [ 2101.770745] ? ioctl_preallocate+0x210/0x210 [ 2101.775142] ? __fget+0x367/0x540 [ 2101.778609] ? iterate_fd+0x360/0x360 [ 2101.782429] ? do_sys_open+0x31d/0x5d0 [ 2101.786330] ? security_file_ioctl+0x93/0xc0 [ 2101.790727] ksys_ioctl+0xab/0xd0 [ 2101.794171] __x64_sys_ioctl+0x73/0xb0 [ 2101.798053] do_syscall_64+0x103/0x610 [ 2101.801951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2101.807126] RIP: 0033:0x457ca7 [ 2101.810310] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2101.829188] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2101.836878] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2101.844128] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2101.851374] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2101.858640] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2101.865892] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00f00f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2101.899361] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:50 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x11}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4020940d, &(0x7f0000000180)) 17:51:50 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00020f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:50 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2102.179656] FAULT_INJECTION: forcing a failure. [ 2102.179656] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.217181] CPU: 1 PID: 14985 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2102.224498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2102.224519] Call Trace: [ 2102.224557] dump_stack+0x172/0x1f0 [ 2102.224579] should_fail.cold+0xa/0x1b [ 2102.244026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2102.249126] ? lock_downgrade+0x810/0x810 [ 2102.249142] ? ___might_sleep+0x163/0x280 [ 2102.249162] __should_failslab+0x121/0x190 [ 2102.249177] should_failslab+0x9/0x14 [ 2102.257443] kmem_cache_alloc+0x2be/0x710 [ 2102.257458] ? lock_downgrade+0x810/0x810 [ 2102.257470] ? kasan_check_read+0x11/0x20 [ 2102.257491] __kernfs_new_node+0xef/0x690 [ 2102.257507] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2102.265509] ? wait_for_completion+0x440/0x440 [ 2102.265546] ? mutex_unlock+0xd/0x10 [ 2102.265557] ? kernfs_activate+0x192/0x1f0 [ 2102.265572] kernfs_new_node+0x99/0x130 [ 2102.303331] __kernfs_create_file+0x51/0x340 [ 2102.307736] sysfs_add_file_mode_ns+0x222/0x560 [ 2102.312414] internal_create_group+0x35b/0xc40 [ 2102.317015] ? bd_set_size+0x89/0xb0 [ 2102.320745] ? remove_files.isra.0+0x190/0x190 [ 2102.325332] sysfs_create_group+0x20/0x30 [ 2102.329481] lo_ioctl+0xf8f/0x20d0 [ 2102.333020] ? lo_rw_aio+0x1530/0x1530 [ 2102.336913] blkdev_ioctl+0xee8/0x1c40 [ 2102.340795] ? blkpg_ioctl+0xa90/0xa90 [ 2102.344708] ? find_held_lock+0x35/0x130 [ 2102.348768] ? debug_check_no_obj_freed+0x200/0x464 [ 2102.353778] ? kasan_check_read+0x11/0x20 [ 2102.357917] ? __fget+0x340/0x540 [ 2102.361367] ? find_held_lock+0x35/0x130 [ 2102.365425] ? __fget+0x340/0x540 [ 2102.368902] block_ioctl+0xee/0x130 [ 2102.372550] ? blkdev_fallocate+0x410/0x410 [ 2102.376868] do_vfs_ioctl+0xd6e/0x1390 [ 2102.380764] ? ioctl_preallocate+0x210/0x210 [ 2102.385169] ? __fget+0x367/0x540 [ 2102.388626] ? iterate_fd+0x360/0x360 [ 2102.392446] ? do_sys_open+0x31d/0x5d0 [ 2102.396335] ? security_file_ioctl+0x93/0xc0 [ 2102.400740] ksys_ioctl+0xab/0xd0 [ 2102.404189] __x64_sys_ioctl+0x73/0xb0 [ 2102.408073] do_syscall_64+0x103/0x610 [ 2102.411971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.417158] RIP: 0033:0x457ca7 [ 2102.420347] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2102.439237] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2102.446940] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2102.454219] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2102.461480] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2102.468758] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2102.476018] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2102.483588] net_ratelimit: 20 callbacks suppressed [ 2102.483595] protocol 88fb is buggy, dev hsr_slave_0 [ 2102.488006] protocol 88fb is buggy, dev hsr_slave_0 [ 2102.488627] protocol 88fb is buggy, dev hsr_slave_1 [ 2102.493610] protocol 88fb is buggy, dev hsr_slave_1 [ 2102.508711] protocol 88fb is buggy, dev hsr_slave_0 [ 2102.513766] protocol 88fb is buggy, dev hsr_slave_1 17:51:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4020ae46, &(0x7f0000000180)) [ 2102.544291] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:51 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa00}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:51 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x11000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:51 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00040f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2102.761361] FAULT_INJECTION: forcing a failure. [ 2102.761361] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.788446] CPU: 1 PID: 15024 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2102.795726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2102.805073] Call Trace: [ 2102.807674] dump_stack+0x172/0x1f0 17:51:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4020ae76, &(0x7f0000000180)) 17:51:51 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3f000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2102.811315] should_fail.cold+0xa/0x1b [ 2102.815205] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2102.820309] ? lock_downgrade+0x810/0x810 [ 2102.824459] ? ___might_sleep+0x163/0x280 [ 2102.828612] __should_failslab+0x121/0x190 [ 2102.832845] should_failslab+0x9/0x14 [ 2102.836638] kmem_cache_alloc+0x2be/0x710 [ 2102.840771] ? lock_downgrade+0x810/0x810 [ 2102.844930] ? kasan_check_read+0x11/0x20 [ 2102.849060] __kernfs_new_node+0xef/0x690 [ 2102.853206] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2102.858052] ? wait_for_completion+0x440/0x440 [ 2102.862664] ? mutex_unlock+0xd/0x10 [ 2102.866383] ? kernfs_activate+0x192/0x1f0 [ 2102.870628] kernfs_new_node+0x99/0x130 [ 2102.874587] __kernfs_create_file+0x51/0x340 [ 2102.878997] sysfs_add_file_mode_ns+0x222/0x560 [ 2102.883646] internal_create_group+0x35b/0xc40 [ 2102.888207] ? bd_set_size+0x89/0xb0 [ 2102.891918] ? remove_files.isra.0+0x190/0x190 [ 2102.896486] sysfs_create_group+0x20/0x30 [ 2102.900631] lo_ioctl+0xf8f/0x20d0 [ 2102.904174] ? lo_rw_aio+0x1530/0x1530 [ 2102.908054] blkdev_ioctl+0xee8/0x1c40 [ 2102.911940] ? blkpg_ioctl+0xa90/0xa90 [ 2102.915815] ? find_held_lock+0x35/0x130 [ 2102.919857] ? debug_check_no_obj_freed+0x200/0x464 [ 2102.924868] ? kasan_check_read+0x11/0x20 [ 2102.929004] ? __fget+0x340/0x540 [ 2102.932441] ? find_held_lock+0x35/0x130 [ 2102.936479] ? __fget+0x340/0x540 [ 2102.939930] block_ioctl+0xee/0x130 [ 2102.943544] ? blkdev_fallocate+0x410/0x410 [ 2102.947844] do_vfs_ioctl+0xd6e/0x1390 [ 2102.951713] ? ioctl_preallocate+0x210/0x210 [ 2102.956098] ? __fget+0x367/0x540 [ 2102.959529] ? iterate_fd+0x360/0x360 [ 2102.963326] ? do_sys_open+0x31d/0x5d0 [ 2102.967217] ? security_file_ioctl+0x93/0xc0 [ 2102.971637] ksys_ioctl+0xab/0xd0 [ 2102.975072] __x64_sys_ioctl+0x73/0xb0 [ 2102.978939] do_syscall_64+0x103/0x610 [ 2102.982806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.987989] RIP: 0033:0x457ca7 [ 2102.991163] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:51:51 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1100}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2103.010053] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2103.017757] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2103.025021] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2103.032268] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2103.039545] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2103.046837] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2103.114520] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:51 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3e80}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:51 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:51 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00080f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4020aea5, &(0x7f0000000180)) 17:51:52 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3ec0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:52 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc0000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2103.368028] protocol 88fb is buggy, dev hsr_slave_0 [ 2103.373190] protocol 88fb is buggy, dev hsr_slave_1 [ 2103.401978] FAULT_INJECTION: forcing a failure. [ 2103.401978] name failslab, interval 1, probability 0, space 0, times 0 [ 2103.415554] CPU: 1 PID: 15065 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2103.422849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.432221] Call Trace: [ 2103.434807] dump_stack+0x172/0x1f0 [ 2103.438430] should_fail.cold+0xa/0x1b [ 2103.442318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2103.447408] ? lock_downgrade+0x810/0x810 [ 2103.451565] ? ___might_sleep+0x163/0x280 [ 2103.455743] __should_failslab+0x121/0x190 [ 2103.459971] should_failslab+0x9/0x14 [ 2103.463779] kmem_cache_alloc_trace+0x2d1/0x760 [ 2103.468472] kobject_uevent_env+0x2fb/0x1030 [ 2103.472893] kobject_uevent+0x20/0x26 [ 2103.476706] lo_ioctl+0x100b/0x20d0 [ 2103.480327] ? lo_rw_aio+0x1530/0x1530 [ 2103.484242] blkdev_ioctl+0xee8/0x1c40 [ 2103.488130] ? blkpg_ioctl+0xa90/0xa90 [ 2103.492024] ? find_held_lock+0x35/0x130 [ 2103.496073] ? debug_check_no_obj_freed+0x200/0x464 [ 2103.501085] ? kasan_check_read+0x11/0x20 [ 2103.505231] ? __fget+0x340/0x540 [ 2103.508672] ? find_held_lock+0x35/0x130 [ 2103.512735] ? __fget+0x340/0x540 [ 2103.516183] block_ioctl+0xee/0x130 [ 2103.519805] ? blkdev_fallocate+0x410/0x410 [ 2103.524118] do_vfs_ioctl+0xd6e/0x1390 [ 2103.528004] ? ioctl_preallocate+0x210/0x210 [ 2103.532419] ? __fget+0x367/0x540 [ 2103.535887] ? iterate_fd+0x360/0x360 [ 2103.539680] ? do_sys_open+0x31d/0x5d0 [ 2103.543590] ? security_file_ioctl+0x93/0xc0 [ 2103.548025] ksys_ioctl+0xab/0xd0 [ 2103.551487] __x64_sys_ioctl+0x73/0xb0 [ 2103.555382] do_syscall_64+0x103/0x610 [ 2103.559268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.564455] RIP: 0033:0x457ca7 [ 2103.567640] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2103.586551] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2103.594250] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2103.601525] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2103.608786] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2103.616074] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2103.623331] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2103.630878] protocol 88fb is buggy, dev hsr_slave_0 [ 2103.635958] protocol 88fb is buggy, dev hsr_slave_1 17:51:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca000a0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2103.682042] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:52 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3f00}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4038ae7a, &(0x7f0000000180)) 17:51:52 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:52 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:52 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xe03f0300}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca000e0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:52 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2103.981957] FAULT_INJECTION: forcing a failure. [ 2103.981957] name failslab, interval 1, probability 0, space 0, times 0 [ 2104.017128] CPU: 1 PID: 15114 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2104.024459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2104.024465] Call Trace: [ 2104.024486] dump_stack+0x172/0x1f0 [ 2104.024504] should_fail.cold+0xa/0x1b [ 2104.040042] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2104.040071] ? lock_downgrade+0x810/0x810 [ 2104.040087] ? ___might_sleep+0x163/0x280 [ 2104.040120] __should_failslab+0x121/0x190 [ 2104.061575] should_failslab+0x9/0x14 [ 2104.065374] kmem_cache_alloc_trace+0x2d1/0x760 [ 2104.070043] kobject_uevent_env+0x2fb/0x1030 [ 2104.074474] kobject_uevent+0x20/0x26 [ 2104.078296] lo_ioctl+0x100b/0x20d0 [ 2104.081923] ? lo_rw_aio+0x1530/0x1530 [ 2104.085803] blkdev_ioctl+0xee8/0x1c40 [ 2104.089699] ? blkpg_ioctl+0xa90/0xa90 [ 2104.093576] ? find_held_lock+0x35/0x130 [ 2104.097643] ? zap_class+0x460/0x460 [ 2104.101370] ? kasan_check_read+0x11/0x20 [ 2104.105528] ? __fget+0x340/0x540 [ 2104.108984] ? find_held_lock+0x35/0x130 [ 2104.113036] ? __fget+0x340/0x540 [ 2104.116485] block_ioctl+0xee/0x130 [ 2104.120118] ? blkdev_fallocate+0x410/0x410 [ 2104.124446] do_vfs_ioctl+0xd6e/0x1390 [ 2104.128331] ? ioctl_preallocate+0x210/0x210 [ 2104.132776] ? __fget+0x367/0x540 [ 2104.136226] ? iterate_fd+0x360/0x360 [ 2104.140038] ? do_sys_open+0x31d/0x5d0 [ 2104.143957] ? security_file_ioctl+0x93/0xc0 [ 2104.148370] ksys_ioctl+0xab/0xd0 [ 2104.151833] __x64_sys_ioctl+0x73/0xb0 [ 2104.155743] do_syscall_64+0x103/0x610 [ 2104.159644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.164826] RIP: 0033:0x457ca7 17:51:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) 17:51:52 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2104.168014] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2104.186922] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2104.194637] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2104.201899] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2104.209161] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2104.216419] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2104.223697] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2104.285517] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca000f0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:53 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2104.551535] FAULT_INJECTION: forcing a failure. [ 2104.551535] name failslab, interval 1, probability 0, space 0, times 0 [ 2104.575188] CPU: 1 PID: 15158 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2104.582485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2104.591832] Call Trace: [ 2104.594423] dump_stack+0x172/0x1f0 [ 2104.598060] should_fail.cold+0xa/0x1b [ 2104.601963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2104.607154] ? lock_downgrade+0x810/0x810 [ 2104.611303] ? ___might_sleep+0x163/0x280 [ 2104.615486] __should_failslab+0x121/0x190 [ 2104.619737] should_failslab+0x9/0x14 [ 2104.623531] __kmalloc+0x2dc/0x740 [ 2104.627106] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2104.632578] ? rcu_read_lock_sched_held+0x110/0x130 [ 2104.637597] ? kobject_get_path+0xc4/0x1b0 [ 2104.641843] kobject_get_path+0xc4/0x1b0 [ 2104.645932] kobject_uevent_env+0x31f/0x1030 [ 2104.650400] kobject_uevent+0x20/0x26 [ 2104.654199] lo_ioctl+0x100b/0x20d0 [ 2104.657836] ? lo_rw_aio+0x1530/0x1530 [ 2104.661735] blkdev_ioctl+0xee8/0x1c40 [ 2104.665634] ? blkpg_ioctl+0xa90/0xa90 [ 2104.669539] ? find_held_lock+0x35/0x130 [ 2104.673597] ? debug_check_no_obj_freed+0x200/0x464 [ 2104.678641] ? kasan_check_read+0x11/0x20 [ 2104.682779] ? __fget+0x340/0x540 [ 2104.686237] ? find_held_lock+0x35/0x130 [ 2104.690308] ? __fget+0x340/0x540 [ 2104.694228] block_ioctl+0xee/0x130 [ 2104.697845] ? blkdev_fallocate+0x410/0x410 [ 2104.702174] do_vfs_ioctl+0xd6e/0x1390 [ 2104.706055] ? ioctl_preallocate+0x210/0x210 [ 2104.710466] ? __fget+0x367/0x540 [ 2104.713941] ? iterate_fd+0x360/0x360 [ 2104.717757] ? do_sys_open+0x31d/0x5d0 [ 2104.721692] ? security_file_ioctl+0x93/0xc0 [ 2104.726094] ksys_ioctl+0xab/0xd0 [ 2104.729539] __x64_sys_ioctl+0x73/0xb0 [ 2104.733419] do_syscall_64+0x103/0x610 [ 2104.737338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.742526] RIP: 0033:0x457ca7 [ 2104.745715] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2104.764624] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2104.772331] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2104.779594] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2104.786856] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2104.794124] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:51:53 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae79, &(0x7f0000000180)) 17:51:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00100f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:53 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x33fe0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2104.801390] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2104.878989] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:53 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffffdef}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00600f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:53 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x34000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4068aea3, &(0x7f0000000180)) 17:51:53 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xffffff7f}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:53 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00970f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2105.186741] FAULT_INJECTION: forcing a failure. [ 2105.186741] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.219373] CPU: 1 PID: 15205 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2105.226662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:51:53 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffffff6}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2105.236013] Call Trace: [ 2105.238622] dump_stack+0x172/0x1f0 [ 2105.242259] should_fail.cold+0xa/0x1b [ 2105.246173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2105.251310] ? lock_downgrade+0x810/0x810 [ 2105.255478] ? ___might_sleep+0x163/0x280 [ 2105.259629] __should_failslab+0x121/0x190 [ 2105.263859] should_failslab+0x9/0x14 [ 2105.267689] kmem_cache_alloc_node_trace+0x270/0x720 [ 2105.272803] ? __alloc_skb+0xd5/0x5e0 [ 2105.276614] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2105.282050] __kmalloc_node_track_caller+0x3d/0x70 [ 2105.286987] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2105.291647] __alloc_skb+0x10b/0x5e0 [ 2105.295360] ? skb_scrub_packet+0x440/0x440 [ 2105.299693] ? kasan_check_read+0x11/0x20 [ 2105.303845] alloc_uevent_skb+0x83/0x1e2 [ 2105.307921] kobject_uevent_env+0xa63/0x1030 [ 2105.312348] kobject_uevent+0x20/0x26 [ 2105.316307] lo_ioctl+0x100b/0x20d0 [ 2105.319918] ? lo_rw_aio+0x1530/0x1530 [ 2105.323812] blkdev_ioctl+0xee8/0x1c40 [ 2105.327696] ? blkpg_ioctl+0xa90/0xa90 [ 2105.331566] ? find_held_lock+0x35/0x130 [ 2105.335610] ? debug_check_no_obj_freed+0x200/0x464 [ 2105.340611] ? kasan_check_read+0x11/0x20 [ 2105.344740] ? __fget+0x340/0x540 [ 2105.348177] ? find_held_lock+0x35/0x130 [ 2105.352217] ? __fget+0x340/0x540 [ 2105.355651] block_ioctl+0xee/0x130 [ 2105.359265] ? blkdev_fallocate+0x410/0x410 [ 2105.363588] do_vfs_ioctl+0xd6e/0x1390 [ 2105.367477] ? ioctl_preallocate+0x210/0x210 [ 2105.371921] ? __fget+0x367/0x540 [ 2105.375387] ? iterate_fd+0x360/0x360 [ 2105.379182] ? do_sys_open+0x31d/0x5d0 [ 2105.383105] ? security_file_ioctl+0x93/0xc0 [ 2105.387506] ksys_ioctl+0xab/0xd0 [ 2105.390962] __x64_sys_ioctl+0x73/0xb0 [ 2105.394841] do_syscall_64+0x103/0x610 [ 2105.398706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.403880] RIP: 0033:0x457ca7 [ 2105.407078] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2105.425967] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:51:54 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x400300}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2105.433658] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2105.440901] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2105.448147] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2105.455428] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2105.462683] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4070aea0, &(0x7f0000000180)) [ 2105.511920] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:54 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca0000407f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:54 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2105.746346] FAULT_INJECTION: forcing a failure. [ 2105.746346] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.778048] CPU: 0 PID: 15244 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2105.785356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:51:54 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2105.794709] Call Trace: [ 2105.797315] dump_stack+0x172/0x1f0 [ 2105.800949] should_fail.cold+0xa/0x1b [ 2105.804839] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2105.809935] ? lock_downgrade+0x810/0x810 [ 2105.814099] ? ___might_sleep+0x163/0x280 [ 2105.818243] __should_failslab+0x121/0x190 [ 2105.822471] should_failslab+0x9/0x14 [ 2105.826264] kmem_cache_alloc+0x2be/0x710 [ 2105.830413] ? refcount_add_not_zero_checked+0x240/0x240 [ 2105.835861] ? lock_downgrade+0x810/0x810 [ 2105.839994] skb_clone+0x150/0x3b0 [ 2105.843523] netlink_broadcast_filtered+0x870/0xb20 [ 2105.848544] netlink_broadcast+0x3a/0x50 [ 2105.852607] kobject_uevent_env+0xa94/0x1030 [ 2105.857009] kobject_uevent+0x20/0x26 [ 2105.860814] lo_ioctl+0x100b/0x20d0 [ 2105.864426] ? lo_rw_aio+0x1530/0x1530 [ 2105.868398] blkdev_ioctl+0xee8/0x1c40 [ 2105.872289] ? blkpg_ioctl+0xa90/0xa90 [ 2105.876168] ? find_held_lock+0x35/0x130 [ 2105.880216] ? debug_check_no_obj_freed+0x200/0x464 [ 2105.885220] ? kasan_check_read+0x11/0x20 [ 2105.889359] ? __fget+0x340/0x540 [ 2105.892832] ? find_held_lock+0x35/0x130 [ 2105.896943] ? __fget+0x340/0x540 [ 2105.900381] block_ioctl+0xee/0x130 [ 2105.903988] ? blkdev_fallocate+0x410/0x410 [ 2105.908321] do_vfs_ioctl+0xd6e/0x1390 [ 2105.912230] ? ioctl_preallocate+0x210/0x210 [ 2105.916631] ? __fget+0x367/0x540 [ 2105.920104] ? iterate_fd+0x360/0x360 [ 2105.923891] ? do_sys_open+0x31d/0x5d0 [ 2105.927780] ? security_file_ioctl+0x93/0xc0 [ 2105.932238] ksys_ioctl+0xab/0xd0 [ 2105.935735] __x64_sys_ioctl+0x73/0xb0 [ 2105.939612] do_syscall_64+0x103/0x610 [ 2105.943497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.948694] RIP: 0033:0x457ca7 [ 2105.951931] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2105.970831] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2105.978558] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 2105.985825] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:51:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x8010aebb, &(0x7f0000000180)) [ 2105.993099] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2106.000370] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2106.007638] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89020000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2106.058594] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:54 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x100000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x11000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x8010aebc, &(0x7f0000000180)) 17:51:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3f000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89040000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:54 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa00000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2106.287300] FAULT_INJECTION: forcing a failure. [ 2106.287300] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.352628] CPU: 1 PID: 15278 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2106.359914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.369292] Call Trace: [ 2106.369316] dump_stack+0x172/0x1f0 [ 2106.369336] should_fail.cold+0xa/0x1b [ 2106.369354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.379425] ? lock_downgrade+0x810/0x810 [ 2106.379451] ? ___might_sleep+0x163/0x280 [ 2106.379473] __should_failslab+0x121/0x190 [ 2106.379491] should_failslab+0x9/0x14 [ 2106.379506] kmem_cache_alloc+0x2be/0x710 [ 2106.405174] ? __fget+0x367/0x540 [ 2106.408642] getname_flags+0xd6/0x5b0 [ 2106.412499] do_mkdirat+0xa0/0x2a0 [ 2106.416055] ? __ia32_sys_mknod+0xb0/0xb0 [ 2106.420213] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2106.425024] ? do_syscall_64+0x26/0x610 [ 2106.429020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.434415] ? do_syscall_64+0x26/0x610 [ 2106.438496] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2106.443082] __x64_sys_mkdir+0x5c/0x80 [ 2106.446991] do_syscall_64+0x103/0x610 [ 2106.450881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.456078] RIP: 0033:0x457257 [ 2106.459288] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2106.478218] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2106.485923] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 [ 2106.493189] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 17:51:55 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2106.500479] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2106.507747] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2106.515015] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x8030ae7c, &(0x7f0000000180)) 17:51:55 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1100000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89080000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:55 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc0000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2106.643798] FAULT_INJECTION: forcing a failure. [ 2106.643798] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2106.655625] CPU: 1 PID: 15305 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2106.662910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.672272] Call Trace: [ 2106.674885] dump_stack+0x172/0x1f0 [ 2106.678518] should_fail.cold+0xa/0x1b [ 2106.682414] ? lo_ioctl+0x188/0x20d0 [ 2106.686148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.691299] ? debug_smp_processor_id+0x1c/0x20 [ 2106.696478] ? perf_trace_lock+0xeb/0x510 [ 2106.696509] should_fail_alloc_page+0x50/0x60 [ 2106.696521] __alloc_pages_nodemask+0x1a1/0x710 [ 2106.696534] ? debug_check_no_obj_freed+0x200/0x464 [ 2106.709994] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2106.710021] ? find_held_lock+0x35/0x130 [ 2106.710065] cache_grow_begin+0x9c/0x8c0 [ 2106.710093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2106.710122] ? check_preemption_disabled+0x48/0x290 [ 2106.738802] kmem_cache_alloc+0x645/0x710 [ 2106.742963] ? __fget+0x367/0x540 [ 2106.746422] getname_flags+0xd6/0x5b0 [ 2106.750263] do_mkdirat+0xa0/0x2a0 [ 2106.753809] ? __ia32_sys_mknod+0xb0/0xb0 [ 2106.757965] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2106.762764] ? do_syscall_64+0x26/0x610 [ 2106.766791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.772161] ? do_syscall_64+0x26/0x610 [ 2106.776136] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2106.780722] __x64_sys_mkdir+0x5c/0x80 [ 2106.784611] do_syscall_64+0x103/0x610 [ 2106.788513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.793696] RIP: 0033:0x457257 [ 2106.796895] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2106.815817] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2106.823548] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 [ 2106.830811] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 17:51:55 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3f00000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2106.838071] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2106.845332] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2106.852625] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2106.883851] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890a0000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:55 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xe03f0300}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x8048ae66, &(0x7f0000000180)) 17:51:55 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:55 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc000000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) 17:51:55 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2107.121875] FAULT_INJECTION: forcing a failure. [ 2107.121875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2107.133698] CPU: 0 PID: 15340 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2107.133708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2107.133713] Call Trace: [ 2107.133735] dump_stack+0x172/0x1f0 [ 2107.133756] should_fail.cold+0xa/0x1b [ 2107.133772] ? lo_ioctl+0x188/0x20d0 [ 2107.133797] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2107.133820] should_fail_alloc_page+0x50/0x60 [ 2107.173846] __alloc_pages_nodemask+0x1a1/0x710 [ 2107.178532] ? debug_check_no_obj_freed+0x200/0x464 [ 2107.183588] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2107.188606] ? find_held_lock+0x35/0x130 [ 2107.192679] cache_grow_begin+0x9c/0x8c0 [ 2107.196741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2107.202271] ? check_preemption_disabled+0x48/0x290 [ 2107.207297] kmem_cache_alloc+0x645/0x710 [ 2107.211445] ? __fget+0x367/0x540 [ 2107.214942] getname_flags+0xd6/0x5b0 [ 2107.218757] do_mkdirat+0xa0/0x2a0 [ 2107.222295] ? __ia32_sys_mknod+0xb0/0xb0 [ 2107.226441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.231200] ? do_syscall_64+0x26/0x610 [ 2107.235204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.240566] ? do_syscall_64+0x26/0x610 [ 2107.244538] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2107.249130] __x64_sys_mkdir+0x5c/0x80 [ 2107.253014] do_syscall_64+0x103/0x610 [ 2107.256905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.262086] RIP: 0033:0x457257 [ 2107.265269] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2107.284162] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2107.291864] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 [ 2107.299124] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 2107.306383] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2107.313657] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:51:56 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890e0000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2107.320916] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2107.344242] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:56 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffffdef}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x8208ae63, &(0x7f0000000180)) 17:51:56 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xe03f030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890f0000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2107.509909] FAULT_INJECTION: forcing a failure. [ 2107.509909] name failslab, interval 1, probability 0, space 0, times 0 [ 2107.521684] net_ratelimit: 20 callbacks suppressed [ 2107.521690] protocol 88fb is buggy, dev hsr_slave_0 [ 2107.521733] protocol 88fb is buggy, dev hsr_slave_1 [ 2107.588598] CPU: 0 PID: 15366 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2107.595924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2107.605289] Call Trace: [ 2107.607907] dump_stack+0x172/0x1f0 [ 2107.607939] should_fail.cold+0xa/0x1b [ 2107.607956] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2107.607974] ? ___might_sleep+0x163/0x280 [ 2107.607994] __should_failslab+0x121/0x190 [ 2107.608009] should_failslab+0x9/0x14 [ 2107.615523] kmem_cache_alloc+0x2be/0x710 [ 2107.636895] ? unwind_get_return_address+0x61/0xa0 [ 2107.641838] ? __save_stack_trace+0x8a/0xf0 [ 2107.646186] ? ratelimit_state_init+0xb0/0xb0 [ 2107.650703] ext4_alloc_inode+0x1f/0x640 [ 2107.654771] ? ratelimit_state_init+0xb0/0xb0 [ 2107.659297] alloc_inode+0x66/0x190 [ 2107.663040] new_inode_pseudo+0x19/0xf0 [ 2107.667021] new_inode+0x1f/0x40 [ 2107.670390] __ext4_new_inode+0x3cb/0x52c0 [ 2107.674629] ? putname+0xef/0x130 [ 2107.678081] ? do_syscall_64+0x103/0x610 [ 2107.682136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.687499] ? d_splice_alias+0x6c1/0xcc0 [ 2107.691660] ? find_held_lock+0x35/0x130 [ 2107.695744] ? debug_check_no_obj_freed+0x200/0x464 [ 2107.700760] ? ext4_free_inode+0x1470/0x1470 [ 2107.705173] ? lock_downgrade+0x810/0x810 [ 2107.709322] ? dquot_get_next_dqblk+0x180/0x180 [ 2107.714017] ? __lock_is_held+0xb6/0x140 [ 2107.718105] ? check_preemption_disabled+0x48/0x290 [ 2107.723127] ext4_mkdir+0x3d5/0xdf0 [ 2107.726831] ? ext4_init_dot_dotdot+0x520/0x520 [ 2107.731507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.737039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.742573] ? security_inode_permission+0xd5/0x110 [ 2107.747590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.753140] ? security_inode_mkdir+0xee/0x120 [ 2107.757754] vfs_mkdir+0x433/0x690 [ 2107.758047] protocol 88fb is buggy, dev hsr_slave_0 [ 2107.761320] do_mkdirat+0x234/0x2a0 [ 2107.766396] protocol 88fb is buggy, dev hsr_slave_1 [ 2107.769966] ? __ia32_sys_mknod+0xb0/0xb0 [ 2107.769980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.769996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.789244] ? do_syscall_64+0x26/0x610 [ 2107.793216] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2107.797805] __x64_sys_mkdir+0x5c/0x80 [ 2107.801695] do_syscall_64+0x103/0x610 [ 2107.805583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.810771] RIP: 0033:0x457257 [ 2107.813968] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2107.832891] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2107.840593] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 [ 2107.847872] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 2107.855136] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2107.862403] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2107.869689] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:56 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xffffff7f}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc0045878, &(0x7f0000000180)) 17:51:56 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffffff6}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2108.079328] protocol 88fb is buggy, dev hsr_slave_0 [ 2108.084502] protocol 88fb is buggy, dev hsr_slave_1 17:51:56 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xffffff7f00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc0045878, &(0x7f0000000180)) 17:51:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89100000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:57 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:57 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc008ae67, &(0x7f0000000180)) 17:51:57 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:57 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:57 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x100000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2108.506400] FAULT_INJECTION: forcing a failure. [ 2108.506400] name failslab, interval 1, probability 0, space 0, times 0 [ 2108.546962] CPU: 1 PID: 15424 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2108.554241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2108.563777] Call Trace: [ 2108.566363] dump_stack+0x172/0x1f0 [ 2108.570110] should_fail.cold+0xa/0x1b [ 2108.573992] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2108.579092] ? ___might_sleep+0x163/0x280 [ 2108.583247] __should_failslab+0x121/0x190 [ 2108.587496] should_failslab+0x9/0x14 [ 2108.591311] kmem_cache_alloc+0x2be/0x710 [ 2108.595467] ? unwind_get_return_address+0x61/0xa0 [ 2108.600419] ? __save_stack_trace+0x8a/0xf0 [ 2108.604762] ? ratelimit_state_init+0xb0/0xb0 [ 2108.609255] ext4_alloc_inode+0x1f/0x640 [ 2108.613316] ? ratelimit_state_init+0xb0/0xb0 [ 2108.617809] alloc_inode+0x66/0x190 [ 2108.621473] new_inode_pseudo+0x19/0xf0 [ 2108.625473] new_inode+0x1f/0x40 [ 2108.628926] __ext4_new_inode+0x3cb/0x52c0 [ 2108.633172] ? putname+0xef/0x130 [ 2108.636667] ? do_syscall_64+0x103/0x610 [ 2108.640772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.646134] ? d_splice_alias+0x6c1/0xcc0 [ 2108.650324] ? find_held_lock+0x35/0x130 [ 2108.654401] ? debug_check_no_obj_freed+0x200/0x464 [ 2108.659412] ? ext4_free_inode+0x1470/0x1470 [ 2108.663848] ? lock_downgrade+0x810/0x810 [ 2108.668041] ? dquot_get_next_dqblk+0x180/0x180 [ 2108.672725] ? __lock_is_held+0xb6/0x140 [ 2108.676794] ? check_preemption_disabled+0x48/0x290 [ 2108.681843] ext4_mkdir+0x3d5/0xdf0 [ 2108.685480] ? ext4_init_dot_dotdot+0x520/0x520 [ 2108.690160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2108.696208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2108.701753] ? security_inode_permission+0xd5/0x110 [ 2108.706792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2108.712328] ? security_inode_mkdir+0xee/0x120 [ 2108.716910] vfs_mkdir+0x433/0x690 [ 2108.720492] do_mkdirat+0x234/0x2a0 [ 2108.724134] ? __ia32_sys_mknod+0xb0/0xb0 [ 2108.728288] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.733042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.738405] ? do_syscall_64+0x26/0x610 [ 2108.742427] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2108.747029] __x64_sys_mkdir+0x5c/0x80 [ 2108.750931] do_syscall_64+0x103/0x610 [ 2108.754849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.760030] RIP: 0033:0x457257 [ 2108.763236] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2108.782143] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2108.789858] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 [ 2108.797118] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 2108.804405] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2108.811671] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2108.818949] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2108.828069] protocol 88fb is buggy, dev hsr_slave_0 [ 2108.828261] protocol 88fb is buggy, dev hsr_slave_0 [ 2108.833137] protocol 88fb is buggy, dev hsr_slave_1 [ 2108.838200] protocol 88fb is buggy, dev hsr_slave_1 17:51:57 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89600000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc008aeba, &(0x7f0000000180)) 17:51:57 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:57 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa00000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2109.020204] FAULT_INJECTION: forcing a failure. [ 2109.020204] name failslab, interval 1, probability 0, space 0, times 0 [ 2109.068711] CPU: 1 PID: 15456 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2109.076018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2109.076026] Call Trace: [ 2109.076050] dump_stack+0x172/0x1f0 [ 2109.076073] should_fail.cold+0xa/0x1b [ 2109.095523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2109.095544] ? ___might_sleep+0x163/0x280 [ 2109.095566] __should_failslab+0x121/0x190 [ 2109.095583] should_failslab+0x9/0x14 [ 2109.104811] kmem_cache_alloc+0x2be/0x710 [ 2109.104828] ? unwind_get_return_address+0x61/0xa0 [ 2109.104844] ? __save_stack_trace+0x8a/0xf0 [ 2109.104863] ? ratelimit_state_init+0xb0/0xb0 [ 2109.104879] ext4_alloc_inode+0x1f/0x640 [ 2109.112893] ? ratelimit_state_init+0xb0/0xb0 [ 2109.112910] alloc_inode+0x66/0x190 [ 2109.112926] new_inode_pseudo+0x19/0xf0 [ 2109.112940] new_inode+0x1f/0x40 [ 2109.112958] __ext4_new_inode+0x3cb/0x52c0 [ 2109.154488] ? putname+0xef/0x130 [ 2109.157951] ? do_syscall_64+0x103/0x610 [ 2109.162045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.167419] ? d_splice_alias+0x6c1/0xcc0 [ 2109.171592] ? find_held_lock+0x35/0x130 [ 2109.175656] ? debug_check_no_obj_freed+0x200/0x464 [ 2109.180677] ? ext4_free_inode+0x1470/0x1470 [ 2109.185093] ? lock_downgrade+0x810/0x810 [ 2109.189243] ? dquot_get_next_dqblk+0x180/0x180 [ 2109.193925] ? __lock_is_held+0xb6/0x140 [ 2109.197984] ? check_preemption_disabled+0x48/0x290 [ 2109.203022] ext4_mkdir+0x3d5/0xdf0 [ 2109.206657] ? ext4_init_dot_dotdot+0x520/0x520 [ 2109.211326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2109.216858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2109.222404] ? security_inode_permission+0xd5/0x110 [ 2109.227463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2109.233035] ? security_inode_mkdir+0xee/0x120 [ 2109.237615] vfs_mkdir+0x433/0x690 [ 2109.241182] do_mkdirat+0x234/0x2a0 [ 2109.244811] ? __ia32_sys_mknod+0xb0/0xb0 [ 2109.248996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2109.253752] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.259135] ? do_syscall_64+0x26/0x610 [ 2109.263129] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2109.267729] __x64_sys_mkdir+0x5c/0x80 [ 2109.271683] do_syscall_64+0x103/0x610 [ 2109.275609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.280795] RIP: 0033:0x457257 [ 2109.283990] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2109.302917] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2109.310624] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 17:51:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1100000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89970000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:58 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc00caee0, &(0x7f0000000180)) [ 2109.317899] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 2109.325208] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2109.332496] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2109.339761] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:58 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3f00000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc0189436, &(0x7f0000000180)) 17:51:58 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89f00000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2109.577307] FAULT_INJECTION: forcing a failure. [ 2109.577307] name failslab, interval 1, probability 0, space 0, times 0 [ 2109.643459] CPU: 0 PID: 15482 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2109.650737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2109.660093] Call Trace: [ 2109.662716] dump_stack+0x172/0x1f0 [ 2109.666341] should_fail.cold+0xa/0x1b [ 2109.670256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2109.675375] ? ___might_sleep+0x163/0x280 [ 2109.679523] __should_failslab+0x121/0x190 [ 2109.683754] should_failslab+0x9/0x14 [ 2109.687570] __kmalloc+0x2dc/0x740 [ 2109.691127] ? ext4_find_extent+0x76e/0x9d0 [ 2109.695461] ext4_find_extent+0x76e/0x9d0 [ 2109.699621] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2109.705079] ext4_ext_map_blocks+0x1cc/0x4e50 [ 2109.709588] ? ext4_ext_release+0x10/0x10 [ 2109.713735] ? __lock_is_held+0xb6/0x140 [ 2109.717821] ? lock_acquire+0x16f/0x3f0 [ 2109.721820] ? ext4_map_blocks+0x884/0x1a20 [ 2109.726158] ext4_map_blocks+0x8ec/0x1a20 [ 2109.730314] ? ext4_issue_zeroout+0x170/0x170 [ 2109.734818] ? kasan_check_write+0x14/0x20 [ 2109.739056] ? __brelse+0x95/0xb0 [ 2109.742511] ext4_getblk+0xc4/0x510 [ 2109.746150] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2109.750503] ? ext4_free_inode+0x1470/0x1470 [ 2109.754912] ext4_bread+0x8f/0x230 [ 2109.758458] ? ext4_getblk+0x510/0x510 [ 2109.762349] ext4_append+0x155/0x370 [ 2109.766075] ext4_mkdir+0x61b/0xdf0 [ 2109.769701] ? ext4_init_dot_dotdot+0x520/0x520 [ 2109.774367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2109.779957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2109.785508] ? security_inode_permission+0xd5/0x110 [ 2109.790522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2109.796064] ? security_inode_mkdir+0xee/0x120 [ 2109.800822] vfs_mkdir+0x433/0x690 [ 2109.804414] do_mkdirat+0x234/0x2a0 [ 2109.808062] ? __ia32_sys_mknod+0xb0/0xb0 [ 2109.812205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2109.816951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.822329] ? do_syscall_64+0x26/0x610 [ 2109.826309] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2109.830901] __x64_sys_mkdir+0x5c/0x80 [ 2109.834811] do_syscall_64+0x103/0x610 [ 2109.838693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.843868] RIP: 0033:0x457257 [ 2109.847067] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2109.865953] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2109.873673] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 [ 2109.880985] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 17:51:58 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc000000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000a00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2109.888246] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2109.895508] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2109.902770] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:58 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000e00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc018aec0, &(0x7f0000000180)) 17:51:58 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xe03f030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc020660b, &(0x7f0000000180)) 17:51:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89c00e00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:58 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2110.386007] FAULT_INJECTION: forcing a failure. [ 2110.386007] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.406648] CPU: 1 PID: 15543 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2110.413927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2110.423295] Call Trace: [ 2110.423320] dump_stack+0x172/0x1f0 [ 2110.423342] should_fail.cold+0xa/0x1b [ 2110.423363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2110.423382] ? lock_downgrade+0x810/0x810 [ 2110.429564] ? ___might_sleep+0x163/0x280 [ 2110.438526] __should_failslab+0x121/0x190 [ 2110.438556] should_failslab+0x9/0x14 [ 2110.438568] __kmalloc_track_caller+0x2d8/0x740 [ 2110.438585] ? mntput+0x74/0xa0 [ 2110.446891] ? strndup_user+0x77/0xd0 [ 2110.446906] memdup_user+0x26/0xb0 [ 2110.446933] strndup_user+0x77/0xd0 [ 2110.473787] ksys_mount+0x3c/0x150 [ 2110.477331] __x64_sys_mount+0xbe/0x150 [ 2110.481324] do_syscall_64+0x103/0x610 [ 2110.485338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.490538] RIP: 0033:0x45a8aa [ 2110.493739] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2110.512732] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2110.520465] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2110.527738] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2110.535003] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2110.542300] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2110.549595] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:59 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:59 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc048ae65, &(0x7f0000000180)) 17:51:59 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000f00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:59 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xffffff7f00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2110.761242] FAULT_INJECTION: forcing a failure. [ 2110.761242] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.797067] CPU: 1 PID: 15564 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2110.804359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2110.813724] Call Trace: [ 2110.816330] dump_stack+0x172/0x1f0 [ 2110.820004] should_fail.cold+0xa/0x1b [ 2110.823916] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2110.829042] ? ___might_sleep+0x163/0x280 [ 2110.833218] __should_failslab+0x121/0x190 [ 2110.837476] should_failslab+0x9/0x14 [ 2110.841274] __kmalloc+0x2dc/0x740 [ 2110.844872] ? ext4_find_extent+0x76e/0x9d0 [ 2110.849217] ext4_find_extent+0x76e/0x9d0 [ 2110.853391] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2110.858850] ext4_ext_map_blocks+0x1cc/0x4e50 [ 2110.863383] ? ext4_ext_release+0x10/0x10 [ 2110.867533] ? __lock_is_held+0xb6/0x140 [ 2110.871629] ? lock_acquire+0x16f/0x3f0 [ 2110.875668] ? ext4_map_blocks+0x884/0x1a20 [ 2110.880013] ext4_map_blocks+0x8ec/0x1a20 [ 2110.884177] ? ext4_issue_zeroout+0x170/0x170 [ 2110.888669] ? kasan_check_write+0x14/0x20 [ 2110.892916] ? __brelse+0x95/0xb0 [ 2110.896389] ext4_getblk+0xc4/0x510 [ 2110.900037] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2110.904370] ? ext4_free_inode+0x1470/0x1470 [ 2110.908837] ext4_bread+0x8f/0x230 [ 2110.912452] ? ext4_getblk+0x510/0x510 [ 2110.916370] ext4_append+0x155/0x370 [ 2110.920117] ext4_mkdir+0x61b/0xdf0 [ 2110.923797] ? ext4_init_dot_dotdot+0x520/0x520 [ 2110.928485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2110.934036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2110.939606] ? security_inode_permission+0xd5/0x110 [ 2110.944643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2110.950187] ? security_inode_mkdir+0xee/0x120 [ 2110.954791] vfs_mkdir+0x433/0x690 [ 2110.958346] do_mkdirat+0x234/0x2a0 [ 2110.961987] ? __ia32_sys_mknod+0xb0/0xb0 [ 2110.966142] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2110.970920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.976290] ? do_syscall_64+0x26/0x610 [ 2110.980266] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2110.984857] __x64_sys_mkdir+0x5c/0x80 [ 2110.988763] do_syscall_64+0x103/0x610 [ 2110.992672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.997869] RIP: 0033:0x457257 [ 2111.001066] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2111.019973] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2111.027672] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457257 [ 2111.034930] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 2111.042220] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2111.049512] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:51:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89003f00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0xc208ae62, &(0x7f0000000180)) [ 2111.056792] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:51:59 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:59 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:59 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:59 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:51:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x80ffff}) 17:51:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89006000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:51:59 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:51:59 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2111.357750] FAULT_INJECTION: forcing a failure. [ 2111.357750] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.385585] CPU: 1 PID: 15599 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2111.392886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2111.402236] Call Trace: [ 2111.404865] dump_stack+0x172/0x1f0 [ 2111.408501] should_fail.cold+0xa/0x1b [ 2111.412412] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2111.417542] ? lock_downgrade+0x810/0x810 [ 2111.421697] ? ___might_sleep+0x163/0x280 [ 2111.421719] __should_failslab+0x121/0x190 [ 2111.421736] should_failslab+0x9/0x14 [ 2111.421750] __kmalloc_track_caller+0x2d8/0x740 [ 2111.421766] ? mntput+0x74/0xa0 [ 2111.421782] ? strndup_user+0x77/0xd0 [ 2111.445655] memdup_user+0x26/0xb0 [ 2111.449196] strndup_user+0x77/0xd0 [ 2111.452822] ksys_mount+0x3c/0x150 [ 2111.456370] __x64_sys_mount+0xbe/0x150 [ 2111.460357] do_syscall_64+0x103/0x610 [ 2111.464246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2111.469442] RIP: 0033:0x45a8aa [ 2111.472669] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2111.491566] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2111.499270] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2111.506569] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2111.513830] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2111.521105] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2111.528366] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x1000000}) 17:52:00 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89009700200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:00 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:00 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890ec000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0xfdfdffff}) [ 2111.727293] FAULT_INJECTION: forcing a failure. [ 2111.727293] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.790763] CPU: 1 PID: 15622 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2111.798172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2111.807530] Call Trace: [ 2111.810128] dump_stack+0x172/0x1f0 [ 2111.813795] should_fail.cold+0xa/0x1b [ 2111.817687] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2111.822793] ? lock_downgrade+0x810/0x810 [ 2111.826991] ? ___might_sleep+0x163/0x280 [ 2111.831211] __should_failslab+0x121/0x190 [ 2111.835478] should_failslab+0x9/0x14 [ 2111.839312] __kmalloc_track_caller+0x2d8/0x740 [ 2111.844001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2111.849680] ? strndup_user+0x77/0xd0 [ 2111.853486] memdup_user+0x26/0xb0 [ 2111.857040] strndup_user+0x77/0xd0 [ 2111.860720] ksys_mount+0x7b/0x150 [ 2111.864281] __x64_sys_mount+0xbe/0x150 [ 2111.868313] do_syscall_64+0x103/0x610 [ 2111.872211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2111.877418] RIP: 0033:0x45a8aa 17:52:00 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2111.880635] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2111.899585] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2111.899597] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2111.899605] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2111.899613] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2111.899620] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2111.899628] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:00 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0xffff8000}) 17:52:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900f000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:00 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0xfffffdfd}) 17:52:00 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2112.185839] FAULT_INJECTION: forcing a failure. [ 2112.185839] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.217295] CPU: 1 PID: 15663 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2112.224574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2112.233917] Call Trace: [ 2112.233937] dump_stack+0x172/0x1f0 [ 2112.233955] should_fail.cold+0xa/0x1b [ 2112.233972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2112.233988] ? lock_downgrade+0x810/0x810 [ 2112.253320] ? ___might_sleep+0x163/0x280 [ 2112.257477] __should_failslab+0x121/0x190 [ 2112.261727] should_failslab+0x9/0x14 [ 2112.265525] kmem_cache_alloc_trace+0x2d1/0x760 [ 2112.270194] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2112.275727] ? _copy_from_user+0xdd/0x150 [ 2112.279873] copy_mount_options+0x5c/0x440 [ 2112.284103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2112.289634] ksys_mount+0xa7/0x150 [ 2112.293167] __x64_sys_mount+0xbe/0x150 [ 2112.297150] do_syscall_64+0x103/0x610 [ 2112.301034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2112.306221] RIP: 0033:0x45a8aa [ 2112.309418] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2112.328313] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:00 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000400000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2112.336031] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2112.343295] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2112.350558] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2112.357819] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2112.365079] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:01 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x80ffff00000000}) 17:52:01 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:01 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000200200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:01 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000400200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x100000000000000}) 17:52:01 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000800200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2112.816255] FAULT_INJECTION: forcing a failure. [ 2112.816255] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.923356] CPU: 0 PID: 15706 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2112.930647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2112.940093] Call Trace: [ 2112.942679] dump_stack+0x172/0x1f0 [ 2112.946314] should_fail.cold+0xa/0x1b [ 2112.950203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2112.955317] ? lock_downgrade+0x810/0x810 [ 2112.959490] ? ___might_sleep+0x163/0x280 [ 2112.963645] __should_failslab+0x121/0x190 [ 2112.967877] should_failslab+0x9/0x14 [ 2112.971674] kmem_cache_alloc_trace+0x2d1/0x760 [ 2112.976343] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2112.981876] ? _copy_from_user+0xdd/0x150 [ 2112.986026] copy_mount_options+0x5c/0x440 [ 2112.990262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2112.995807] ksys_mount+0xa7/0x150 [ 2112.999350] __x64_sys_mount+0xbe/0x150 [ 2113.003325] do_syscall_64+0x103/0x610 [ 2113.007224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2113.012408] RIP: 0033:0x45a8aa [ 2113.015631] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2113.034523] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2113.042225] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2113.049563] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2113.056861] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2113.064137] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2113.071416] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:01 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0xfdfdffff00000000}) 17:52:01 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2113.118088] net_ratelimit: 20 callbacks suppressed [ 2113.118094] protocol 88fb is buggy, dev hsr_slave_0 [ 2113.118099] protocol 88fb is buggy, dev hsr_slave_0 [ 2113.118160] protocol 88fb is buggy, dev hsr_slave_1 [ 2113.123093] protocol 88fb is buggy, dev hsr_slave_1 [ 2113.128186] protocol 88fb is buggy, dev hsr_slave_0 [ 2113.143229] protocol 88fb is buggy, dev hsr_slave_1 [ 2113.244588] FAULT_INJECTION: forcing a failure. [ 2113.244588] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2113.256423] CPU: 1 PID: 15738 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2113.263723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.273078] Call Trace: [ 2113.275693] dump_stack+0x172/0x1f0 [ 2113.279353] should_fail.cold+0xa/0x1b [ 2113.283249] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2113.288357] ? debug_smp_processor_id+0x1c/0x20 [ 2113.293028] ? perf_trace_lock+0xeb/0x510 [ 2113.297189] should_fail_alloc_page+0x50/0x60 [ 2113.301700] __alloc_pages_nodemask+0x1a1/0x710 [ 2113.306381] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2113.311421] ? find_held_lock+0x35/0x130 [ 2113.315531] cache_grow_begin+0x9c/0x8c0 [ 2113.319596] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2113.325153] ? check_preemption_disabled+0x48/0x290 [ 2113.330183] kmem_cache_alloc+0x645/0x710 [ 2113.334347] getname_flags+0xd6/0x5b0 [ 2113.338188] user_path_at_empty+0x2f/0x50 [ 2113.342342] do_mount+0x15e/0x2d30 [ 2113.345882] ? copy_mount_options+0x5c/0x440 [ 2113.350305] ? copy_mount_string+0x40/0x40 [ 2113.354560] ? kmem_cache_alloc_trace+0x354/0x760 [ 2113.359424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2113.365085] ? _copy_from_user+0xdd/0x150 [ 2113.369242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.374780] ? copy_mount_options+0x30e/0x440 [ 2113.379278] ksys_mount+0xdb/0x150 [ 2113.382832] __x64_sys_mount+0xbe/0x150 [ 2113.386818] do_syscall_64+0x103/0x610 [ 2113.390746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2113.395931] RIP: 0033:0x45a8aa [ 2113.399124] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2113.418039] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2113.425792] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2113.433087] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 17:52:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000a00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:01 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000e00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:02 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000f00200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:02 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89001000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2113.440395] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2113.447701] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2113.454963] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2113.496299] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:52:02 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:02 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x80ffff]}) 17:52:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89006000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2113.640661] FAULT_INJECTION: forcing a failure. [ 2113.640661] name failslab, interval 1, probability 0, space 0, times 0 17:52:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x1000000]}) 17:52:02 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89009700200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2113.758022] protocol 88fb is buggy, dev hsr_slave_0 [ 2113.763142] protocol 88fb is buggy, dev hsr_slave_1 [ 2113.793422] CPU: 0 PID: 15779 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 17:52:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0xfdfdffff]}) [ 2113.800720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.810067] Call Trace: [ 2113.812659] dump_stack+0x172/0x1f0 [ 2113.816294] should_fail.cold+0xa/0x1b [ 2113.820182] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2113.825285] ? lock_downgrade+0x810/0x810 [ 2113.825310] ? ___might_sleep+0x163/0x280 [ 2113.825327] __should_failslab+0x121/0x190 [ 2113.837918] should_failslab+0x9/0x14 [ 2113.841757] kmem_cache_alloc_trace+0x2d1/0x760 [ 2113.846444] ? kasan_check_read+0x11/0x20 [ 2113.846459] ? do_raw_spin_unlock+0x57/0x270 [ 2113.846475] ? kill_litter_super+0x60/0x60 [ 2113.846489] sget_userns+0x11b/0xd30 [ 2113.862946] ? kill_litter_super+0x60/0x60 [ 2113.867178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.872724] ? ns_test_super+0x50/0x50 [ 2113.876625] ? ns_test_super+0x50/0x50 [ 2113.880519] ? kill_litter_super+0x60/0x60 [ 2113.884748] sget+0x10c/0x150 [ 2113.887851] mount_bdev+0xff/0x3c0 [ 2113.891483] ? finish_unfinished+0x1120/0x1120 [ 2113.896072] get_super_block+0x35/0x40 [ 2113.899950] mount_fs+0x106/0x3ff [ 2113.903412] ? emergency_thaw_all+0x1a0/0x1a0 [ 2113.907909] ? __init_waitqueue_head+0x36/0x90 [ 2113.912524] vfs_kern_mount.part.0+0x6f/0x410 [ 2113.917021] do_mount+0x581/0x2d30 [ 2113.920571] ? finish_automount+0x461/0x490 [ 2113.924892] ? copy_mount_string+0x40/0x40 [ 2113.929118] ? kmem_cache_alloc_trace+0x354/0x760 [ 2113.933956] ? _copy_from_user+0xdd/0x150 [ 2113.938115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.943643] ? copy_mount_options+0x30e/0x440 [ 2113.948135] ksys_mount+0xdb/0x150 [ 2113.951684] __x64_sys_mount+0xbe/0x150 [ 2113.955661] do_syscall_64+0x103/0x610 [ 2113.959543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2113.964733] RIP: 0033:0x45a8aa [ 2113.967919] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2113.986842] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2113.994538] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2113.998045] protocol 88fb is buggy, dev hsr_slave_0 [ 2114.001799] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2114.001808] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2114.006852] protocol 88fb is buggy, dev hsr_slave_1 [ 2114.014101] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2114.014109] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:02 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900f000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0xffff8000]}) [ 2114.225050] FAULT_INJECTION: forcing a failure. [ 2114.225050] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.253326] CPU: 1 PID: 15816 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2114.260606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.269966] Call Trace: [ 2114.272585] dump_stack+0x172/0x1f0 [ 2114.272619] should_fail.cold+0xa/0x1b [ 2114.280111] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2114.285228] ? lock_downgrade+0x810/0x810 [ 2114.289397] ? ___might_sleep+0x163/0x280 [ 2114.293555] __should_failslab+0x121/0x190 [ 2114.297854] should_failslab+0x9/0x14 [ 2114.301674] __kmalloc_track_caller+0x2d8/0x740 [ 2114.306355] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2114.311834] ? alloc_vfsmnt+0x28/0x780 [ 2114.315724] ? kstrdup_const+0x66/0x80 [ 2114.319608] kstrdup+0x3a/0x70 [ 2114.322841] kstrdup_const+0x66/0x80 [ 2114.326557] alloc_vfsmnt+0xba/0x780 [ 2114.330339] vfs_kern_mount.part.0+0x2a/0x410 [ 2114.334853] do_mount+0x581/0x2d30 [ 2114.338444] ? finish_automount+0x461/0x490 [ 2114.342766] ? copy_mount_string+0x40/0x40 [ 2114.347013] ? kmem_cache_alloc_trace+0x354/0x760 [ 2114.351853] ? _copy_from_user+0xdd/0x150 [ 2114.356032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2114.361585] ? copy_mount_options+0x30e/0x440 [ 2114.366115] ksys_mount+0xdb/0x150 [ 2114.369658] __x64_sys_mount+0xbe/0x150 [ 2114.373634] do_syscall_64+0x103/0x610 [ 2114.377530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2114.382710] RIP: 0033:0x45a8aa [ 2114.385919] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2114.404830] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2114.412532] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2114.419793] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2114.427072] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2114.434348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2114.441621] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000a200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0xfffffdfd]}) 17:52:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000e200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x80ffff00000000]}) 17:52:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900c00e200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2114.856512] FAULT_INJECTION: forcing a failure. [ 2114.856512] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.921245] CPU: 1 PID: 15857 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2114.928550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.937923] Call Trace: [ 2114.940514] dump_stack+0x172/0x1f0 [ 2114.944158] should_fail.cold+0xa/0x1b [ 2114.948041] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2114.953141] ? lock_downgrade+0x810/0x810 [ 2114.957390] ? ___might_sleep+0x163/0x280 [ 2114.961545] __should_failslab+0x121/0x190 [ 2114.965777] should_failslab+0x9/0x14 [ 2114.969588] __kmalloc+0x2dc/0x740 [ 2114.973134] ? lockdep_init_map+0x10c/0x5b0 [ 2114.977486] ? prealloc_shrinker+0xdf/0x340 [ 2114.981808] prealloc_shrinker+0xdf/0x340 [ 2114.985952] sget_userns+0x7ef/0xd30 [ 2114.989697] ? kill_litter_super+0x60/0x60 [ 2114.993943] ? ns_test_super+0x50/0x50 [ 2114.997825] ? ns_test_super+0x50/0x50 [ 2115.001704] ? kill_litter_super+0x60/0x60 [ 2115.005930] sget+0x10c/0x150 [ 2115.009039] mount_bdev+0xff/0x3c0 [ 2115.012573] ? finish_unfinished+0x1120/0x1120 [ 2115.017169] get_super_block+0x35/0x40 [ 2115.021050] mount_fs+0x106/0x3ff [ 2115.024497] ? emergency_thaw_all+0x1a0/0x1a0 [ 2115.028987] ? __init_waitqueue_head+0x36/0x90 [ 2115.033589] vfs_kern_mount.part.0+0x6f/0x410 [ 2115.038097] do_mount+0x581/0x2d30 [ 2115.041656] ? copy_mount_string+0x40/0x40 [ 2115.045894] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 2115.050648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2115.056209] ? copy_mount_options+0x30e/0x440 [ 2115.060703] ksys_mount+0xdb/0x150 [ 2115.064242] __x64_sys_mount+0xbe/0x150 [ 2115.068217] do_syscall_64+0x103/0x610 [ 2115.072110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2115.077325] RIP: 0033:0x45a8aa [ 2115.080513] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2115.099410] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2115.107151] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2115.114437] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 17:52:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2115.121814] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2115.129082] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2115.136340] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:03 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:03 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x100000000000000]}) 17:52:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2115.389200] FAULT_INJECTION: forcing a failure. [ 2115.389200] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2115.401025] CPU: 0 PID: 15889 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2115.408293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2115.417660] Call Trace: [ 2115.420251] dump_stack+0x172/0x1f0 [ 2115.423883] should_fail.cold+0xa/0x1b [ 2115.427773] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2115.432885] should_fail_alloc_page+0x50/0x60 [ 2115.437390] __alloc_pages_nodemask+0x1a1/0x710 [ 2115.442057] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2115.447063] ? find_held_lock+0x35/0x130 [ 2115.451150] cache_grow_begin+0x9c/0x8c0 [ 2115.455221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2115.460757] ? check_preemption_disabled+0x48/0x290 [ 2115.465817] kmem_cache_alloc+0x645/0x710 [ 2115.469957] ? find_held_lock+0x35/0x130 [ 2115.474020] getname_kernel+0x53/0x370 [ 2115.477903] kern_path+0x20/0x40 [ 2115.481267] lookup_bdev.part.0+0x7b/0x1b0 [ 2115.485508] ? blkdev_open+0x290/0x290 17:52:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000f200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2115.489388] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2115.489402] ? rcu_read_lock_sched_held+0x110/0x130 [ 2115.489414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2115.489428] blkdev_get_by_path+0x81/0x130 [ 2115.489456] mount_bdev+0x5d/0x3c0 [ 2115.505423] ? finish_unfinished+0x1120/0x1120 [ 2115.505449] get_super_block+0x35/0x40 [ 2115.505463] mount_fs+0x106/0x3ff [ 2115.505476] ? emergency_thaw_all+0x1a0/0x1a0 [ 2115.521699] ? __init_waitqueue_head+0x36/0x90 [ 2115.521748] vfs_kern_mount.part.0+0x6f/0x410 [ 2115.521766] do_mount+0x581/0x2d30 [ 2115.521781] ? finish_automount+0x461/0x490 [ 2115.546554] ? copy_mount_string+0x40/0x40 [ 2115.550807] ? kmem_cache_alloc_trace+0x354/0x760 [ 2115.555670] ? _copy_from_user+0xdd/0x150 [ 2115.559814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2115.565516] ? copy_mount_options+0x30e/0x440 [ 2115.570007] ksys_mount+0xdb/0x150 [ 2115.573553] __x64_sys_mount+0xbe/0x150 [ 2115.577539] do_syscall_64+0x103/0x610 [ 2115.581422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2115.586658] RIP: 0033:0x45a8aa [ 2115.589844] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2115.608766] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2115.616483] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2115.623743] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2115.631014] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 17:52:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2115.638271] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2115.645527] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x11}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0xfdfdffff00000000]}) 17:52:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900003f200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2115.894993] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:52:04 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000060200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x80ffff]}) 17:52:04 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000097200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:04 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa00}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2116.100681] FAULT_INJECTION: forcing a failure. [ 2116.100681] name failslab, interval 1, probability 0, space 0, times 0 [ 2116.159770] CPU: 1 PID: 15934 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2116.167061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2116.176478] Call Trace: [ 2116.179099] dump_stack+0x172/0x1f0 [ 2116.182753] should_fail.cold+0xa/0x1b [ 2116.186653] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2116.191762] ? lock_downgrade+0x810/0x810 [ 2116.195913] ? ___might_sleep+0x163/0x280 [ 2116.200063] __should_failslab+0x121/0x190 [ 2116.204379] should_failslab+0x9/0x14 [ 2116.208178] __kmalloc+0x2dc/0x740 [ 2116.211719] ? __list_lru_init+0xd5/0x6e0 [ 2116.215881] __list_lru_init+0xd5/0x6e0 [ 2116.219856] sget_userns+0x81e/0xd30 [ 2116.223578] ? kill_litter_super+0x60/0x60 [ 2116.227810] ? ns_test_super+0x50/0x50 [ 2116.231710] ? ns_test_super+0x50/0x50 [ 2116.235624] ? kill_litter_super+0x60/0x60 [ 2116.239860] sget+0x10c/0x150 [ 2116.242990] mount_bdev+0xff/0x3c0 [ 2116.246533] ? finish_unfinished+0x1120/0x1120 [ 2116.251129] get_super_block+0x35/0x40 [ 2116.255013] mount_fs+0x106/0x3ff [ 2116.258469] ? emergency_thaw_all+0x1a0/0x1a0 [ 2116.262973] ? __init_waitqueue_head+0x36/0x90 [ 2116.267555] vfs_kern_mount.part.0+0x6f/0x410 [ 2116.272050] do_mount+0x581/0x2d30 [ 2116.275606] ? finish_automount+0x461/0x490 [ 2116.279930] ? copy_mount_string+0x40/0x40 [ 2116.284205] ? kmem_cache_alloc_trace+0x354/0x760 [ 2116.289074] ? _copy_from_user+0xdd/0x150 [ 2116.293230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2116.298768] ? copy_mount_options+0x30e/0x440 [ 2116.303278] ksys_mount+0xdb/0x150 [ 2116.306821] __x64_sys_mount+0xbe/0x150 [ 2116.310818] do_syscall_64+0x103/0x610 [ 2116.314738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2116.319967] RIP: 0033:0x45a8aa [ 2116.323162] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2116.342058] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2116.349758] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x1000000]}) [ 2116.357019] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2116.364279] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2116.371547] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2116.378849] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:05 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1100}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000ec0200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0xfdfdffff]}) 17:52:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2116.584118] FAULT_INJECTION: forcing a failure. [ 2116.584118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2116.595962] CPU: 0 PID: 15966 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2116.595984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2116.595988] Call Trace: [ 2116.596005] dump_stack+0x172/0x1f0 [ 2116.596020] should_fail.cold+0xa/0x1b [ 2116.622693] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2116.627824] should_fail_alloc_page+0x50/0x60 [ 2116.632331] __alloc_pages_nodemask+0x1a1/0x710 [ 2116.637005] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2116.642014] ? find_held_lock+0x35/0x130 [ 2116.646075] cache_grow_begin+0x9c/0x8c0 [ 2116.650127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2116.655654] ? check_preemption_disabled+0x48/0x290 [ 2116.660669] kmem_cache_alloc+0x645/0x710 [ 2116.664821] ? find_held_lock+0x35/0x130 [ 2116.668909] getname_kernel+0x53/0x370 [ 2116.672808] kern_path+0x20/0x40 [ 2116.676181] lookup_bdev.part.0+0x7b/0x1b0 [ 2116.680419] ? blkdev_open+0x290/0x290 [ 2116.684319] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2116.689757] ? rcu_read_lock_sched_held+0x110/0x130 [ 2116.694909] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2116.700444] blkdev_get_by_path+0x81/0x130 [ 2116.704694] mount_bdev+0x5d/0x3c0 [ 2116.708225] ? finish_unfinished+0x1120/0x1120 [ 2116.712805] get_super_block+0x35/0x40 [ 2116.716692] mount_fs+0x106/0x3ff [ 2116.720163] ? emergency_thaw_all+0x1a0/0x1a0 [ 2116.724652] ? __init_waitqueue_head+0x36/0x90 [ 2116.729230] vfs_kern_mount.part.0+0x6f/0x410 [ 2116.733722] do_mount+0x581/0x2d30 [ 2116.737253] ? finish_automount+0x461/0x490 [ 2116.741575] ? copy_mount_string+0x40/0x40 [ 2116.745819] ? kmem_cache_alloc_trace+0x354/0x760 [ 2116.750669] ? _copy_from_user+0xdd/0x150 [ 2116.754822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2116.760359] ? copy_mount_options+0x30e/0x440 [ 2116.764852] ksys_mount+0xdb/0x150 [ 2116.768412] __x64_sys_mount+0xbe/0x150 [ 2116.772388] do_syscall_64+0x103/0x610 [ 2116.776269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2116.781542] RIP: 0033:0x45a8aa [ 2116.784726] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2116.803613] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2116.811308] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2116.818583] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2116.825843] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2116.833127] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2116.840395] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3e80}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000f0200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2117.026087] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 17:52:05 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3ec0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000002200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0xffff8000]}) 17:52:05 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:05 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2117.243636] FAULT_INJECTION: forcing a failure. [ 2117.243636] name failslab, interval 1, probability 0, space 0, times 0 [ 2117.258131] CPU: 1 PID: 16008 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2117.265437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2117.274796] Call Trace: [ 2117.277382] dump_stack+0x172/0x1f0 [ 2117.281024] should_fail.cold+0xa/0x1b [ 2117.284936] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2117.290043] ? lock_downgrade+0x810/0x810 [ 2117.294207] ? ___might_sleep+0x163/0x280 [ 2117.298392] __should_failslab+0x121/0x190 [ 2117.302627] should_failslab+0x9/0x14 [ 2117.306419] __kmalloc+0x2dc/0x740 [ 2117.309963] ? __list_lru_init+0xd5/0x6e0 [ 2117.314114] __list_lru_init+0xd5/0x6e0 [ 2117.318135] sget_userns+0x81e/0xd30 [ 2117.321873] ? kill_litter_super+0x60/0x60 [ 2117.326108] ? ns_test_super+0x50/0x50 [ 2117.329992] ? ns_test_super+0x50/0x50 [ 2117.333871] ? kill_litter_super+0x60/0x60 [ 2117.338101] sget+0x10c/0x150 [ 2117.341214] mount_bdev+0xff/0x3c0 [ 2117.344746] ? finish_unfinished+0x1120/0x1120 [ 2117.349322] get_super_block+0x35/0x40 [ 2117.353203] mount_fs+0x106/0x3ff [ 2117.356651] ? emergency_thaw_all+0x1a0/0x1a0 [ 2117.361140] ? __init_waitqueue_head+0x36/0x90 [ 2117.365721] vfs_kern_mount.part.0+0x6f/0x410 [ 2117.370214] do_mount+0x581/0x2d30 [ 2117.373745] ? finish_automount+0x461/0x490 [ 2117.378074] ? copy_mount_string+0x40/0x40 [ 2117.382317] ? kmem_cache_alloc_trace+0x354/0x760 [ 2117.387190] ? _copy_from_user+0xdd/0x150 [ 2117.391333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2117.396876] ? copy_mount_options+0x30e/0x440 [ 2117.401371] ksys_mount+0xdb/0x150 [ 2117.404942] __x64_sys_mount+0xbe/0x150 [ 2117.408958] do_syscall_64+0x103/0x610 [ 2117.412859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2117.418065] RIP: 0033:0x45a8aa [ 2117.421261] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2117.440187] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2117.447914] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2117.455173] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2117.462440] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2117.469700] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2117.476960] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x2, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000004200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0xfffffdfd]}) 17:52:06 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x301, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x80ffff00000000]}) 17:52:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000008200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x200072ca, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2117.803259] FAULT_INJECTION: forcing a failure. [ 2117.803259] name failslab, interval 1, probability 0, space 0, times 0 [ 2117.838880] CPU: 1 PID: 16044 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2117.846183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2117.855523] Call Trace: [ 2117.855542] dump_stack+0x172/0x1f0 [ 2117.855559] should_fail.cold+0xa/0x1b [ 2117.861747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2117.861776] ? lock_downgrade+0x810/0x810 [ 2117.861803] ? ___might_sleep+0x163/0x280 [ 2117.861820] __should_failslab+0x121/0x190 [ 2117.883250] should_failslab+0x9/0x14 [ 2117.887047] kmem_cache_alloc_trace+0x2d1/0x760 [ 2117.891712] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2117.896832] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2117.901761] __list_lru_init+0x3d3/0x6e0 [ 2117.905825] sget_userns+0x81e/0xd30 [ 2117.909534] ? kill_litter_super+0x60/0x60 [ 2117.913773] ? ns_test_super+0x50/0x50 [ 2117.917662] ? ns_test_super+0x50/0x50 [ 2117.921575] ? kill_litter_super+0x60/0x60 [ 2117.925804] sget+0x10c/0x150 [ 2117.928930] mount_bdev+0xff/0x3c0 [ 2117.932466] ? finish_unfinished+0x1120/0x1120 [ 2117.937046] get_super_block+0x35/0x40 [ 2117.940949] mount_fs+0x106/0x3ff [ 2117.944402] ? emergency_thaw_all+0x1a0/0x1a0 [ 2117.948898] ? __init_waitqueue_head+0x36/0x90 [ 2117.953493] vfs_kern_mount.part.0+0x6f/0x410 [ 2117.957990] do_mount+0x581/0x2d30 [ 2117.961528] ? finish_automount+0x461/0x490 [ 2117.965860] ? copy_mount_string+0x40/0x40 [ 2117.970117] ? kmem_cache_alloc_trace+0x354/0x760 [ 2117.974960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2117.980488] ? copy_mount_options+0x30e/0x440 [ 2117.984977] ksys_mount+0xdb/0x150 [ 2117.988539] __x64_sys_mount+0xbe/0x150 [ 2117.992572] do_syscall_64+0x103/0x610 [ 2117.996463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2118.001643] RIP: 0033:0x45a8aa [ 2118.004829] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2118.023720] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2118.031421] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2118.038699] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2118.046022] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 17:52:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x100000000000000]}) [ 2118.053307] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2118.060658] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000a200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2118.158005] net_ratelimit: 22 callbacks suppressed [ 2118.158011] protocol 88fb is buggy, dev hsr_slave_0 [ 2118.168011] protocol 88fb is buggy, dev hsr_slave_1 17:52:06 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:06 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0xfdfdffff00000000]}) 17:52:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x33fe0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:06 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000e200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2118.381812] FAULT_INJECTION: forcing a failure. [ 2118.381812] name failslab, interval 1, probability 0, space 0, times 0 17:52:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2118.424091] CPU: 0 PID: 16084 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2118.431368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2118.440713] Call Trace: [ 2118.443301] dump_stack+0x172/0x1f0 [ 2118.446926] should_fail.cold+0xa/0x1b [ 2118.450832] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2118.455961] ? lock_downgrade+0x810/0x810 [ 2118.460148] ? ___might_sleep+0x163/0x280 [ 2118.464316] __should_failslab+0x121/0x190 [ 2118.468581] should_failslab+0x9/0x14 17:52:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x80ffff]}) 17:52:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2118.472375] kmem_cache_alloc_trace+0x2d1/0x760 [ 2118.477040] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2118.482172] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2118.487115] __list_lru_init+0x3d3/0x6e0 [ 2118.491211] sget_userns+0x81e/0xd30 [ 2118.494926] ? kill_litter_super+0x60/0x60 [ 2118.499163] ? ns_test_super+0x50/0x50 [ 2118.503064] ? ns_test_super+0x50/0x50 [ 2118.506986] ? kill_litter_super+0x60/0x60 [ 2118.511228] sget+0x10c/0x150 [ 2118.514335] mount_bdev+0xff/0x3c0 [ 2118.517876] ? finish_unfinished+0x1120/0x1120 [ 2118.522473] get_super_block+0x35/0x40 [ 2118.526378] mount_fs+0x106/0x3ff [ 2118.529831] ? emergency_thaw_all+0x1a0/0x1a0 [ 2118.534332] ? __init_waitqueue_head+0x36/0x90 [ 2118.538907] vfs_kern_mount.part.0+0x6f/0x410 [ 2118.543396] do_mount+0x581/0x2d30 [ 2118.546956] ? finish_automount+0x461/0x490 [ 2118.551289] ? copy_mount_string+0x40/0x40 [ 2118.555514] ? kmem_cache_alloc_trace+0x354/0x760 [ 2118.560358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2118.566361] ? copy_mount_options+0x30e/0x440 [ 2118.570878] ksys_mount+0xdb/0x150 [ 2118.574454] __x64_sys_mount+0xbe/0x150 [ 2118.578425] do_syscall_64+0x103/0x610 [ 2118.582320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2118.587493] RIP: 0033:0x45a8aa [ 2118.590676] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2118.609568] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2118.617262] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2118.624587] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2118.631842] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2118.639109] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2118.646366] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2118.658069] protocol 88fb is buggy, dev hsr_slave_0 [ 2118.663182] protocol 88fb is buggy, dev hsr_slave_1 17:52:07 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x34000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000f200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x1000000]}) 17:52:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0xfdfdffff]}) 17:52:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000010200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:07 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2119.114673] FAULT_INJECTION: forcing a failure. [ 2119.114673] name failslab, interval 1, probability 0, space 0, times 0 [ 2119.155508] CPU: 0 PID: 16123 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2119.162809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2119.172167] Call Trace: [ 2119.174755] dump_stack+0x172/0x1f0 [ 2119.178389] should_fail.cold+0xa/0x1b [ 2119.182277] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2119.187392] ? lock_downgrade+0x810/0x810 [ 2119.191559] ? ___might_sleep+0x163/0x280 [ 2119.195736] __should_failslab+0x121/0x190 [ 2119.199970] should_failslab+0x9/0x14 [ 2119.203777] kmem_cache_alloc_trace+0x2d1/0x760 [ 2119.208493] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2119.213600] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2119.218543] __list_lru_init+0x3d3/0x6e0 [ 2119.222605] sget_userns+0x81e/0xd30 [ 2119.226351] ? kill_litter_super+0x60/0x60 [ 2119.230602] ? ns_test_super+0x50/0x50 [ 2119.234486] ? ns_test_super+0x50/0x50 [ 2119.238370] ? kill_litter_super+0x60/0x60 [ 2119.242599] sget+0x10c/0x150 [ 2119.245740] mount_bdev+0xff/0x3c0 [ 2119.249282] ? finish_unfinished+0x1120/0x1120 [ 2119.253889] get_super_block+0x35/0x40 [ 2119.257794] mount_fs+0x106/0x3ff [ 2119.261247] ? emergency_thaw_all+0x1a0/0x1a0 [ 2119.265738] ? __init_waitqueue_head+0x36/0x90 [ 2119.270317] vfs_kern_mount.part.0+0x6f/0x410 [ 2119.274861] do_mount+0x581/0x2d30 [ 2119.278415] ? finish_automount+0x461/0x490 [ 2119.282753] ? copy_mount_string+0x40/0x40 [ 2119.286998] ? kmem_cache_alloc_trace+0x354/0x760 [ 2119.291837] ? _copy_from_user+0xdd/0x150 [ 2119.296005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2119.301585] ? copy_mount_options+0x30e/0x440 [ 2119.306090] ksys_mount+0xdb/0x150 [ 2119.309631] __x64_sys_mount+0xbe/0x150 [ 2119.313620] do_syscall_64+0x103/0x610 [ 2119.317512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2119.322696] RIP: 0033:0x45a8aa [ 2119.325884] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2119.344777] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2119.352534] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2119.359803] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2119.367079] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2119.374336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2119.381620] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:08 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000060200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0xffff8000]}) 17:52:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x400300}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000097200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2119.518016] protocol 88fb is buggy, dev hsr_slave_0 [ 2119.518020] protocol 88fb is buggy, dev hsr_slave_0 [ 2119.518059] protocol 88fb is buggy, dev hsr_slave_1 [ 2119.523078] protocol 88fb is buggy, dev hsr_slave_1 [ 2119.538183] protocol 88fb is buggy, dev hsr_slave_0 [ 2119.543230] protocol 88fb is buggy, dev hsr_slave_1 [ 2119.551442] FAULT_INJECTION: forcing a failure. [ 2119.551442] name failslab, interval 1, probability 0, space 0, times 0 [ 2119.578907] CPU: 1 PID: 16154 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2119.586202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2119.595548] Call Trace: [ 2119.598174] dump_stack+0x172/0x1f0 [ 2119.601847] should_fail.cold+0xa/0x1b [ 2119.605731] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2119.610837] ? lock_downgrade+0x810/0x810 [ 2119.614999] ? ___might_sleep+0x163/0x280 [ 2119.619159] __should_failslab+0x121/0x190 [ 2119.623393] should_failslab+0x9/0x14 [ 2119.627191] kmem_cache_alloc_node_trace+0x270/0x720 [ 2119.632298] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2119.637754] __kmalloc_node+0x3d/0x70 [ 2119.641556] kvmalloc_node+0x68/0x100 [ 2119.645356] __list_lru_init+0x4aa/0x6e0 [ 2119.649480] sget_userns+0x81e/0xd30 [ 2119.653208] ? kill_litter_super+0x60/0x60 [ 2119.657513] ? ns_test_super+0x50/0x50 [ 2119.661410] ? ns_test_super+0x50/0x50 [ 2119.665308] ? kill_litter_super+0x60/0x60 [ 2119.669682] sget+0x10c/0x150 [ 2119.672786] mount_bdev+0xff/0x3c0 [ 2119.676322] ? finish_unfinished+0x1120/0x1120 [ 2119.680933] get_super_block+0x35/0x40 [ 2119.684861] mount_fs+0x106/0x3ff [ 2119.688319] ? emergency_thaw_all+0x1a0/0x1a0 [ 2119.692833] ? __init_waitqueue_head+0x36/0x90 [ 2119.697477] vfs_kern_mount.part.0+0x6f/0x410 [ 2119.701976] do_mount+0x581/0x2d30 [ 2119.705523] ? finish_automount+0x461/0x490 [ 2119.709874] ? copy_mount_string+0x40/0x40 [ 2119.714109] ? kmem_cache_alloc_trace+0x354/0x760 [ 2119.718948] ? _copy_from_user+0xdd/0x150 [ 2119.723128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2119.728680] ? copy_mount_options+0x30e/0x440 [ 2119.733177] ksys_mount+0xdb/0x150 [ 2119.736738] __x64_sys_mount+0xbe/0x150 [ 2119.740748] do_syscall_64+0x103/0x610 [ 2119.744639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2119.749837] RIP: 0033:0x45a8aa [ 2119.753082] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2119.771998] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x2, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x301, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x200072ca, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2119.779743] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2119.787009] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2119.794270] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2119.801540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2119.808802] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:08 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0xfffffdfd]}) 17:52:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000400000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x80ffff00000000]}) 17:52:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:08 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2120.056986] FAULT_INJECTION: forcing a failure. [ 2120.056986] name failslab, interval 1, probability 0, space 0, times 0 [ 2120.118039] CPU: 0 PID: 16194 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2120.125319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2120.134668] Call Trace: [ 2120.137260] dump_stack+0x172/0x1f0 [ 2120.140893] should_fail.cold+0xa/0x1b [ 2120.144803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2120.149903] ? lock_downgrade+0x810/0x810 [ 2120.154050] ? ___might_sleep+0x163/0x280 [ 2120.158200] __should_failslab+0x121/0x190 [ 2120.162452] should_failslab+0x9/0x14 [ 2120.166247] kmem_cache_alloc_trace+0x2d1/0x760 [ 2120.170912] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2120.176016] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2120.180998] __list_lru_init+0x3d3/0x6e0 [ 2120.185102] sget_userns+0x81e/0xd30 [ 2120.188816] ? kill_litter_super+0x60/0x60 [ 2120.193081] ? ns_test_super+0x50/0x50 [ 2120.196966] ? ns_test_super+0x50/0x50 [ 2120.200859] ? kill_litter_super+0x60/0x60 [ 2120.205100] sget+0x10c/0x150 [ 2120.208207] mount_bdev+0xff/0x3c0 [ 2120.211739] ? finish_unfinished+0x1120/0x1120 [ 2120.216317] get_super_block+0x35/0x40 [ 2120.220214] mount_fs+0x106/0x3ff [ 2120.223669] ? emergency_thaw_all+0x1a0/0x1a0 [ 2120.228175] ? __init_waitqueue_head+0x36/0x90 [ 2120.232761] vfs_kern_mount.part.0+0x6f/0x410 [ 2120.237276] do_mount+0x581/0x2d30 [ 2120.240814] ? finish_automount+0x461/0x490 [ 2120.245140] ? copy_mount_string+0x40/0x40 [ 2120.249396] ? kmem_cache_alloc_trace+0x354/0x760 [ 2120.254237] ? _copy_from_user+0xdd/0x150 [ 2120.258397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2120.263942] ? copy_mount_options+0x30e/0x440 [ 2120.268458] ksys_mount+0xdb/0x150 [ 2120.272000] __x64_sys_mount+0xbe/0x150 [ 2120.275970] do_syscall_64+0x103/0x610 [ 2120.279855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2120.285049] RIP: 0033:0x45a8aa [ 2120.288275] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2120.307188] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000040001ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2120.314890] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2120.322179] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2120.329445] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2120.336708] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2120.343997] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:09 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x100000000000000]}) 17:52:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200200000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x11000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200400000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0xfdfdffff00000000]}) 17:52:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2120.779936] FAULT_INJECTION: forcing a failure. [ 2120.779936] name failslab, interval 1, probability 0, space 0, times 0 [ 2120.800474] CPU: 1 PID: 16232 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2120.807751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2120.807757] Call Trace: [ 2120.807777] dump_stack+0x172/0x1f0 [ 2120.807797] should_fail.cold+0xa/0x1b [ 2120.827247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2120.832391] ? lock_downgrade+0x810/0x810 [ 2120.836643] ? ___might_sleep+0x163/0x280 [ 2120.840784] __should_failslab+0x121/0x190 [ 2120.845018] should_failslab+0x9/0x14 [ 2120.848831] kmem_cache_alloc_trace+0x2d1/0x760 [ 2120.853501] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2120.858598] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2120.863532] __list_lru_init+0x3d3/0x6e0 [ 2120.867612] sget_userns+0x81e/0xd30 [ 2120.871314] ? kill_litter_super+0x60/0x60 [ 2120.875583] ? ns_test_super+0x50/0x50 [ 2120.879479] ? ns_test_super+0x50/0x50 [ 2120.883357] ? kill_litter_super+0x60/0x60 [ 2120.887584] sget+0x10c/0x150 [ 2120.890715] mount_bdev+0xff/0x3c0 [ 2120.894271] ? finish_unfinished+0x1120/0x1120 [ 2120.898880] get_super_block+0x35/0x40 [ 2120.902761] mount_fs+0x106/0x3ff [ 2120.906251] ? emergency_thaw_all+0x1a0/0x1a0 [ 2120.910763] ? __init_waitqueue_head+0x36/0x90 [ 2120.915339] vfs_kern_mount.part.0+0x6f/0x410 [ 2120.919915] do_mount+0x581/0x2d30 [ 2120.923449] ? finish_automount+0x461/0x490 [ 2120.927767] ? copy_mount_string+0x40/0x40 [ 2120.931989] ? kmem_cache_alloc_trace+0x354/0x760 [ 2120.936835] ? _copy_from_user+0xdd/0x150 [ 2120.940975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2120.946499] ? copy_mount_options+0x30e/0x440 [ 2120.950991] ksys_mount+0xdb/0x150 [ 2120.954525] __x64_sys_mount+0xbe/0x150 [ 2120.958496] do_syscall_64+0x103/0x610 [ 2120.962376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2120.967553] RIP: 0033:0x45a8aa [ 2120.970735] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2120.989623] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2120.997417] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2121.004692] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2121.011950] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2121.019206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2121.026477] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:09 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x80ffff]}) 17:52:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200800000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:09 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2121.182094] FAULT_INJECTION: forcing a failure. [ 2121.182094] name failslab, interval 1, probability 0, space 0, times 0 [ 2121.211207] CPU: 0 PID: 16271 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2121.218492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.227861] Call Trace: [ 2121.227878] dump_stack+0x172/0x1f0 [ 2121.227895] should_fail.cold+0xa/0x1b [ 2121.237944] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2121.243044] ? lock_downgrade+0x810/0x810 [ 2121.247192] ? ___might_sleep+0x163/0x280 [ 2121.251344] __should_failslab+0x121/0x190 [ 2121.255578] should_failslab+0x9/0x14 [ 2121.259379] kmem_cache_alloc_trace+0x2d1/0x760 [ 2121.264044] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2121.264062] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2121.264079] __list_lru_init+0x3d3/0x6e0 [ 2121.274079] sget_userns+0x81e/0xd30 [ 2121.274092] ? kill_litter_super+0x60/0x60 [ 2121.274107] ? ns_test_super+0x50/0x50 [ 2121.286104] ? ns_test_super+0x50/0x50 [ 2121.286115] ? kill_litter_super+0x60/0x60 [ 2121.286127] sget+0x10c/0x150 [ 2121.286141] mount_bdev+0xff/0x3c0 [ 2121.293907] ? finish_unfinished+0x1120/0x1120 [ 2121.293924] get_super_block+0x35/0x40 [ 2121.293941] mount_fs+0x106/0x3ff [ 2121.304755] ? emergency_thaw_all+0x1a0/0x1a0 [ 2121.304768] ? __init_waitqueue_head+0x36/0x90 [ 2121.304794] vfs_kern_mount.part.0+0x6f/0x410 [ 2121.313231] do_mount+0x581/0x2d30 [ 2121.313245] ? finish_automount+0x461/0x490 [ 2121.313271] ? copy_mount_string+0x40/0x40 [ 2121.342282] ? kmem_cache_alloc_trace+0x354/0x760 [ 2121.347127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.352691] ? copy_mount_options+0x30e/0x440 [ 2121.357205] ksys_mount+0xdb/0x150 [ 2121.360749] __x64_sys_mount+0xbe/0x150 [ 2121.364764] do_syscall_64+0x103/0x610 [ 2121.368662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2121.373869] RIP: 0033:0x45a8aa [ 2121.377118] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2121.396027] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2121.403739] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2121.411014] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2121.418277] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2121.425539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:52:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x1000000]}) 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc0000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200a00000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2121.432807] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:10 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0xfdfdffff]}) 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2121.601799] FAULT_INJECTION: forcing a failure. [ 2121.601799] name failslab, interval 1, probability 0, space 0, times 0 [ 2121.629258] CPU: 0 PID: 16297 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2121.636545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.645887] Call Trace: [ 2121.648525] dump_stack+0x172/0x1f0 [ 2121.652205] should_fail.cold+0xa/0x1b [ 2121.656141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2121.661244] ? lock_downgrade+0x810/0x810 [ 2121.665403] ? ___might_sleep+0x163/0x280 [ 2121.669564] __should_failslab+0x121/0x190 [ 2121.673822] should_failslab+0x9/0x14 [ 2121.677667] kmem_cache_alloc_trace+0x2d1/0x760 [ 2121.682364] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2121.687485] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2121.692427] __list_lru_init+0x3d3/0x6e0 [ 2121.696516] sget_userns+0x81e/0xd30 [ 2121.700226] ? kill_litter_super+0x60/0x60 [ 2121.704490] ? ns_test_super+0x50/0x50 [ 2121.704505] ? ns_test_super+0x50/0x50 [ 2121.704519] ? kill_litter_super+0x60/0x60 [ 2121.716555] sget+0x10c/0x150 [ 2121.719678] mount_bdev+0xff/0x3c0 [ 2121.723232] ? finish_unfinished+0x1120/0x1120 [ 2121.727833] get_super_block+0x35/0x40 [ 2121.731724] mount_fs+0x106/0x3ff [ 2121.735183] ? emergency_thaw_all+0x1a0/0x1a0 [ 2121.739685] ? __init_waitqueue_head+0x36/0x90 [ 2121.739705] vfs_kern_mount.part.0+0x6f/0x410 [ 2121.739723] do_mount+0x581/0x2d30 17:52:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0xffff8000]}) 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2121.739737] ? finish_automount+0x461/0x490 [ 2121.739753] ? copy_mount_string+0x40/0x40 [ 2121.756657] ? kmem_cache_alloc_trace+0x354/0x760 [ 2121.756676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.756689] ? copy_mount_options+0x30e/0x440 [ 2121.775772] ksys_mount+0xdb/0x150 [ 2121.779321] __x64_sys_mount+0xbe/0x150 [ 2121.783295] do_syscall_64+0x103/0x610 [ 2121.787184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2121.792361] RIP: 0033:0x45a8aa 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2121.795563] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2121.814464] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2121.822184] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2121.822193] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2121.822201] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2121.822208] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:52:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200e00000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2121.822219] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0xfffffdfd]}) 17:52:10 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200f00000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xe03f0300}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x80ffff00000000]}) 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000201000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:10 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2122.159654] FAULT_INJECTION: forcing a failure. [ 2122.159654] name failslab, interval 1, probability 0, space 0, times 0 17:52:10 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2122.228331] CPU: 0 PID: 16343 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2122.235634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2122.244977] Call Trace: [ 2122.247589] dump_stack+0x172/0x1f0 [ 2122.251257] should_fail.cold+0xa/0x1b [ 2122.255261] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2122.260359] ? lock_downgrade+0x810/0x810 [ 2122.260374] ? ___might_sleep+0x163/0x280 [ 2122.260407] __should_failslab+0x121/0x190 [ 2122.260421] should_failslab+0x9/0x14 [ 2122.260440] kmem_cache_alloc_trace+0x2d1/0x760 [ 2122.260454] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2122.260470] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2122.260484] __list_lru_init+0x3d3/0x6e0 [ 2122.273017] sget_userns+0x81e/0xd30 [ 2122.273032] ? kill_litter_super+0x60/0x60 [ 2122.273063] ? ns_test_super+0x50/0x50 [ 2122.273091] ? ns_test_super+0x50/0x50 [ 2122.311267] ? kill_litter_super+0x60/0x60 [ 2122.315507] sget+0x10c/0x150 [ 2122.318616] mount_bdev+0xff/0x3c0 [ 2122.322171] ? finish_unfinished+0x1120/0x1120 17:52:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2122.326762] get_super_block+0x35/0x40 [ 2122.330657] mount_fs+0x106/0x3ff [ 2122.334108] ? emergency_thaw_all+0x1a0/0x1a0 [ 2122.338596] ? __init_waitqueue_head+0x36/0x90 [ 2122.343177] vfs_kern_mount.part.0+0x6f/0x410 [ 2122.347671] do_mount+0x581/0x2d30 [ 2122.351205] ? finish_automount+0x461/0x490 [ 2122.355540] ? copy_mount_string+0x40/0x40 [ 2122.359796] ? kmem_cache_alloc_trace+0x354/0x760 [ 2122.364651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2122.364664] ? copy_mount_options+0x30e/0x440 [ 2122.364680] ksys_mount+0xdb/0x150 [ 2122.364693] __x64_sys_mount+0xbe/0x150 [ 2122.378265] do_syscall_64+0x103/0x610 [ 2122.378281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2122.378290] RIP: 0033:0x45a8aa [ 2122.378317] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2122.378324] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2122.378336] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2122.378344] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2122.378351] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2122.378358] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2122.378366] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:11 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000206000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2122.643471] FAULT_INJECTION: forcing a failure. [ 2122.643471] name failslab, interval 1, probability 0, space 0, times 0 [ 2122.678792] CPU: 1 PID: 16381 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2122.686066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2122.695902] Call Trace: [ 2122.698519] dump_stack+0x172/0x1f0 [ 2122.702146] should_fail.cold+0xa/0x1b [ 2122.706062] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2122.711166] ? lock_downgrade+0x810/0x810 [ 2122.715331] ? ___might_sleep+0x163/0x280 [ 2122.719603] __should_failslab+0x121/0x190 [ 2122.723842] should_failslab+0x9/0x14 [ 2122.727649] kmem_cache_alloc_trace+0x2d1/0x760 [ 2122.732322] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2122.737441] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2122.742405] __list_lru_init+0x3d3/0x6e0 [ 2122.746477] sget_userns+0x81e/0xd30 [ 2122.750208] ? kill_litter_super+0x60/0x60 [ 2122.754474] ? ns_test_super+0x50/0x50 [ 2122.758385] ? ns_test_super+0x50/0x50 [ 2122.762298] ? kill_litter_super+0x60/0x60 [ 2122.766534] sget+0x10c/0x150 [ 2122.769653] mount_bdev+0xff/0x3c0 [ 2122.773190] ? finish_unfinished+0x1120/0x1120 [ 2122.777806] get_super_block+0x35/0x40 [ 2122.781755] mount_fs+0x106/0x3ff [ 2122.785229] ? emergency_thaw_all+0x1a0/0x1a0 [ 2122.789730] ? __init_waitqueue_head+0x36/0x90 [ 2122.794337] vfs_kern_mount.part.0+0x6f/0x410 [ 2122.798845] do_mount+0x581/0x2d30 [ 2122.802420] ? finish_automount+0x461/0x490 [ 2122.806803] ? copy_mount_string+0x40/0x40 [ 2122.811060] ? kmem_cache_alloc_trace+0x354/0x760 [ 2122.815909] ? _copy_from_user+0xdd/0x150 [ 2122.820061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2122.825595] ? copy_mount_options+0x30e/0x440 [ 2122.830095] ksys_mount+0xdb/0x150 [ 2122.833631] __x64_sys_mount+0xbe/0x150 [ 2122.837612] do_syscall_64+0x103/0x610 17:52:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2122.841505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2122.846752] RIP: 0033:0x45a8aa [ 2122.849991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2122.868891] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2122.868904] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2122.868912] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 17:52:11 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 17:52:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000209700000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2122.868920] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2122.868926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2122.868934] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffffdef}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 17:52:11 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020f000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:11 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2123.084383] FAULT_INJECTION: forcing a failure. [ 2123.084383] name failslab, interval 1, probability 0, space 0, times 0 [ 2123.163609] CPU: 0 PID: 16417 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2123.170899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2123.170905] Call Trace: [ 2123.170926] dump_stack+0x172/0x1f0 [ 2123.170944] should_fail.cold+0xa/0x1b [ 2123.170961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2123.170978] ? lock_downgrade+0x810/0x810 [ 2123.170995] ? ___might_sleep+0x163/0x280 [ 2123.171017] __should_failslab+0x121/0x190 [ 2123.195551] should_failslab+0x9/0x14 [ 2123.195567] kmem_cache_alloc_trace+0x2d1/0x760 [ 2123.195585] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2123.195608] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2123.195627] __list_lru_init+0x3d3/0x6e0 [ 2123.195648] sget_userns+0x81e/0xd30 [ 2123.234341] ? kill_litter_super+0x60/0x60 [ 2123.238583] ? ns_test_super+0x50/0x50 [ 2123.242474] ? ns_test_super+0x50/0x50 [ 2123.246376] ? kill_litter_super+0x60/0x60 [ 2123.250612] sget+0x10c/0x150 [ 2123.253727] mount_bdev+0xff/0x3c0 [ 2123.257288] ? finish_unfinished+0x1120/0x1120 [ 2123.261894] get_super_block+0x35/0x40 [ 2123.265795] mount_fs+0x106/0x3ff [ 2123.269254] ? emergency_thaw_all+0x1a0/0x1a0 [ 2123.273767] ? __init_waitqueue_head+0x36/0x90 [ 2123.278367] vfs_kern_mount.part.0+0x6f/0x410 [ 2123.282901] do_mount+0x581/0x2d30 [ 2123.286452] ? finish_automount+0x461/0x490 [ 2123.290785] ? copy_mount_string+0x40/0x40 [ 2123.295024] ? kmem_cache_alloc_trace+0x354/0x760 [ 2123.299894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.305538] ? copy_mount_options+0x30e/0x440 [ 2123.310060] ksys_mount+0xdb/0x150 [ 2123.313611] __x64_sys_mount+0xbe/0x150 [ 2123.318029] do_syscall_64+0x103/0x610 [ 2123.321923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.327110] RIP: 0033:0x45a8aa [ 2123.330299] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2123.349194] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2123.356897] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2123.364158] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2123.371418] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2123.378689] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2123.385949] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:12 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xffffff7f}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}) 17:52:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020000a000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffffff6}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2123.678041] net_ratelimit: 18 callbacks suppressed [ 2123.678046] protocol 88fb is buggy, dev hsr_slave_0 [ 2123.678073] protocol 88fb is buggy, dev hsr_slave_1 [ 2123.683089] protocol 88fb is buggy, dev hsr_slave_1 [ 2123.688114] protocol 88fb is buggy, dev hsr_slave_0 [ 2123.703147] protocol 88fb is buggy, dev hsr_slave_1 17:52:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 2123.732797] FAULT_INJECTION: forcing a failure. [ 2123.732797] name failslab, interval 1, probability 0, space 0, times 0 [ 2123.783515] CPU: 1 PID: 16457 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2123.790791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2123.800134] Call Trace: [ 2123.802731] dump_stack+0x172/0x1f0 [ 2123.806386] should_fail.cold+0xa/0x1b [ 2123.810296] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2123.815415] ? lock_downgrade+0x810/0x810 [ 2123.819588] ? ___might_sleep+0x163/0x280 [ 2123.823742] __should_failslab+0x121/0x190 [ 2123.827982] should_failslab+0x9/0x14 [ 2123.831779] kmem_cache_alloc_trace+0x2d1/0x760 [ 2123.836462] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2123.836481] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2123.836496] __list_lru_init+0x3d3/0x6e0 [ 2123.846505] sget_userns+0x81e/0xd30 [ 2123.846517] ? kill_litter_super+0x60/0x60 [ 2123.846533] ? ns_test_super+0x50/0x50 [ 2123.862398] ? ns_test_super+0x50/0x50 [ 2123.866292] ? kill_litter_super+0x60/0x60 [ 2123.870527] sget+0x10c/0x150 [ 2123.873631] mount_bdev+0xff/0x3c0 [ 2123.877165] ? finish_unfinished+0x1120/0x1120 [ 2123.881763] get_super_block+0x35/0x40 [ 2123.885649] mount_fs+0x106/0x3ff [ 2123.889098] ? emergency_thaw_all+0x1a0/0x1a0 [ 2123.893616] ? __init_waitqueue_head+0x36/0x90 [ 2123.898219] vfs_kern_mount.part.0+0x6f/0x410 [ 2123.902714] do_mount+0x581/0x2d30 [ 2123.906275] ? copy_mount_string+0x40/0x40 [ 2123.910512] ? copy_mount_options+0x223/0x440 [ 2123.915042] ? write_comp_data+0x1e/0x70 [ 2123.919102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.924662] ? copy_mount_options+0x30e/0x440 [ 2123.929203] ksys_mount+0xdb/0x150 [ 2123.932805] __x64_sys_mount+0xbe/0x150 [ 2123.936783] do_syscall_64+0x103/0x610 [ 2123.940725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.945938] RIP: 0033:0x45a8aa [ 2123.949140] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2123.968029] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2123.975725] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020000e000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2123.982985] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2123.990248] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2123.997506] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2124.004765] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:12 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 17:52:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020c00e000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:12 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 17:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2124.355791] FAULT_INJECTION: forcing a failure. [ 2124.355791] name failslab, interval 1, probability 0, space 0, times 0 [ 2124.390120] CPU: 0 PID: 16498 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 17:52:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020000f000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2124.397405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2124.398049] protocol 88fb is buggy, dev hsr_slave_0 [ 2124.406765] Call Trace: [ 2124.406804] dump_stack+0x172/0x1f0 [ 2124.406821] should_fail.cold+0xa/0x1b [ 2124.411876] protocol 88fb is buggy, dev hsr_slave_1 [ 2124.414386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2124.431942] ? lock_downgrade+0x810/0x810 [ 2124.436103] ? ___might_sleep+0x163/0x280 [ 2124.440251] __should_failslab+0x121/0x190 [ 2124.444498] should_failslab+0x9/0x14 [ 2124.448334] kmem_cache_alloc_trace+0x2d1/0x760 [ 2124.453041] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2124.453075] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2124.453092] __list_lru_init+0x3d3/0x6e0 [ 2124.453110] sget_userns+0x81e/0xd30 [ 2124.470876] ? kill_litter_super+0x60/0x60 [ 2124.475111] ? ns_test_super+0x50/0x50 [ 2124.479033] ? ns_test_super+0x50/0x50 [ 2124.479046] ? kill_litter_super+0x60/0x60 [ 2124.479060] sget+0x10c/0x150 [ 2124.479078] mount_bdev+0xff/0x3c0 [ 2124.479093] ? finish_unfinished+0x1120/0x1120 [ 2124.479109] get_super_block+0x35/0x40 [ 2124.479125] mount_fs+0x106/0x3ff [ 2124.479141] ? emergency_thaw_all+0x1a0/0x1a0 [ 2124.479155] ? __init_waitqueue_head+0x36/0x90 [ 2124.479174] vfs_kern_mount.part.0+0x6f/0x410 [ 2124.479191] do_mount+0x581/0x2d30 [ 2124.479204] ? finish_automount+0x461/0x490 [ 2124.479221] ? copy_mount_string+0x40/0x40 [ 2124.479234] ? kmem_cache_alloc_trace+0x354/0x760 [ 2124.479277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2124.479306] ? copy_mount_options+0x30e/0x440 [ 2124.479364] ksys_mount+0xdb/0x150 [ 2124.479380] __x64_sys_mount+0xbe/0x150 [ 2124.479398] do_syscall_64+0x103/0x610 [ 2124.479414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2124.479424] RIP: 0033:0x45a8aa [ 2124.479449] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2124.494175] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2124.506088] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2124.506096] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2124.506103] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2124.506110] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2124.506117] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2124.506305] protocol 88fb is buggy, dev hsr_slave_0 [ 2124.635141] protocol 88fb is buggy, dev hsr_slave_1 17:52:13 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x100000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 17:52:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020003f000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2124.813290] FAULT_INJECTION: forcing a failure. [ 2124.813290] name failslab, interval 1, probability 0, space 0, times 0 17:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa00000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2124.878046] protocol 88fb is buggy, dev hsr_slave_0 [ 2124.887813] CPU: 1 PID: 16526 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2124.895082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2124.895087] Call Trace: [ 2124.895106] dump_stack+0x172/0x1f0 [ 2124.895124] should_fail.cold+0xa/0x1b [ 2124.910672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2124.919625] ? lock_downgrade+0x810/0x810 [ 2124.923783] ? ___might_sleep+0x163/0x280 [ 2124.927964] __should_failslab+0x121/0x190 [ 2124.932205] should_failslab+0x9/0x14 [ 2124.935997] kmem_cache_alloc_trace+0x2d1/0x760 [ 2124.940694] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2124.945621] __list_lru_init+0x3d3/0x6e0 [ 2124.949732] sget_userns+0x81e/0xd30 [ 2124.953467] ? kill_litter_super+0x60/0x60 [ 2124.957702] ? ns_test_super+0x50/0x50 [ 2124.961589] ? ns_test_super+0x50/0x50 [ 2124.965489] ? kill_litter_super+0x60/0x60 [ 2124.969780] sget+0x10c/0x150 [ 2124.972895] mount_bdev+0xff/0x3c0 [ 2124.976425] ? finish_unfinished+0x1120/0x1120 [ 2124.981012] get_super_block+0x35/0x40 [ 2124.984925] mount_fs+0x106/0x3ff [ 2124.988376] ? emergency_thaw_all+0x1a0/0x1a0 [ 2124.992868] ? __init_waitqueue_head+0x36/0x90 [ 2124.997481] vfs_kern_mount.part.0+0x6f/0x410 [ 2125.001976] do_mount+0x581/0x2d30 [ 2125.005530] ? finish_automount+0x461/0x490 [ 2125.009879] ? copy_mount_string+0x40/0x40 [ 2125.014110] ? kmem_cache_alloc_trace+0x354/0x760 [ 2125.018981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.024513] ? copy_mount_options+0x30e/0x440 [ 2125.029093] ksys_mount+0xdb/0x150 [ 2125.032632] __x64_sys_mount+0xbe/0x150 [ 2125.036609] do_syscall_64+0x103/0x610 [ 2125.040509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2125.045689] RIP: 0033:0x45a8aa [ 2125.048926] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2125.067833] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2125.075547] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2125.082839] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2125.090117] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2125.097372] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2125.104628] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200060000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1100000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:13 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 17:52:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200097000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2125.351220] FAULT_INJECTION: forcing a failure. [ 2125.351220] name failslab, interval 1, probability 0, space 0, times 0 17:52:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2125.427865] CPU: 0 PID: 16563 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2125.435144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2125.444499] Call Trace: [ 2125.444518] dump_stack+0x172/0x1f0 [ 2125.444534] should_fail.cold+0xa/0x1b [ 2125.444551] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2125.450757] ? lock_downgrade+0x810/0x810 [ 2125.450792] ? ___might_sleep+0x163/0x280 [ 2125.450811] __should_failslab+0x121/0x190 [ 2125.450826] should_failslab+0x9/0x14 [ 2125.450837] kmem_cache_alloc_trace+0x2d1/0x760 [ 2125.450850] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2125.459829] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2125.459844] __list_lru_init+0x3d3/0x6e0 [ 2125.459861] sget_userns+0x81e/0xd30 [ 2125.468131] ? kill_litter_super+0x60/0x60 [ 2125.468147] ? ns_test_super+0x50/0x50 [ 2125.468161] ? ns_test_super+0x50/0x50 [ 2125.468173] ? kill_litter_super+0x60/0x60 [ 2125.468185] sget+0x10c/0x150 [ 2125.468202] mount_bdev+0xff/0x3c0 [ 2125.468216] ? finish_unfinished+0x1120/0x1120 [ 2125.468231] get_super_block+0x35/0x40 [ 2125.529771] mount_fs+0x106/0x3ff [ 2125.533223] ? emergency_thaw_all+0x1a0/0x1a0 [ 2125.537719] ? __init_waitqueue_head+0x36/0x90 [ 2125.542314] vfs_kern_mount.part.0+0x6f/0x410 [ 2125.546810] do_mount+0x581/0x2d30 [ 2125.550341] ? finish_automount+0x461/0x490 [ 2125.554671] ? copy_mount_string+0x40/0x40 [ 2125.558914] ? kmem_cache_alloc_trace+0x354/0x760 [ 2125.563924] ? _copy_from_user+0xdd/0x150 [ 2125.568062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.573589] ? copy_mount_options+0x30e/0x440 [ 2125.578098] ksys_mount+0xdb/0x150 [ 2125.581632] __x64_sys_mount+0xbe/0x150 [ 2125.585601] do_syscall_64+0x103/0x610 [ 2125.589490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2125.594682] RIP: 0033:0x45a8aa [ 2125.597873] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2125.616763] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2125.624465] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2125.631737] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2125.639015] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2125.646277] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2125.653535] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200ec0000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc000000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 17:52:14 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2125.961586] FAULT_INJECTION: forcing a failure. [ 2125.961586] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.011578] CPU: 0 PID: 16603 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2126.018854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2126.028196] Call Trace: [ 2126.030834] dump_stack+0x172/0x1f0 [ 2126.034482] should_fail.cold+0xa/0x1b [ 2126.038362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2126.043465] ? lock_downgrade+0x810/0x810 [ 2126.047608] ? ___might_sleep+0x163/0x280 [ 2126.051785] __should_failslab+0x121/0x190 [ 2126.056017] should_failslab+0x9/0x14 [ 2126.059812] kmem_cache_alloc_trace+0x2d1/0x760 [ 2126.064477] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2126.069580] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2126.074523] __list_lru_init+0x3d3/0x6e0 [ 2126.078597] sget_userns+0x81e/0xd30 [ 2126.082322] ? kill_litter_super+0x60/0x60 [ 2126.086582] ? ns_test_super+0x50/0x50 [ 2126.090467] ? ns_test_super+0x50/0x50 [ 2126.094351] ? kill_litter_super+0x60/0x60 [ 2126.098578] sget+0x10c/0x150 [ 2126.101705] mount_bdev+0xff/0x3c0 [ 2126.105242] ? finish_unfinished+0x1120/0x1120 [ 2126.109827] get_super_block+0x35/0x40 [ 2126.113713] mount_fs+0x106/0x3ff [ 2126.117159] ? emergency_thaw_all+0x1a0/0x1a0 [ 2126.121650] ? __init_waitqueue_head+0x36/0x90 [ 2126.126240] vfs_kern_mount.part.0+0x6f/0x410 [ 2126.130734] do_mount+0x581/0x2d30 [ 2126.134285] ? finish_automount+0x461/0x490 [ 2126.138645] ? copy_mount_string+0x40/0x40 [ 2126.142872] ? kmem_cache_alloc_trace+0x354/0x760 [ 2126.147714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2126.153258] ? copy_mount_options+0x30e/0x440 [ 2126.157788] ksys_mount+0xdb/0x150 [ 2126.161342] __x64_sys_mount+0xbe/0x150 [ 2126.165326] do_syscall_64+0x103/0x610 [ 2126.169208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2126.174394] RIP: 0033:0x45a8aa [ 2126.177582] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2126.196506] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2126.204209] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000f0000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2126.211481] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2126.218774] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2126.226043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2126.233301] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 17:52:14 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x4, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000201ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 17:52:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xe03f030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x11, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000301ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2126.615828] FAULT_INJECTION: forcing a failure. [ 2126.615828] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.683311] CPU: 0 PID: 16646 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2126.690606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2126.700101] Call Trace: [ 2126.702729] dump_stack+0x172/0x1f0 [ 2126.706361] should_fail.cold+0xa/0x1b [ 2126.710279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2126.715377] ? lock_downgrade+0x810/0x810 [ 2126.719525] ? ___might_sleep+0x163/0x280 [ 2126.723693] __should_failslab+0x121/0x190 [ 2126.728111] should_failslab+0x9/0x14 [ 2126.731904] kmem_cache_alloc_trace+0x2d1/0x760 [ 2126.736571] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2126.741681] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2126.746625] __list_lru_init+0x3d3/0x6e0 [ 2126.750732] sget_userns+0x81e/0xd30 [ 2126.754478] ? kill_litter_super+0x60/0x60 [ 2126.758759] ? ns_test_super+0x50/0x50 [ 2126.762663] ? ns_test_super+0x50/0x50 [ 2126.766544] ? kill_litter_super+0x60/0x60 [ 2126.770772] sget+0x10c/0x150 [ 2126.773886] mount_bdev+0xff/0x3c0 [ 2126.777455] ? finish_unfinished+0x1120/0x1120 [ 2126.782041] get_super_block+0x35/0x40 [ 2126.785927] mount_fs+0x106/0x3ff [ 2126.789381] ? emergency_thaw_all+0x1a0/0x1a0 [ 2126.793869] ? __init_waitqueue_head+0x36/0x90 [ 2126.798477] vfs_kern_mount.part.0+0x6f/0x410 [ 2126.802975] do_mount+0x581/0x2d30 [ 2126.806526] ? copy_mount_string+0x40/0x40 [ 2126.810770] ? copy_mount_options+0x250/0x440 [ 2126.815279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2126.820843] ? copy_mount_options+0x30e/0x440 [ 2126.825342] ksys_mount+0xdb/0x150 [ 2126.828884] __x64_sys_mount+0xbe/0x150 [ 2126.832855] do_syscall_64+0x103/0x610 [ 2126.836750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2126.841929] RIP: 0033:0x45a8aa [ 2126.845112] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2126.864001] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2126.871700] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2126.878980] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2126.886256] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2126.893519] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2126.900791] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:15 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 17:52:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa00, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000401ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x1100, &(0x7f0000000600)}}], 0x2, 0x0) [ 2127.124663] FAULT_INJECTION: forcing a failure. [ 2127.124663] name failslab, interval 1, probability 0, space 0, times 0 17:52:15 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3e80, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xffffff7f00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000801ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2127.208192] CPU: 0 PID: 16678 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2127.215502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2127.224884] Call Trace: [ 2127.224908] dump_stack+0x172/0x1f0 [ 2127.224930] should_fail.cold+0xa/0x1b [ 2127.224964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2127.224996] ? lock_downgrade+0x810/0x810 [ 2127.225024] ? ___might_sleep+0x163/0x280 [ 2127.248605] __should_failslab+0x121/0x190 [ 2127.252860] should_failslab+0x9/0x14 [ 2127.256668] kmem_cache_alloc_trace+0x2d1/0x760 [ 2127.261342] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2127.266454] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2127.271387] __list_lru_init+0x3d3/0x6e0 [ 2127.271407] sget_userns+0x81e/0xd30 [ 2127.271421] ? kill_litter_super+0x60/0x60 [ 2127.271448] ? ns_test_super+0x50/0x50 [ 2127.271491] ? ns_test_super+0x50/0x50 [ 2127.271504] ? kill_litter_super+0x60/0x60 [ 2127.271517] sget+0x10c/0x150 [ 2127.271553] mount_bdev+0xff/0x3c0 [ 2127.302141] ? finish_unfinished+0x1120/0x1120 [ 2127.306722] get_super_block+0x35/0x40 [ 2127.310609] mount_fs+0x106/0x3ff [ 2127.314058] ? emergency_thaw_all+0x1a0/0x1a0 [ 2127.318578] ? __init_waitqueue_head+0x36/0x90 [ 2127.323195] vfs_kern_mount.part.0+0x6f/0x410 [ 2127.327704] do_mount+0x581/0x2d30 [ 2127.331255] ? finish_automount+0x461/0x490 [ 2127.335578] ? copy_mount_string+0x40/0x40 [ 2127.339808] ? kmem_cache_alloc_trace+0x354/0x760 [ 2127.344662] ? _copy_from_user+0xdd/0x150 [ 2127.348821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.354351] ? copy_mount_options+0x30e/0x440 [ 2127.358847] ksys_mount+0xdb/0x150 [ 2127.362384] __x64_sys_mount+0xbe/0x150 [ 2127.366354] do_syscall_64+0x103/0x610 [ 2127.370254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.375451] RIP: 0033:0x45a8aa [ 2127.378670] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2127.398128] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 2127.405827] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2127.413084] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2127.420344] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2127.427604] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2127.434864] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:16 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3ec0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 17:52:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020ffffff1f01ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3f00, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x803e, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000004001ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2127.871685] FAULT_INJECTION: forcing a failure. [ 2127.871685] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.902914] CPU: 0 PID: 16719 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2127.910183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2127.910188] Call Trace: [ 2127.910211] dump_stack+0x172/0x1f0 [ 2127.910230] should_fail.cold+0xa/0x1b [ 2127.910247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2127.910262] ? lock_downgrade+0x810/0x810 [ 2127.910280] ? ___might_sleep+0x163/0x280 [ 2127.910303] __should_failslab+0x121/0x190 [ 2127.922220] should_failslab+0x9/0x14 [ 2127.922233] kmem_cache_alloc_trace+0x2d1/0x760 [ 2127.922248] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2127.943061] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2127.965754] __list_lru_init+0x3d3/0x6e0 [ 2127.969815] sget_userns+0x81e/0xd30 [ 2127.969828] ? kill_litter_super+0x60/0x60 [ 2127.969843] ? ns_test_super+0x50/0x50 [ 2127.969856] ? ns_test_super+0x50/0x50 [ 2127.969868] ? kill_litter_super+0x60/0x60 [ 2127.969880] sget+0x10c/0x150 [ 2127.969896] mount_bdev+0xff/0x3c0 [ 2127.969912] ? finish_unfinished+0x1120/0x1120 [ 2127.981715] get_super_block+0x35/0x40 [ 2128.004835] mount_fs+0x106/0x3ff [ 2128.008293] ? emergency_thaw_all+0x1a0/0x1a0 [ 2128.012793] ? __init_waitqueue_head+0x36/0x90 [ 2128.017378] vfs_kern_mount.part.0+0x6f/0x410 [ 2128.017410] do_mount+0x581/0x2d30 [ 2128.025456] ? finish_automount+0x461/0x490 [ 2128.029790] ? copy_mount_string+0x40/0x40 [ 2128.034037] ? kmem_cache_alloc_trace+0x354/0x760 [ 2128.038872] ? _copy_from_user+0xdd/0x150 [ 2128.043013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.048553] ? copy_mount_options+0x30e/0x440 [ 2128.053054] ksys_mount+0xdb/0x150 [ 2128.056629] __x64_sys_mount+0xbe/0x150 [ 2128.060601] do_syscall_64+0x103/0x610 [ 2128.064502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2128.069697] RIP: 0033:0x45a8aa [ 2128.072879] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2128.091768] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2128.099493] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2128.106751] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2128.114025] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2128.121294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2128.128551] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:16 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x4, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 17:52:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc03e, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200002000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2128.282355] FAULT_INJECTION: forcing a failure. [ 2128.282355] name failslab, interval 1, probability 0, space 0, times 0 [ 2128.330526] CPU: 1 PID: 16750 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2128.337807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2128.347150] Call Trace: [ 2128.349759] dump_stack+0x172/0x1f0 [ 2128.353421] should_fail.cold+0xa/0x1b [ 2128.357363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2128.362461] ? lock_downgrade+0x810/0x810 [ 2128.366604] ? ___might_sleep+0x163/0x280 [ 2128.370767] __should_failslab+0x121/0x190 [ 2128.375035] should_failslab+0x9/0x14 [ 2128.378860] __kmalloc+0x2dc/0x740 [ 2128.382399] ? __list_lru_init+0xd5/0x6e0 [ 2128.386571] __list_lru_init+0xd5/0x6e0 [ 2128.390576] sget_userns+0x84d/0xd30 [ 2128.394292] ? kill_litter_super+0x60/0x60 [ 2128.398551] ? ns_test_super+0x50/0x50 [ 2128.402493] ? ns_test_super+0x50/0x50 [ 2128.406387] ? kill_litter_super+0x60/0x60 [ 2128.410635] sget+0x10c/0x150 [ 2128.413768] mount_bdev+0xff/0x3c0 [ 2128.417308] ? finish_unfinished+0x1120/0x1120 [ 2128.421906] get_super_block+0x35/0x40 [ 2128.425789] mount_fs+0x106/0x3ff [ 2128.429297] ? emergency_thaw_all+0x1a0/0x1a0 [ 2128.433793] ? __init_waitqueue_head+0x36/0x90 [ 2128.438413] vfs_kern_mount.part.0+0x6f/0x410 [ 2128.442948] do_mount+0x581/0x2d30 [ 2128.446503] ? finish_automount+0x461/0x490 [ 2128.450838] ? copy_mount_string+0x40/0x40 [ 2128.455077] ? kmem_cache_alloc_trace+0x354/0x760 [ 2128.459933] ? _copy_from_user+0xdd/0x150 [ 2128.464123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.469665] ? copy_mount_options+0x30e/0x440 [ 2128.474159] ksys_mount+0xdb/0x150 [ 2128.477740] __x64_sys_mount+0xbe/0x150 [ 2128.481725] do_syscall_64+0x103/0x610 [ 2128.485621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2128.490796] RIP: 0033:0x45a8aa [ 2128.493979] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2128.512872] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2128.520610] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x33fe0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2128.527918] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2128.535174] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2128.542451] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2128.549712] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x11, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 2128.744085] FAULT_INJECTION: forcing a failure. [ 2128.744085] name failslab, interval 1, probability 0, space 0, times 0 [ 2128.758092] CPU: 0 PID: 16777 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2128.765364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2128.774719] Call Trace: [ 2128.777304] dump_stack+0x172/0x1f0 [ 2128.780949] should_fail.cold+0xa/0x1b [ 2128.784833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2128.789932] ? lock_downgrade+0x810/0x810 [ 2128.794078] ? ___might_sleep+0x163/0x280 [ 2128.798229] __should_failslab+0x121/0x190 [ 2128.802461] should_failslab+0x9/0x14 [ 2128.806268] kmem_cache_alloc_trace+0x2d1/0x760 [ 2128.810934] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2128.816048] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2128.820990] __list_lru_init+0x3d3/0x6e0 [ 2128.825113] sget_userns+0x81e/0xd30 [ 2128.828824] ? kill_litter_super+0x60/0x60 [ 2128.833080] ? ns_test_super+0x50/0x50 [ 2128.836961] ? ns_test_super+0x50/0x50 17:52:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200004000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2128.840848] ? kill_litter_super+0x60/0x60 [ 2128.845075] sget+0x10c/0x150 [ 2128.848203] mount_bdev+0xff/0x3c0 [ 2128.851750] ? finish_unfinished+0x1120/0x1120 [ 2128.856347] get_super_block+0x35/0x40 [ 2128.860225] mount_fs+0x106/0x3ff [ 2128.863677] ? emergency_thaw_all+0x1a0/0x1a0 [ 2128.868199] ? __init_waitqueue_head+0x36/0x90 [ 2128.872805] vfs_kern_mount.part.0+0x6f/0x410 [ 2128.877334] do_mount+0x581/0x2d30 [ 2128.880870] ? finish_automount+0x461/0x490 [ 2128.885205] ? copy_mount_string+0x40/0x40 [ 2128.889463] ? kmem_cache_alloc_trace+0x354/0x760 [ 2128.894320] ? _copy_from_user+0xdd/0x150 [ 2128.898468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.903999] ? copy_mount_options+0x30e/0x440 [ 2128.904017] ksys_mount+0xdb/0x150 [ 2128.904032] __x64_sys_mount+0xbe/0x150 [ 2128.912044] do_syscall_64+0x103/0x610 [ 2128.912061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2128.912072] RIP: 0033:0x45a8aa [ 2128.928275] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2128.947167] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2128.954898] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2128.962161] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2128.969438] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2128.976700] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2128.983962] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x34000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2128.991454] net_ratelimit: 20 callbacks suppressed [ 2128.991460] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.001482] protocol 88fb is buggy, dev hsr_slave_1 17:52:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2129.038068] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.043158] protocol 88fb is buggy, dev hsr_slave_1 17:52:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa00, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x40000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200008000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 17:52:17 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x1100, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:17 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x400300, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 17:52:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020000a000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:18 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3e80, &(0x7f0000000600)}}], 0x2, 0x0) [ 2129.309761] FAULT_INJECTION: forcing a failure. [ 2129.309761] name failslab, interval 1, probability 0, space 0, times 0 [ 2129.354938] CPU: 1 PID: 16816 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2129.362221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2129.371568] Call Trace: [ 2129.374153] dump_stack+0x172/0x1f0 [ 2129.377777] should_fail.cold+0xa/0x1b [ 2129.381705] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2129.387063] ? lock_downgrade+0x810/0x810 [ 2129.391223] ? ___might_sleep+0x163/0x280 [ 2129.395372] __should_failslab+0x121/0x190 [ 2129.399615] should_failslab+0x9/0x14 [ 2129.403423] kmem_cache_alloc_trace+0x2d1/0x760 [ 2129.408101] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2129.413234] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2129.418183] __list_lru_init+0x3d3/0x6e0 [ 2129.422305] sget_userns+0x81e/0xd30 [ 2129.426014] ? kill_litter_super+0x60/0x60 [ 2129.430286] ? ns_test_super+0x50/0x50 [ 2129.434170] ? ns_test_super+0x50/0x50 [ 2129.438052] ? kill_litter_super+0x60/0x60 [ 2129.442285] sget+0x10c/0x150 [ 2129.445395] mount_bdev+0xff/0x3c0 [ 2129.448956] ? finish_unfinished+0x1120/0x1120 [ 2129.453572] get_super_block+0x35/0x40 [ 2129.457488] mount_fs+0x106/0x3ff [ 2129.460958] ? emergency_thaw_all+0x1a0/0x1a0 [ 2129.465480] ? __init_waitqueue_head+0x36/0x90 [ 2129.470063] vfs_kern_mount.part.0+0x6f/0x410 [ 2129.474574] do_mount+0x581/0x2d30 [ 2129.478129] ? finish_automount+0x461/0x490 [ 2129.482478] ? copy_mount_string+0x40/0x40 [ 2129.486728] ? kmem_cache_alloc_trace+0x354/0x760 [ 2129.491611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2129.497159] ? copy_mount_options+0x30e/0x440 [ 2129.501699] ksys_mount+0xdb/0x150 [ 2129.505265] __x64_sys_mount+0xbe/0x150 [ 2129.509243] do_syscall_64+0x103/0x610 [ 2129.513135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2129.518318] RIP: 0033:0x45a8aa [ 2129.521661] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2129.540604] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2129.548304] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2129.555568] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2129.562849] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2129.570160] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2129.577423] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x1000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020000e000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:18 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3ec0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 17:52:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 3 (fault-call:0 fault-nth:67): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:18 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3f00, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020000f000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2129.856969] FAULT_INJECTION: forcing a failure. [ 2129.856969] name failslab, interval 1, probability 0, space 0, times 0 [ 2129.894017] CPU: 0 PID: 16852 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2129.901314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2129.910665] Call Trace: [ 2129.913250] dump_stack+0x172/0x1f0 [ 2129.916881] should_fail.cold+0xa/0x1b [ 2129.918113] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.920791] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2129.925841] protocol 88fb is buggy, dev hsr_slave_1 [ 2129.930883] ? lock_downgrade+0x810/0x810 [ 2129.930915] ? ___might_sleep+0x163/0x280 [ 2129.930953] __should_failslab+0x121/0x190 [ 2129.930971] should_failslab+0x9/0x14 [ 2129.952290] kmem_cache_alloc_trace+0x2d1/0x760 [ 2129.956960] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2129.962068] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2129.966994] __list_lru_init+0x3d3/0x6e0 [ 2129.971051] sget_userns+0x81e/0xd30 [ 2129.974754] ? kill_litter_super+0x60/0x60 [ 2129.979021] ? ns_test_super+0x50/0x50 [ 2129.982909] ? ns_test_super+0x50/0x50 [ 2129.986820] ? kill_litter_super+0x60/0x60 [ 2129.991044] sget+0x10c/0x150 [ 2129.994181] mount_bdev+0xff/0x3c0 [ 2129.997733] ? finish_unfinished+0x1120/0x1120 [ 2130.002312] get_super_block+0x35/0x40 [ 2130.006196] mount_fs+0x106/0x3ff [ 2130.009655] ? emergency_thaw_all+0x1a0/0x1a0 [ 2130.014159] ? __init_waitqueue_head+0x36/0x90 [ 2130.018747] vfs_kern_mount.part.0+0x6f/0x410 [ 2130.023242] do_mount+0x581/0x2d30 [ 2130.026784] ? finish_automount+0x461/0x490 [ 2130.031108] ? copy_mount_string+0x40/0x40 [ 2130.035337] ? kmem_cache_alloc_trace+0x354/0x760 [ 2130.040195] ? _copy_from_user+0xdd/0x150 [ 2130.044337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.049865] ? copy_mount_options+0x30e/0x440 [ 2130.054382] ksys_mount+0xdb/0x150 [ 2130.057946] __x64_sys_mount+0xbe/0x150 [ 2130.061920] do_syscall_64+0x103/0x610 [ 2130.065813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2130.070994] RIP: 0033:0x45a8aa [ 2130.074177] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2130.093119] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2130.100830] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x11000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2130.108092] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2130.115349] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2130.122642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2130.129916] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2130.137418] protocol 88fb is buggy, dev hsr_slave_0 [ 2130.142563] protocol 88fb is buggy, dev hsr_slave_1 [ 2130.147700] protocol 88fb is buggy, dev hsr_slave_0 [ 2130.152857] protocol 88fb is buggy, dev hsr_slave_1 17:52:18 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3f000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x803e, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 17:52:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:18 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:19 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x803e0000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200010000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) [ 2130.335263] FAULT_INJECTION: forcing a failure. [ 2130.335263] name failslab, interval 1, probability 0, space 0, times 0 [ 2130.358102] CPU: 0 PID: 16880 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2130.365382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2130.374752] Call Trace: [ 2130.377364] dump_stack+0x172/0x1f0 [ 2130.381006] should_fail.cold+0xa/0x1b [ 2130.384911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2130.390014] ? lock_downgrade+0x810/0x810 [ 2130.394191] ? ___might_sleep+0x163/0x280 [ 2130.398331] __should_failslab+0x121/0x190 [ 2130.402558] should_failslab+0x9/0x14 [ 2130.406364] kmem_cache_alloc_trace+0x2d1/0x760 [ 2130.411027] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2130.416157] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2130.421081] __list_lru_init+0x3d3/0x6e0 [ 2130.425139] sget_userns+0x81e/0xd30 [ 2130.428844] ? kill_litter_super+0x60/0x60 [ 2130.433077] ? ns_test_super+0x50/0x50 [ 2130.436960] ? ns_test_super+0x50/0x50 [ 2130.440841] ? kill_litter_super+0x60/0x60 [ 2130.445075] sget+0x10c/0x150 [ 2130.448179] mount_bdev+0xff/0x3c0 [ 2130.451724] ? finish_unfinished+0x1120/0x1120 [ 2130.456322] get_super_block+0x35/0x40 [ 2130.460209] mount_fs+0x106/0x3ff [ 2130.463654] ? emergency_thaw_all+0x1a0/0x1a0 [ 2130.468143] ? __init_waitqueue_head+0x36/0x90 [ 2130.472735] vfs_kern_mount.part.0+0x6f/0x410 [ 2130.477238] do_mount+0x581/0x2d30 [ 2130.480772] ? finish_automount+0x461/0x490 [ 2130.485109] ? copy_mount_string+0x40/0x40 [ 2130.489329] ? kmem_cache_alloc_trace+0x354/0x760 [ 2130.494160] ? _copy_from_user+0xdd/0x150 [ 2130.498297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.503825] ? copy_mount_options+0x30e/0x440 [ 2130.508310] ksys_mount+0xdb/0x150 [ 2130.511839] __x64_sys_mount+0xbe/0x150 [ 2130.515866] do_syscall_64+0x103/0x610 [ 2130.519804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2130.524999] RIP: 0033:0x45a8aa [ 2130.528181] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2130.547070] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2130.554781] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2130.562529] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2130.569788] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2130.577046] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:52:19 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2130.584306] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:19 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc03e, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc0000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x33fe0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200060000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc03e0000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:19 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x34000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200097000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:19 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xe03f0300, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xeffdffff, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x40000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000f0000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2130.994069] FAULT_INJECTION: forcing a failure. [ 2130.994069] name failslab, interval 1, probability 0, space 0, times 0 [ 2131.046205] CPU: 1 PID: 16932 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2131.053478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2131.062828] Call Trace: [ 2131.065434] dump_stack+0x172/0x1f0 [ 2131.069072] should_fail.cold+0xa/0x1b [ 2131.072961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2131.078099] ? lock_downgrade+0x810/0x810 [ 2131.082254] ? ___might_sleep+0x163/0x280 [ 2131.086419] __should_failslab+0x121/0x190 [ 2131.090681] should_failslab+0x9/0x14 [ 2131.094482] kmem_cache_alloc_trace+0x2d1/0x760 [ 2131.099264] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2131.104448] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2131.109395] __list_lru_init+0x3d3/0x6e0 [ 2131.113471] sget_userns+0x84d/0xd30 [ 2131.117187] ? kill_litter_super+0x60/0x60 [ 2131.121420] ? ns_test_super+0x50/0x50 [ 2131.125312] ? ns_test_super+0x50/0x50 [ 2131.129195] ? kill_litter_super+0x60/0x60 [ 2131.133435] sget+0x10c/0x150 [ 2131.136548] mount_bdev+0xff/0x3c0 [ 2131.140084] ? finish_unfinished+0x1120/0x1120 [ 2131.144680] get_super_block+0x35/0x40 [ 2131.148563] mount_fs+0x106/0x3ff [ 2131.152007] ? emergency_thaw_all+0x1a0/0x1a0 [ 2131.156500] ? __init_waitqueue_head+0x36/0x90 [ 2131.161093] vfs_kern_mount.part.0+0x6f/0x410 [ 2131.165584] do_mount+0x581/0x2d30 [ 2131.169139] ? finish_automount+0x461/0x490 [ 2131.173460] ? copy_mount_string+0x40/0x40 [ 2131.177697] ? kmem_cache_alloc_trace+0x354/0x760 [ 2131.182541] ? _copy_from_user+0xdd/0x150 [ 2131.186684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2131.192216] ? copy_mount_options+0x30e/0x440 [ 2131.196713] ksys_mount+0xdb/0x150 [ 2131.200268] __x64_sys_mount+0xbe/0x150 [ 2131.204307] do_syscall_64+0x103/0x610 [ 2131.208193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2131.213370] RIP: 0033:0x45a8aa [ 2131.216554] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2131.235455] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 2131.243169] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2131.250434] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2131.257712] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2131.264968] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2131.272227] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x400300, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:20 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xf6ffffff, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 17:52:20 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x1000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000000a0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2131.526862] FAULT_INJECTION: forcing a failure. [ 2131.526862] name failslab, interval 1, probability 0, space 0, times 0 [ 2131.570414] CPU: 1 PID: 16968 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2131.577703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2131.587060] Call Trace: [ 2131.589657] dump_stack+0x172/0x1f0 [ 2131.593298] should_fail.cold+0xa/0x1b [ 2131.597193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2131.602294] ? lock_downgrade+0x810/0x810 [ 2131.606447] ? ___might_sleep+0x163/0x280 [ 2131.610596] __should_failslab+0x121/0x190 [ 2131.614827] should_failslab+0x9/0x14 [ 2131.618623] kmem_cache_alloc_trace+0x2d1/0x760 [ 2131.623300] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2131.628272] __list_lru_init+0x3d3/0x6e0 [ 2131.632358] sget_userns+0x81e/0xd30 [ 2131.636076] ? kill_litter_super+0x60/0x60 [ 2131.640347] ? ns_test_super+0x50/0x50 [ 2131.644230] ? ns_test_super+0x50/0x50 [ 2131.648108] ? kill_litter_super+0x60/0x60 [ 2131.652348] sget+0x10c/0x150 [ 2131.655457] mount_bdev+0xff/0x3c0 [ 2131.658991] ? finish_unfinished+0x1120/0x1120 [ 2131.663572] get_super_block+0x35/0x40 [ 2131.667494] mount_fs+0x106/0x3ff [ 2131.670960] ? emergency_thaw_all+0x1a0/0x1a0 [ 2131.675457] ? __init_waitqueue_head+0x36/0x90 [ 2131.680053] vfs_kern_mount.part.0+0x6f/0x410 [ 2131.684552] do_mount+0x581/0x2d30 [ 2131.688088] ? finish_automount+0x461/0x490 [ 2131.692420] ? copy_mount_string+0x40/0x40 [ 2131.697149] ? kmem_cache_alloc_trace+0x354/0x760 [ 2131.702048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2131.707598] ? copy_mount_options+0x30e/0x440 [ 2131.712104] ksys_mount+0xdb/0x150 [ 2131.715650] __x64_sys_mount+0xbe/0x150 [ 2131.719623] do_syscall_64+0x103/0x610 [ 2131.723508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2131.728703] RIP: 0033:0x45a8aa [ 2131.731886] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2131.750778] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2131.758478] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:20 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000000e0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:20 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xfffffdef, &(0x7f0000000600)}}], 0x2, 0x0) [ 2131.765736] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2131.773012] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2131.780275] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2131.787555] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:20 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xffffff7f, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x11000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3f000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:20 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xfffffff6, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x803e0000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 17:52:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000c00e0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:20 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x4000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc0000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 2132.184612] FAULT_INJECTION: forcing a failure. [ 2132.184612] name failslab, interval 1, probability 0, space 0, times 0 [ 2132.222802] CPU: 0 PID: 17005 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 17:52:20 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x40030000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2132.230070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2132.230076] Call Trace: [ 2132.230096] dump_stack+0x172/0x1f0 [ 2132.230116] should_fail.cold+0xa/0x1b [ 2132.230135] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2132.254700] ? lock_downgrade+0x810/0x810 [ 2132.258852] ? ___might_sleep+0x163/0x280 [ 2132.263004] __should_failslab+0x121/0x190 [ 2132.267235] should_failslab+0x9/0x14 [ 2132.267248] kmem_cache_alloc_trace+0x2d1/0x760 [ 2132.267262] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 17:52:20 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x100000000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2132.267279] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2132.280823] __list_lru_init+0x3d3/0x6e0 [ 2132.280842] sget_userns+0x84d/0xd30 [ 2132.280856] ? kill_litter_super+0x60/0x60 [ 2132.280870] ? ns_test_super+0x50/0x50 [ 2132.293529] ? ns_test_super+0x50/0x50 [ 2132.293541] ? kill_litter_super+0x60/0x60 [ 2132.293554] sget+0x10c/0x150 [ 2132.305523] mount_bdev+0xff/0x3c0 [ 2132.305537] ? finish_unfinished+0x1120/0x1120 [ 2132.305553] get_super_block+0x35/0x40 [ 2132.324869] mount_fs+0x106/0x3ff [ 2132.324886] ? emergency_thaw_all+0x1a0/0x1a0 17:52:21 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa00000000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2132.324900] ? __init_waitqueue_head+0x36/0x90 [ 2132.337408] vfs_kern_mount.part.0+0x6f/0x410 [ 2132.337436] do_mount+0x581/0x2d30 [ 2132.337451] ? finish_automount+0x461/0x490 [ 2132.349789] ? copy_mount_string+0x40/0x40 [ 2132.354033] ? kmem_cache_alloc_trace+0x354/0x760 [ 2132.354051] ? _copy_from_user+0xdd/0x150 [ 2132.354084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2132.368599] ? copy_mount_options+0x30e/0x440 [ 2132.373114] ksys_mount+0xdb/0x150 [ 2132.373131] __x64_sys_mount+0xbe/0x150 [ 2132.373149] do_syscall_64+0x103/0x610 [ 2132.384507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2132.384518] RIP: 0033:0x45a8aa [ 2132.384531] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2132.384541] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2132.419515] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2132.426811] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2132.434088] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2132.434112] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2132.434119] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:21 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:21 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x1100000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc03e0000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000000f0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:21 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xe03f0300, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 17:52:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000003f0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:21 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3f00000000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2132.599145] FAULT_INJECTION: forcing a failure. [ 2132.599145] name failslab, interval 1, probability 0, space 0, times 0 [ 2132.647385] CPU: 0 PID: 17042 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2132.654670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2132.664047] Call Trace: [ 2132.664085] dump_stack+0x172/0x1f0 [ 2132.664105] should_fail.cold+0xa/0x1b [ 2132.664126] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2132.664143] ? lock_downgrade+0x810/0x810 [ 2132.664162] ? ___might_sleep+0x163/0x280 [ 2132.664183] __should_failslab+0x121/0x190 [ 2132.692039] should_failslab+0x9/0x14 [ 2132.696031] kmem_cache_alloc_trace+0x2d1/0x760 [ 2132.700755] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2132.705867] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2132.710843] __list_lru_init+0x3d3/0x6e0 [ 2132.714912] sget_userns+0x84d/0xd30 [ 2132.718748] ? kill_litter_super+0x60/0x60 [ 2132.722994] ? ns_test_super+0x50/0x50 [ 2132.726892] ? ns_test_super+0x50/0x50 [ 2132.730788] ? kill_litter_super+0x60/0x60 [ 2132.735024] sget+0x10c/0x150 [ 2132.738147] mount_bdev+0xff/0x3c0 [ 2132.741711] ? finish_unfinished+0x1120/0x1120 [ 2132.746303] get_super_block+0x35/0x40 [ 2132.750211] mount_fs+0x106/0x3ff [ 2132.753682] ? emergency_thaw_all+0x1a0/0x1a0 [ 2132.758184] ? __init_waitqueue_head+0x36/0x90 [ 2132.762789] vfs_kern_mount.part.0+0x6f/0x410 [ 2132.767295] do_mount+0x581/0x2d30 [ 2132.770856] ? copy_mount_string+0x40/0x40 [ 2132.775121] ? copy_mount_options+0x244/0x440 [ 2132.779624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2132.785176] ? copy_mount_options+0x30e/0x440 [ 2132.789686] ksys_mount+0xdb/0x150 [ 2132.793250] __x64_sys_mount+0xbe/0x150 [ 2132.797235] do_syscall_64+0x103/0x610 [ 2132.801137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2132.806328] RIP: 0033:0x45a8aa [ 2132.809528] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2132.828435] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2132.828450] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xeffdffff, &(0x7f0000000600)}}], 0x2, 0x0) [ 2132.828459] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2132.828468] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2132.828477] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2132.828485] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:21 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x803e000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 17:52:21 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xf6ffffff, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000600101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:21 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc000000000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2133.175513] FAULT_INJECTION: forcing a failure. [ 2133.175513] name failslab, interval 1, probability 0, space 0, times 0 [ 2133.198479] CPU: 1 PID: 17084 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2133.205767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2133.215133] Call Trace: [ 2133.217753] dump_stack+0x172/0x1f0 [ 2133.221392] should_fail.cold+0xa/0x1b [ 2133.225301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2133.230409] ? lock_downgrade+0x810/0x810 [ 2133.234566] ? ___might_sleep+0x163/0x280 [ 2133.238739] __should_failslab+0x121/0x190 [ 2133.242972] should_failslab+0x9/0x14 [ 2133.246770] kmem_cache_alloc_trace+0x2d1/0x760 [ 2133.251450] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2133.256564] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2133.261497] __list_lru_init+0x3d3/0x6e0 [ 2133.265565] sget_userns+0x84d/0xd30 [ 2133.269280] ? kill_litter_super+0x60/0x60 [ 2133.273538] ? ns_test_super+0x50/0x50 [ 2133.277439] ? ns_test_super+0x50/0x50 [ 2133.281327] ? kill_litter_super+0x60/0x60 [ 2133.285564] sget+0x10c/0x150 [ 2133.288675] mount_bdev+0xff/0x3c0 [ 2133.292230] ? finish_unfinished+0x1120/0x1120 [ 2133.296844] get_super_block+0x35/0x40 [ 2133.300732] mount_fs+0x106/0x3ff [ 2133.304205] ? emergency_thaw_all+0x1a0/0x1a0 [ 2133.308698] ? __init_waitqueue_head+0x36/0x90 [ 2133.313293] vfs_kern_mount.part.0+0x6f/0x410 [ 2133.317826] do_mount+0x581/0x2d30 [ 2133.321378] ? finish_automount+0x461/0x490 [ 2133.325702] ? copy_mount_string+0x40/0x40 [ 2133.329933] ? kmem_cache_alloc_trace+0x354/0x760 [ 2133.334775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.340331] ? copy_mount_options+0x30e/0x440 [ 2133.344836] ksys_mount+0xdb/0x150 [ 2133.348384] __x64_sys_mount+0xbe/0x150 [ 2133.352356] do_syscall_64+0x103/0x610 [ 2133.356286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2133.361496] RIP: 0033:0x45a8aa [ 2133.364678] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2133.383565] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2133.391301] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2133.398608] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2133.405869] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2133.413156] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:52:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000970101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:22 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xfffffdef, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc03e000000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2133.420432] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 17:52:22 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xffffff7f, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 3 (fault-call:0 fault-nth:74): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f8900000020000ec00101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:22 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xe03f030000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xfffffff6, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:22 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xeffdffff00000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x4000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000f00101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2133.745380] FAULT_INJECTION: forcing a failure. [ 2133.745380] name failslab, interval 1, probability 0, space 0, times 0 [ 2133.854041] CPU: 0 PID: 17120 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2133.861409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2133.870764] Call Trace: [ 2133.873377] dump_stack+0x172/0x1f0 [ 2133.877063] should_fail.cold+0xa/0x1b [ 2133.880951] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2133.886051] ? lock_downgrade+0x810/0x810 [ 2133.890205] ? ___might_sleep+0x163/0x280 [ 2133.894352] __should_failslab+0x121/0x190 [ 2133.898598] should_failslab+0x9/0x14 [ 2133.902405] kmem_cache_alloc_trace+0x2d1/0x760 [ 2133.907080] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2133.912183] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2133.917146] __list_lru_init+0x3d3/0x6e0 [ 2133.921231] sget_userns+0x84d/0xd30 [ 2133.925000] ? kill_litter_super+0x60/0x60 [ 2133.929246] ? ns_test_super+0x50/0x50 [ 2133.933127] ? ns_test_super+0x50/0x50 [ 2133.937003] ? kill_litter_super+0x60/0x60 [ 2133.941227] sget+0x10c/0x150 [ 2133.944327] mount_bdev+0xff/0x3c0 [ 2133.947861] ? finish_unfinished+0x1120/0x1120 [ 2133.952478] get_super_block+0x35/0x40 [ 2133.956383] mount_fs+0x106/0x3ff [ 2133.959845] ? emergency_thaw_all+0x1a0/0x1a0 [ 2133.964336] ? __init_waitqueue_head+0x36/0x90 [ 2133.968918] vfs_kern_mount.part.0+0x6f/0x410 [ 2133.973447] do_mount+0x581/0x2d30 [ 2133.976985] ? finish_automount+0x461/0x490 [ 2133.981305] ? copy_mount_string+0x40/0x40 [ 2133.985549] ? kmem_cache_alloc_trace+0x354/0x760 [ 2133.990386] ? _copy_from_user+0xdd/0x150 [ 2133.994559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.000094] ? copy_mount_options+0x30e/0x440 [ 2134.004584] ksys_mount+0xdb/0x150 [ 2134.008120] __x64_sys_mount+0xbe/0x150 [ 2134.012109] do_syscall_64+0x103/0x610 [ 2134.016023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2134.021214] RIP: 0033:0x45a8aa [ 2134.024399] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2134.043300] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:22 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x40030000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 17:52:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2134.050993] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2134.058254] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2134.065515] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2134.072771] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2134.078071] net_ratelimit: 18 callbacks suppressed [ 2134.078078] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.080068] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2134.085037] protocol 88fb is buggy, dev hsr_slave_1 17:52:22 executing program 3 (fault-call:0 fault-nth:75): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:22 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xf6ffffff00000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x100000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000040001ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:22 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xa00000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:22 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xffffff7f00000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2134.227115] FAULT_INJECTION: forcing a failure. [ 2134.227115] name failslab, interval 1, probability 0, space 0, times 0 [ 2134.238486] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.238533] protocol 88fb is buggy, dev hsr_slave_1 [ 2134.238615] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.238671] protocol 88fb is buggy, dev hsr_slave_1 [ 2134.296255] CPU: 0 PID: 17154 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2134.303557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2134.312915] Call Trace: [ 2134.312935] dump_stack+0x172/0x1f0 [ 2134.312966] should_fail.cold+0xa/0x1b [ 2134.312981] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2134.312995] ? lock_downgrade+0x810/0x810 [ 2134.313010] ? ___might_sleep+0x163/0x280 [ 2134.313029] __should_failslab+0x121/0x190 [ 2134.313045] should_failslab+0x9/0x14 [ 2134.313059] kmem_cache_alloc_trace+0x2d1/0x760 [ 2134.349163] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2134.354263] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2134.359191] __list_lru_init+0x3d3/0x6e0 [ 2134.363263] sget_userns+0x84d/0xd30 [ 2134.366989] ? kill_litter_super+0x60/0x60 [ 2134.371261] ? ns_test_super+0x50/0x50 [ 2134.375139] ? ns_test_super+0x50/0x50 [ 2134.379030] ? kill_litter_super+0x60/0x60 [ 2134.383260] sget+0x10c/0x150 [ 2134.386376] mount_bdev+0xff/0x3c0 [ 2134.389925] ? finish_unfinished+0x1120/0x1120 [ 2134.394520] get_super_block+0x35/0x40 [ 2134.398415] mount_fs+0x106/0x3ff [ 2134.401897] ? emergency_thaw_all+0x1a0/0x1a0 [ 2134.406383] ? __init_waitqueue_head+0x36/0x90 [ 2134.411016] vfs_kern_mount.part.0+0x6f/0x410 [ 2134.415510] do_mount+0x581/0x2d30 [ 2134.419064] ? copy_mount_string+0x40/0x40 [ 2134.423298] ? copy_mount_options+0x223/0x440 [ 2134.427807] ? copy_mount_options+0x22f/0x440 [ 2134.432300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.437830] ? copy_mount_options+0x30e/0x440 [ 2134.442342] ksys_mount+0xdb/0x150 [ 2134.445878] __x64_sys_mount+0xbe/0x150 [ 2134.449849] do_syscall_64+0x103/0x610 [ 2134.453753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2134.458938] RIP: 0033:0x45a8aa [ 2134.462120] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2134.481011] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2134.488710] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 17:52:23 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x1100000000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2134.495967] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2134.503256] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2134.510520] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2134.517787] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:23 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x4}}], 0x2, 0x0) 17:52:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000020101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:23 executing program 3 (fault-call:0 fault-nth:76): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 17:52:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:23 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x3f00000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:23 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa}}], 0x2, 0x0) [ 2134.732958] FAULT_INJECTION: forcing a failure. [ 2134.732958] name failslab, interval 1, probability 0, space 0, times 0 [ 2134.770371] CPU: 0 PID: 17182 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2134.777646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2134.777651] Call Trace: [ 2134.777671] dump_stack+0x172/0x1f0 [ 2134.777704] should_fail.cold+0xa/0x1b [ 2134.797191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2134.798093] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.802356] ? lock_downgrade+0x810/0x810 [ 2134.802372] ? ___might_sleep+0x163/0x280 [ 2134.802391] __should_failslab+0x121/0x190 [ 2134.807431] protocol 88fb is buggy, dev hsr_slave_1 [ 2134.811521] should_failslab+0x9/0x14 [ 2134.811534] kmem_cache_alloc_trace+0x2d1/0x760 [ 2134.811548] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2134.811564] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2134.833330] __list_lru_init+0x3d3/0x6e0 [ 2134.847394] sget_userns+0x84d/0xd30 [ 2134.851128] ? kill_litter_super+0x60/0x60 [ 2134.855359] ? ns_test_super+0x50/0x50 [ 2134.855374] ? ns_test_super+0x50/0x50 [ 2134.855388] ? kill_litter_super+0x60/0x60 [ 2134.855401] sget+0x10c/0x150 [ 2134.855455] mount_bdev+0xff/0x3c0 [ 2134.874038] ? finish_unfinished+0x1120/0x1120 [ 2134.878658] get_super_block+0x35/0x40 [ 2134.882547] mount_fs+0x106/0x3ff [ 2134.886000] ? emergency_thaw_all+0x1a0/0x1a0 [ 2134.890491] ? __init_waitqueue_head+0x36/0x90 [ 2134.895090] vfs_kern_mount.part.0+0x6f/0x410 [ 2134.899606] do_mount+0x581/0x2d30 [ 2134.903144] ? finish_automount+0x461/0x490 [ 2134.907484] ? copy_mount_string+0x40/0x40 [ 2134.911713] ? kmem_cache_alloc_trace+0x354/0x760 [ 2134.916568] ? _copy_from_user+0xdd/0x150 [ 2134.920728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.926259] ? copy_mount_options+0x30e/0x440 [ 2134.930808] ksys_mount+0xdb/0x150 [ 2134.934349] __x64_sys_mount+0xbe/0x150 [ 2134.938323] do_syscall_64+0x103/0x610 [ 2134.942205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2134.947395] RIP: 0033:0x45a8aa [ 2134.950588] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2134.969484] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 17:52:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000040101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:23 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x803e000000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2134.977181] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2134.984452] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2134.991719] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2134.999002] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2135.006264] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:23 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x11}}], 0x2, 0x0) 17:52:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:23 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc000000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:23 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc0}}], 0x2, 0x0) 17:52:23 executing program 3 (fault-call:0 fault-nth:77): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000080101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:23 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xc03e000000000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:23 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa00}}], 0x2, 0x0) 17:52:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 2135.208060] protocol 88fb is buggy, dev hsr_slave_0 [ 2135.213127] protocol 88fb is buggy, dev hsr_slave_1 17:52:23 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xe03f030000000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2135.317580] FAULT_INJECTION: forcing a failure. [ 2135.317580] name failslab, interval 1, probability 0, space 0, times 0 [ 2135.342202] CPU: 0 PID: 17229 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2135.349496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2135.358834] Call Trace: [ 2135.358856] dump_stack+0x172/0x1f0 [ 2135.358889] should_fail.cold+0xa/0x1b [ 2135.358905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2135.358920] ? lock_downgrade+0x810/0x810 [ 2135.358936] ? ___might_sleep+0x163/0x280 [ 2135.358956] __should_failslab+0x121/0x190 [ 2135.358973] should_failslab+0x9/0x14 [ 2135.369013] kmem_cache_alloc_trace+0x2d1/0x760 [ 2135.369028] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2135.369046] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2135.369061] __list_lru_init+0x3d3/0x6e0 [ 2135.369078] sget_userns+0x84d/0xd30 [ 2135.369091] ? kill_litter_super+0x60/0x60 [ 2135.369106] ? ns_test_super+0x50/0x50 [ 2135.369119] ? ns_test_super+0x50/0x50 [ 2135.386687] ? kill_litter_super+0x60/0x60 [ 2135.386701] sget+0x10c/0x150 [ 2135.386718] mount_bdev+0xff/0x3c0 [ 2135.386747] ? finish_unfinished+0x1120/0x1120 [ 2135.417129] get_super_block+0x35/0x40 [ 2135.417146] mount_fs+0x106/0x3ff [ 2135.417161] ? emergency_thaw_all+0x1a0/0x1a0 [ 2135.417175] ? __init_waitqueue_head+0x36/0x90 [ 2135.424970] vfs_kern_mount.part.0+0x6f/0x410 [ 2135.425001] do_mount+0x581/0x2d30 [ 2135.425018] ? finish_automount+0x461/0x490 [ 2135.469123] ? copy_mount_string+0x40/0x40 [ 2135.473345] ? kmem_cache_alloc_trace+0x354/0x760 [ 2135.478183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2135.483761] ? copy_mount_options+0x30e/0x440 [ 2135.488266] ksys_mount+0xdb/0x150 [ 2135.491816] __x64_sys_mount+0xbe/0x150 [ 2135.495800] do_syscall_64+0x103/0x610 [ 2135.499683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2135.504857] RIP: 0033:0x45a8aa [ 2135.508035] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2135.526922] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2135.534638] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2135.541910] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2135.549177] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2135.556434] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:52:24 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x1100}}], 0x2, 0x0) [ 2135.563845] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:24 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xeffdffff00000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:24 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3e80}}], 0x2, 0x0) 17:52:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000000a0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:24 executing program 3 (fault-call:0 fault-nth:78): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 17:52:24 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xf6ffffff00000000, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:24 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3ec0}}], 0x2, 0x0) 17:52:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000000e0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2135.812162] FAULT_INJECTION: forcing a failure. [ 2135.812162] name failslab, interval 1, probability 0, space 0, times 0 [ 2135.877258] CPU: 1 PID: 17260 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2135.884557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2135.893896] Call Trace: [ 2135.896494] dump_stack+0x172/0x1f0 [ 2135.900116] should_fail.cold+0xa/0x1b [ 2135.904001] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2135.909103] ? lock_downgrade+0x810/0x810 [ 2135.913246] ? ___might_sleep+0x163/0x280 [ 2135.917434] __should_failslab+0x121/0x190 [ 2135.921685] should_failslab+0x9/0x14 [ 2135.925483] kmem_cache_alloc_trace+0x2d1/0x760 [ 2135.930167] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2135.935292] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2135.940235] __list_lru_init+0x3d3/0x6e0 [ 2135.944301] sget_userns+0x84d/0xd30 [ 2135.948025] ? kill_litter_super+0x60/0x60 [ 2135.952260] ? ns_test_super+0x50/0x50 [ 2135.956153] ? ns_test_super+0x50/0x50 [ 2135.960036] ? kill_litter_super+0x60/0x60 [ 2135.964270] sget+0x10c/0x150 [ 2135.967400] mount_bdev+0xff/0x3c0 [ 2135.970943] ? finish_unfinished+0x1120/0x1120 [ 2135.975521] get_super_block+0x35/0x40 [ 2135.979407] mount_fs+0x106/0x3ff [ 2135.982882] ? emergency_thaw_all+0x1a0/0x1a0 [ 2135.987388] ? __init_waitqueue_head+0x36/0x90 [ 2135.991988] vfs_kern_mount.part.0+0x6f/0x410 [ 2135.996496] do_mount+0x581/0x2d30 [ 2136.000030] ? finish_automount+0x461/0x490 [ 2136.004387] ? copy_mount_string+0x40/0x40 [ 2136.008617] ? kmem_cache_alloc_trace+0x354/0x760 [ 2136.013483] ? _copy_from_user+0xdd/0x150 [ 2136.017648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.023205] ? copy_mount_options+0x30e/0x440 [ 2136.027704] ksys_mount+0xdb/0x150 [ 2136.031256] __x64_sys_mount+0xbe/0x150 [ 2136.035232] do_syscall_64+0x103/0x610 [ 2136.039163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2136.044365] RIP: 0033:0x45a8aa [ 2136.047552] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2136.066469] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 17:52:24 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3f00}}], 0x2, 0x0) 17:52:24 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0xffffff7f00000000, &(0x7f0000000600)}}], 0x2, 0x0) [ 2136.074169] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2136.081435] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2136.088705] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2136.095966] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2136.103227] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f890000002000000f0101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:25 executing program 3 (fault-call:0 fault-nth:79): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:25 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x4}}], 0x2, 0x0) 17:52:25 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x803e}}], 0x2, 0x0) 17:52:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000100101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 17:52:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:25 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc000}}], 0x2, 0x0) 17:52:25 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa}}], 0x2, 0x0) 17:52:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000600101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2136.466959] FAULT_INJECTION: forcing a failure. [ 2136.466959] name failslab, interval 1, probability 0, space 0, times 0 [ 2136.528556] CPU: 1 PID: 17306 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2136.535856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2136.545198] Call Trace: [ 2136.547786] dump_stack+0x172/0x1f0 [ 2136.551411] should_fail.cold+0xa/0x1b [ 2136.555314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2136.560404] ? lock_downgrade+0x810/0x810 [ 2136.564725] ? ___might_sleep+0x163/0x280 [ 2136.568884] __should_failslab+0x121/0x190 [ 2136.573130] should_failslab+0x9/0x14 [ 2136.576939] kmem_cache_alloc_trace+0x2d1/0x760 [ 2136.581634] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2136.586762] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2136.591704] __list_lru_init+0x3d3/0x6e0 [ 2136.595777] sget_userns+0x84d/0xd30 [ 2136.599482] ? kill_litter_super+0x60/0x60 [ 2136.603716] ? ns_test_super+0x50/0x50 [ 2136.607621] ? ns_test_super+0x50/0x50 [ 2136.611498] ? kill_litter_super+0x60/0x60 [ 2136.615726] sget+0x10c/0x150 [ 2136.618828] mount_bdev+0xff/0x3c0 [ 2136.622360] ? finish_unfinished+0x1120/0x1120 [ 2136.626953] get_super_block+0x35/0x40 [ 2136.630840] mount_fs+0x106/0x3ff [ 2136.634323] ? emergency_thaw_all+0x1a0/0x1a0 [ 2136.638825] ? __init_waitqueue_head+0x36/0x90 [ 2136.643405] vfs_kern_mount.part.0+0x6f/0x410 [ 2136.647902] do_mount+0x581/0x2d30 [ 2136.651454] ? finish_automount+0x461/0x490 [ 2136.655772] ? copy_mount_string+0x40/0x40 [ 2136.660031] ? kmem_cache_alloc_trace+0x354/0x760 [ 2136.664871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.670398] ? copy_mount_options+0x30e/0x440 [ 2136.674890] ksys_mount+0xdb/0x150 [ 2136.678435] __x64_sys_mount+0xbe/0x150 [ 2136.682451] do_syscall_64+0x103/0x610 [ 2136.686356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2136.691552] RIP: 0033:0x45a8aa [ 2136.695250] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2136.714177] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2136.721872] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:25 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x11}}], 0x2, 0x0) 17:52:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2136.729147] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2136.736523] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2136.743796] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2136.751083] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:25 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc03e}}], 0x2, 0x0) 17:52:25 executing program 3 (fault-call:0 fault-nth:80): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:25 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc0}}], 0x2, 0x0) 17:52:25 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x33fe0}}], 0x2, 0x0) 17:52:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 17:52:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000970101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:25 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x34000}}], 0x2, 0x0) 17:52:25 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa00}}], 0x2, 0x0) 17:52:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2136.960722] FAULT_INJECTION: forcing a failure. [ 2136.960722] name failslab, interval 1, probability 0, space 0, times 0 [ 2137.028899] CPU: 1 PID: 17336 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2137.036180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2137.045542] Call Trace: [ 2137.048129] dump_stack+0x172/0x1f0 [ 2137.051759] should_fail.cold+0xa/0x1b [ 2137.055649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2137.060761] ? lock_downgrade+0x810/0x810 [ 2137.064917] ? ___might_sleep+0x163/0x280 [ 2137.069081] __should_failslab+0x121/0x190 [ 2137.073321] should_failslab+0x9/0x14 [ 2137.077130] kmem_cache_alloc_trace+0x2d1/0x760 [ 2137.081812] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2137.086911] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2137.091851] __list_lru_init+0x3d3/0x6e0 [ 2137.095925] sget_userns+0x84d/0xd30 [ 2137.099629] ? kill_litter_super+0x60/0x60 [ 2137.103860] ? ns_test_super+0x50/0x50 [ 2137.107742] ? ns_test_super+0x50/0x50 [ 2137.111619] ? kill_litter_super+0x60/0x60 [ 2137.115868] sget+0x10c/0x150 [ 2137.118971] mount_bdev+0xff/0x3c0 [ 2137.122504] ? finish_unfinished+0x1120/0x1120 [ 2137.127092] get_super_block+0x35/0x40 [ 2137.130987] mount_fs+0x106/0x3ff [ 2137.134447] ? emergency_thaw_all+0x1a0/0x1a0 [ 2137.138936] ? __init_waitqueue_head+0x36/0x90 [ 2137.143540] vfs_kern_mount.part.0+0x6f/0x410 [ 2137.143560] do_mount+0x581/0x2d30 [ 2137.151564] ? finish_automount+0x461/0x490 [ 2137.155880] ? copy_mount_string+0x40/0x40 [ 2137.155893] ? kmem_cache_alloc_trace+0x354/0x760 [ 2137.155908] ? _copy_from_user+0xdd/0x150 [ 2137.169105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.174753] ? copy_mount_options+0x30e/0x440 [ 2137.179257] ksys_mount+0xdb/0x150 [ 2137.182796] __x64_sys_mount+0xbe/0x150 [ 2137.186767] do_syscall_64+0x103/0x610 [ 2137.190662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2137.195839] RIP: 0033:0x45a8aa [ 2137.199037] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2137.217932] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:25 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x40000}}], 0x2, 0x0) [ 2137.225635] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2137.232893] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2137.240162] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2137.247437] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2137.254721] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:25 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x1100}}], 0x2, 0x0) 17:52:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x400300}}], 0x2, 0x0) 17:52:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000301ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:26 executing program 3 (fault-call:0 fault-nth:81): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x1000000}}], 0x2, 0x0) 17:52:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3e80}}], 0x2, 0x0) 17:52:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 17:52:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000004001ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 17:52:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3ec0}}], 0x2, 0x0) 17:52:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000201ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa000000}}], 0x2, 0x0) [ 2137.659524] FAULT_INJECTION: forcing a failure. [ 2137.659524] name failslab, interval 1, probability 0, space 0, times 0 [ 2137.714472] CPU: 0 PID: 17383 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2137.721841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2137.731189] Call Trace: [ 2137.733799] dump_stack+0x172/0x1f0 [ 2137.737451] should_fail.cold+0xa/0x1b [ 2137.741340] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2137.746482] ? lock_downgrade+0x810/0x810 [ 2137.750638] ? ___might_sleep+0x163/0x280 [ 2137.754808] __should_failslab+0x121/0x190 [ 2137.759064] should_failslab+0x9/0x14 17:52:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3f00}}], 0x2, 0x0) [ 2137.762880] kmem_cache_alloc_trace+0x2d1/0x760 [ 2137.767566] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2137.772501] __list_lru_init+0x3d3/0x6e0 [ 2137.776572] sget_userns+0x84d/0xd30 [ 2137.780287] ? kill_litter_super+0x60/0x60 [ 2137.784537] ? ns_test_super+0x50/0x50 [ 2137.788418] ? ns_test_super+0x50/0x50 [ 2137.792318] ? kill_litter_super+0x60/0x60 [ 2137.796546] sget+0x10c/0x150 [ 2137.799702] mount_bdev+0xff/0x3c0 [ 2137.803268] ? finish_unfinished+0x1120/0x1120 [ 2137.807849] get_super_block+0x35/0x40 [ 2137.811761] mount_fs+0x106/0x3ff [ 2137.815247] ? emergency_thaw_all+0x1a0/0x1a0 [ 2137.819738] ? __init_waitqueue_head+0x36/0x90 [ 2137.824315] vfs_kern_mount.part.0+0x6f/0x410 [ 2137.828820] do_mount+0x581/0x2d30 [ 2137.832351] ? finish_automount+0x461/0x490 [ 2137.836665] ? copy_mount_string+0x40/0x40 [ 2137.840888] ? kmem_cache_alloc_trace+0x354/0x760 [ 2137.845726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.851256] ? copy_mount_options+0x30e/0x440 [ 2137.855772] ksys_mount+0xdb/0x150 [ 2137.859334] __x64_sys_mount+0xbe/0x150 [ 2137.863304] do_syscall_64+0x103/0x610 [ 2137.867190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2137.872367] RIP: 0033:0x45a8aa [ 2137.875571] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2137.894462] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2137.902157] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2137.909421] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2137.916720] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2137.923979] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2137.931268] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:26 executing program 3 (fault-call:0 fault-nth:82): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 17:52:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x11000000}}], 0x2, 0x0) 17:52:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000301ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x803e}}], 0x2, 0x0) 17:52:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc000}}], 0x2, 0x0) 17:52:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3f000000}}], 0x2, 0x0) 17:52:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000401ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:26 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x803e0000}}], 0x2, 0x0) 17:52:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:26 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc03e}}], 0x2, 0x0) [ 2138.362116] FAULT_INJECTION: forcing a failure. [ 2138.362116] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.373709] CPU: 0 PID: 17440 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2138.380978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2138.380984] Call Trace: [ 2138.381005] dump_stack+0x172/0x1f0 [ 2138.381025] should_fail.cold+0xa/0x1b [ 2138.381044] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2138.381059] ? lock_downgrade+0x810/0x810 [ 2138.381106] ? ___might_sleep+0x163/0x280 [ 2138.381129] __should_failslab+0x121/0x190 [ 2138.381147] should_failslab+0x9/0x14 [ 2138.396663] kmem_cache_alloc_trace+0x2d1/0x760 [ 2138.405630] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2138.405648] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2138.405662] __list_lru_init+0x3d3/0x6e0 [ 2138.440719] sget_userns+0x84d/0xd30 [ 2138.444450] ? kill_litter_super+0x60/0x60 [ 2138.448699] ? ns_test_super+0x50/0x50 [ 2138.452629] ? ns_test_super+0x50/0x50 [ 2138.456529] ? kill_litter_super+0x60/0x60 [ 2138.460762] sget+0x10c/0x150 [ 2138.463871] mount_bdev+0xff/0x3c0 [ 2138.467435] ? finish_unfinished+0x1120/0x1120 [ 2138.472029] get_super_block+0x35/0x40 [ 2138.475922] mount_fs+0x106/0x3ff [ 2138.479386] ? emergency_thaw_all+0x1a0/0x1a0 [ 2138.483886] ? __init_waitqueue_head+0x36/0x90 [ 2138.488473] vfs_kern_mount.part.0+0x6f/0x410 [ 2138.492984] do_mount+0x581/0x2d30 [ 2138.496577] ? finish_automount+0x461/0x490 [ 2138.500911] ? copy_mount_string+0x40/0x40 [ 2138.505151] ? kmem_cache_alloc_trace+0x354/0x760 [ 2138.509991] ? _copy_from_user+0xdd/0x150 [ 2138.514155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.519713] ? copy_mount_options+0x30e/0x440 [ 2138.524205] ksys_mount+0xdb/0x150 [ 2138.527741] __x64_sys_mount+0xbe/0x150 [ 2138.531729] do_syscall_64+0x103/0x610 [ 2138.535661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2138.540858] RIP: 0033:0x45a8aa [ 2138.544056] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2138.563432] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2138.571150] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2138.578439] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2138.585732] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2138.592991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2138.600250] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:27 executing program 3 (fault-call:0 fault-nth:83): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 17:52:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x33fe0}}], 0x2, 0x0) 17:52:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc0000000}}], 0x2, 0x0) 17:52:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000801ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000102ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc03e0000}}], 0x2, 0x0) [ 2138.747077] FAULT_INJECTION: forcing a failure. [ 2138.747077] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.791717] CPU: 1 PID: 17457 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2138.798995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2138.808353] Call Trace: [ 2138.810935] dump_stack+0x172/0x1f0 [ 2138.814567] should_fail.cold+0xa/0x1b [ 2138.818471] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2138.823564] ? lock_downgrade+0x810/0x810 [ 2138.827718] ? ___might_sleep+0x163/0x280 [ 2138.831886] __should_failslab+0x121/0x190 [ 2138.836113] should_failslab+0x9/0x14 [ 2138.839916] kmem_cache_alloc_trace+0x2d1/0x760 [ 2138.844591] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2138.849720] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2138.854648] __list_lru_init+0x3d3/0x6e0 [ 2138.858720] sget_userns+0x84d/0xd30 [ 2138.862431] ? kill_litter_super+0x60/0x60 [ 2138.866664] ? ns_test_super+0x50/0x50 [ 2138.870561] ? ns_test_super+0x50/0x50 [ 2138.874459] ? kill_litter_super+0x60/0x60 [ 2138.878718] sget+0x10c/0x150 [ 2138.881825] mount_bdev+0xff/0x3c0 [ 2138.885359] ? finish_unfinished+0x1120/0x1120 [ 2138.889932] get_super_block+0x35/0x40 [ 2138.893811] mount_fs+0x106/0x3ff [ 2138.897256] ? emergency_thaw_all+0x1a0/0x1a0 [ 2138.901744] ? __init_waitqueue_head+0x36/0x90 [ 2138.906323] vfs_kern_mount.part.0+0x6f/0x410 [ 2138.910850] do_mount+0x581/0x2d30 [ 2138.914412] ? finish_automount+0x461/0x490 [ 2138.918757] ? copy_mount_string+0x40/0x40 [ 2138.922992] ? kmem_cache_alloc_trace+0x354/0x760 [ 2138.927841] ? _copy_from_user+0xdd/0x150 [ 2138.931994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.937531] ? copy_mount_options+0x30e/0x440 [ 2138.942036] ksys_mount+0xdb/0x150 [ 2138.945586] __x64_sys_mount+0xbe/0x150 [ 2138.949570] do_syscall_64+0x103/0x610 [ 2138.953466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2138.958651] RIP: 0033:0x45a8aa [ 2138.961872] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2138.980767] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2138.988480] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2138.995740] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2139.002996] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2139.010252] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2139.017522] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x34000}}], 0x2, 0x0) 17:52:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xe03f0300}}], 0x2, 0x0) 17:52:27 executing program 3 (fault-call:0 fault-nth:84): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000103ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 17:52:27 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xeffdffff}}], 0x2, 0x0) 17:52:27 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x40000}}], 0x2, 0x0) [ 2139.224689] FAULT_INJECTION: forcing a failure. [ 2139.224689] name failslab, interval 1, probability 0, space 0, times 0 17:52:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000104ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2139.309812] CPU: 0 PID: 17481 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2139.317092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2139.326459] Call Trace: [ 2139.329057] dump_stack+0x172/0x1f0 [ 2139.332715] should_fail.cold+0xa/0x1b [ 2139.336613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2139.341742] ? lock_downgrade+0x810/0x810 [ 2139.345908] ? ___might_sleep+0x163/0x280 [ 2139.350084] __should_failslab+0x121/0x190 [ 2139.354329] should_failslab+0x9/0x14 [ 2139.358129] kmem_cache_alloc_trace+0x2d1/0x760 [ 2139.362818] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2139.367956] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2139.372888] __list_lru_init+0x3d3/0x6e0 [ 2139.376948] sget_userns+0x84d/0xd30 [ 2139.380670] ? kill_litter_super+0x60/0x60 [ 2139.384901] ? ns_test_super+0x50/0x50 [ 2139.388789] ? ns_test_super+0x50/0x50 [ 2139.392678] ? kill_litter_super+0x60/0x60 [ 2139.396924] sget+0x10c/0x150 [ 2139.400059] mount_bdev+0xff/0x3c0 [ 2139.403591] ? finish_unfinished+0x1120/0x1120 [ 2139.408183] get_super_block+0x35/0x40 [ 2139.412067] mount_fs+0x106/0x3ff [ 2139.415519] ? emergency_thaw_all+0x1a0/0x1a0 [ 2139.420009] ? __init_waitqueue_head+0x36/0x90 [ 2139.424608] vfs_kern_mount.part.0+0x6f/0x410 [ 2139.429128] do_mount+0x581/0x2d30 [ 2139.432672] ? finish_automount+0x461/0x490 [ 2139.436994] ? copy_mount_string+0x40/0x40 [ 2139.441226] ? kmem_cache_alloc_trace+0x354/0x760 [ 2139.446085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.451612] ? copy_mount_options+0x30e/0x440 [ 2139.456110] ksys_mount+0xdb/0x150 [ 2139.459696] __x64_sys_mount+0xbe/0x150 [ 2139.463666] do_syscall_64+0x103/0x610 [ 2139.467549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2139.472763] RIP: 0033:0x45a8aa [ 2139.475967] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2139.494865] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2139.502562] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x2, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xf6ffffff}}], 0x2, 0x0) [ 2139.509822] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2139.517088] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2139.524350] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2139.531619] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2139.539174] net_ratelimit: 22 callbacks suppressed [ 2139.539182] protocol 88fb is buggy, dev hsr_slave_0 [ 2139.549212] protocol 88fb is buggy, dev hsr_slave_1 17:52:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x400300}}], 0x2, 0x0) 17:52:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xfffffdef}}], 0x2, 0x0) [ 2139.598065] protocol 88fb is buggy, dev hsr_slave_0 [ 2139.603145] protocol 88fb is buggy, dev hsr_slave_1 17:52:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000108ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:28 executing program 3 (fault-call:0 fault-nth:85): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x1000000}}], 0x2, 0x0) 17:52:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xffffff7f}}], 0x2, 0x0) 17:52:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x301, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000109ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x500, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa000000}}], 0x2, 0x0) 17:52:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xfffffff6}}], 0x2, 0x0) 17:52:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000209ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2139.949675] FAULT_INJECTION: forcing a failure. [ 2139.949675] name failslab, interval 1, probability 0, space 0, times 0 [ 2139.995950] CPU: 1 PID: 17526 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2140.003244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2140.012591] Call Trace: [ 2140.015178] dump_stack+0x172/0x1f0 [ 2140.018840] should_fail.cold+0xa/0x1b [ 2140.022758] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2140.027869] ? lock_downgrade+0x810/0x810 [ 2140.032020] ? ___might_sleep+0x163/0x280 [ 2140.036208] __should_failslab+0x121/0x190 [ 2140.040461] should_failslab+0x9/0x14 [ 2140.044260] kmem_cache_alloc_trace+0x2d1/0x760 [ 2140.048939] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2140.054041] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2140.058971] __list_lru_init+0x3d3/0x6e0 [ 2140.063047] sget_userns+0x84d/0xd30 [ 2140.066753] ? kill_litter_super+0x60/0x60 [ 2140.070990] ? ns_test_super+0x50/0x50 [ 2140.074874] ? ns_test_super+0x50/0x50 [ 2140.078768] ? kill_litter_super+0x60/0x60 [ 2140.083015] sget+0x10c/0x150 [ 2140.086154] mount_bdev+0xff/0x3c0 [ 2140.089687] ? finish_unfinished+0x1120/0x1120 [ 2140.094304] get_super_block+0x35/0x40 [ 2140.098205] mount_fs+0x106/0x3ff [ 2140.101657] ? emergency_thaw_all+0x1a0/0x1a0 [ 2140.106147] ? __init_waitqueue_head+0x36/0x90 [ 2140.110732] vfs_kern_mount.part.0+0x6f/0x410 [ 2140.115253] do_mount+0x581/0x2d30 [ 2140.118787] ? finish_automount+0x461/0x490 [ 2140.123123] ? copy_mount_string+0x40/0x40 [ 2140.127364] ? kmem_cache_alloc_trace+0x354/0x760 [ 2140.132219] ? _copy_from_user+0xdd/0x150 [ 2140.136366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.141926] ? copy_mount_options+0x30e/0x440 [ 2140.146436] ksys_mount+0xdb/0x150 [ 2140.149981] __x64_sys_mount+0xbe/0x150 [ 2140.153959] do_syscall_64+0x103/0x610 [ 2140.157864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2140.163042] RIP: 0033:0x45a8aa [ 2140.166228] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2140.185121] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:28 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x11000000}}], 0x2, 0x0) [ 2140.192851] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2140.200127] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2140.207398] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2140.214661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2140.221917] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:28 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x4000000000000}}], 0x2, 0x0) [ 2140.318070] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.323191] protocol 88fb is buggy, dev hsr_slave_1 17:52:29 executing program 3 (fault-call:0 fault-nth:86): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x200072ca, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:29 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x40030000000000}}], 0x2, 0x0) 17:52:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3f000000}}], 0x2, 0x0) 17:52:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0200000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 17:52:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x803e0000}}], 0x2, 0x0) 17:52:29 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x100000000000000}}], 0x2, 0x0) 17:52:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0400000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 2140.638336] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.643415] protocol 88fb is buggy, dev hsr_slave_1 [ 2140.648617] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.653698] protocol 88fb is buggy, dev hsr_slave_1 17:52:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 2140.691014] FAULT_INJECTION: forcing a failure. [ 2140.691014] name failslab, interval 1, probability 0, space 0, times 0 17:52:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2140.778575] CPU: 1 PID: 17574 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2140.785893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2140.795242] Call Trace: [ 2140.797860] dump_stack+0x172/0x1f0 [ 2140.797902] should_fail.cold+0xa/0x1b [ 2140.797923] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2140.805432] ? lock_downgrade+0x810/0x810 [ 2140.805466] ? ___might_sleep+0x163/0x280 [ 2140.805488] __should_failslab+0x121/0x190 [ 2140.823064] should_failslab+0x9/0x14 [ 2140.823079] kmem_cache_alloc_trace+0x2d1/0x760 [ 2140.823095] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2140.836651] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2140.841583] __list_lru_init+0x3d3/0x6e0 [ 2140.845662] sget_userns+0x84d/0xd30 [ 2140.849376] ? kill_litter_super+0x60/0x60 [ 2140.853615] ? ns_test_super+0x50/0x50 [ 2140.853629] ? ns_test_super+0x50/0x50 [ 2140.853644] ? kill_litter_super+0x60/0x60 [ 2140.861393] sget+0x10c/0x150 [ 2140.861411] mount_bdev+0xff/0x3c0 [ 2140.861436] ? finish_unfinished+0x1120/0x1120 [ 2140.861453] get_super_block+0x35/0x40 [ 2140.880756] mount_fs+0x106/0x3ff [ 2140.884224] ? emergency_thaw_all+0x1a0/0x1a0 [ 2140.888716] ? __init_waitqueue_head+0x36/0x90 [ 2140.893302] vfs_kern_mount.part.0+0x6f/0x410 [ 2140.897796] do_mount+0x581/0x2d30 [ 2140.901328] ? finish_automount+0x461/0x490 [ 2140.905673] ? copy_mount_string+0x40/0x40 [ 2140.909901] ? kmem_cache_alloc_trace+0x354/0x760 [ 2140.914758] ? _copy_from_user+0xdd/0x150 [ 2140.918919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.924482] ? copy_mount_options+0x30e/0x440 [ 2140.928979] ksys_mount+0xdb/0x150 [ 2140.932517] __x64_sys_mount+0xbe/0x150 [ 2140.936498] do_syscall_64+0x103/0x610 [ 2140.940401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2140.945588] RIP: 0033:0x45a8aa [ 2140.948772] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2140.967662] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc0000000}}], 0x2, 0x0) [ 2140.975360] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2140.982637] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2140.989910] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2140.997176] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2141.004467] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:29 executing program 3 (fault-call:0 fault-nth:87): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:29 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa00000000000000}}], 0x2, 0x0) 17:52:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0800000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc03e0000}}], 0x2, 0x0) 17:52:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 17:52:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xe03f0300}}], 0x2, 0x0) 17:52:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0a00000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:29 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x1100000000000000}}], 0x2, 0x0) [ 2141.231201] FAULT_INJECTION: forcing a failure. [ 2141.231201] name failslab, interval 1, probability 0, space 0, times 0 17:52:29 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xeffdffff}}], 0x2, 0x0) [ 2141.310473] CPU: 0 PID: 17606 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2141.317770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2141.327125] Call Trace: [ 2141.329726] dump_stack+0x172/0x1f0 [ 2141.333364] should_fail.cold+0xa/0x1b [ 2141.337287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2141.342401] ? lock_downgrade+0x810/0x810 [ 2141.346572] ? ___might_sleep+0x163/0x280 [ 2141.350736] __should_failslab+0x121/0x190 [ 2141.354972] should_failslab+0x9/0x14 [ 2141.358766] kmem_cache_alloc_trace+0x2d1/0x760 [ 2141.363454] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2141.368619] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2141.373562] __list_lru_init+0x3d3/0x6e0 [ 2141.377686] sget_userns+0x84d/0xd30 [ 2141.381412] ? kill_litter_super+0x60/0x60 [ 2141.385659] ? ns_test_super+0x50/0x50 [ 2141.389549] ? ns_test_super+0x50/0x50 [ 2141.393439] ? kill_litter_super+0x60/0x60 [ 2141.397688] sget+0x10c/0x150 [ 2141.400797] mount_bdev+0xff/0x3c0 [ 2141.404340] ? finish_unfinished+0x1120/0x1120 [ 2141.408920] get_super_block+0x35/0x40 [ 2141.412839] mount_fs+0x106/0x3ff [ 2141.416326] ? emergency_thaw_all+0x1a0/0x1a0 [ 2141.420837] ? __init_waitqueue_head+0x36/0x90 [ 2141.425469] vfs_kern_mount.part.0+0x6f/0x410 [ 2141.429969] do_mount+0x581/0x2d30 [ 2141.433508] ? finish_automount+0x461/0x490 [ 2141.437829] ? copy_mount_string+0x40/0x40 [ 2141.442059] ? kmem_cache_alloc_trace+0x354/0x760 [ 2141.446912] ? _copy_from_user+0xdd/0x150 [ 2141.451061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.456612] ? copy_mount_options+0x30e/0x440 17:52:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3f00000000000000}}], 0x2, 0x0) [ 2141.461106] ksys_mount+0xdb/0x150 [ 2141.464649] __x64_sys_mount+0xbe/0x150 [ 2141.468659] do_syscall_64+0x103/0x610 [ 2141.472577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2141.477765] RIP: 0033:0x45a8aa [ 2141.480961] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2141.499855] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:52:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 2141.507557] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2141.507565] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2141.507573] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2141.507580] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2141.507587] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:30 executing program 3 (fault-call:0 fault-nth:88): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x803e000000000000}}], 0x2, 0x0) 17:52:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0e00000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xf6ffffff}}], 0x2, 0x0) 17:52:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 2141.714378] FAULT_INJECTION: forcing a failure. [ 2141.714378] name failslab, interval 1, probability 0, space 0, times 0 [ 2141.735720] CPU: 1 PID: 17642 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2141.743001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2141.752348] Call Trace: [ 2141.754937] dump_stack+0x172/0x1f0 [ 2141.758570] should_fail.cold+0xa/0x1b [ 2141.762459] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2141.767556] ? lock_downgrade+0x810/0x810 [ 2141.771713] ? ___might_sleep+0x163/0x280 [ 2141.775868] __should_failslab+0x121/0x190 [ 2141.780101] should_failslab+0x9/0x14 [ 2141.783894] kmem_cache_alloc_trace+0x2d1/0x760 [ 2141.788578] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2141.793682] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2141.798609] __list_lru_init+0x3d3/0x6e0 [ 2141.802674] sget_userns+0x84d/0xd30 [ 2141.806386] ? kill_litter_super+0x60/0x60 [ 2141.810621] ? ns_test_super+0x50/0x50 [ 2141.814525] ? ns_test_super+0x50/0x50 [ 2141.818407] ? kill_litter_super+0x60/0x60 [ 2141.822644] sget+0x10c/0x150 [ 2141.825768] mount_bdev+0xff/0x3c0 [ 2141.829321] ? finish_unfinished+0x1120/0x1120 [ 2141.833915] get_super_block+0x35/0x40 [ 2141.837815] mount_fs+0x106/0x3ff [ 2141.841264] ? emergency_thaw_all+0x1a0/0x1a0 [ 2141.845759] ? __init_waitqueue_head+0x36/0x90 [ 2141.850355] vfs_kern_mount.part.0+0x6f/0x410 [ 2141.854851] do_mount+0x581/0x2d30 [ 2141.858385] ? finish_automount+0x461/0x490 [ 2141.862707] ? copy_mount_string+0x40/0x40 [ 2141.866949] ? kmem_cache_alloc_trace+0x354/0x760 [ 2141.871785] ? _copy_from_user+0xdd/0x150 [ 2141.875931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.881468] ? copy_mount_options+0x30e/0x440 [ 2141.885968] ksys_mount+0xdb/0x150 [ 2141.889508] __x64_sys_mount+0xbe/0x150 [ 2141.893492] do_syscall_64+0x103/0x610 [ 2141.897393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2141.902570] RIP: 0033:0x45a8aa [ 2141.905755] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2141.924644] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2141.932362] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2141.939621] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2141.946896] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2141.954205] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:52:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc000000000000000}}], 0x2, 0x0) 17:52:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2141.961514] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xfffffdef}}], 0x2, 0x0) 17:52:30 executing program 3 (fault-call:0 fault-nth:89): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 17:52:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0f00000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xc03e000000000000}}], 0x2, 0x0) 17:52:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xffffff7f}}], 0x2, 0x0) 17:52:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xfffffff6}}], 0x2, 0x0) 17:52:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff1000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 17:52:30 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xe03f030000000000}}], 0x2, 0x0) [ 2142.263771] FAULT_INJECTION: forcing a failure. [ 2142.263771] name failslab, interval 1, probability 0, space 0, times 0 17:52:30 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x4000000000000}}], 0x2, 0x0) 17:52:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2142.304166] CPU: 0 PID: 17659 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2142.311445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2142.320793] Call Trace: [ 2142.320818] dump_stack+0x172/0x1f0 [ 2142.320840] should_fail.cold+0xa/0x1b [ 2142.327070] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2142.327084] ? lock_downgrade+0x810/0x810 [ 2142.327100] ? ___might_sleep+0x163/0x280 [ 2142.344330] __should_failslab+0x121/0x190 [ 2142.348579] should_failslab+0x9/0x14 [ 2142.352375] kmem_cache_alloc_trace+0x2d1/0x760 [ 2142.357052] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2142.362156] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2142.367088] __list_lru_init+0x3d3/0x6e0 [ 2142.371165] sget_userns+0x84d/0xd30 [ 2142.374874] ? kill_litter_super+0x60/0x60 [ 2142.379116] ? ns_test_super+0x50/0x50 [ 2142.383010] ? ns_test_super+0x50/0x50 [ 2142.386890] ? kill_litter_super+0x60/0x60 [ 2142.391114] sget+0x10c/0x150 [ 2142.394216] mount_bdev+0xff/0x3c0 [ 2142.397764] ? finish_unfinished+0x1120/0x1120 [ 2142.402345] get_super_block+0x35/0x40 [ 2142.406252] mount_fs+0x106/0x3ff [ 2142.409712] ? emergency_thaw_all+0x1a0/0x1a0 [ 2142.414196] ? __init_waitqueue_head+0x36/0x90 [ 2142.418835] vfs_kern_mount.part.0+0x6f/0x410 [ 2142.423325] do_mount+0x581/0x2d30 [ 2142.426855] ? finish_automount+0x461/0x490 [ 2142.431166] ? copy_mount_string+0x40/0x40 [ 2142.435389] ? kmem_cache_alloc_trace+0x354/0x760 [ 2142.440245] ? _copy_from_user+0xdd/0x150 [ 2142.444391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.449970] ? copy_mount_options+0x30e/0x440 [ 2142.454464] ksys_mount+0xdb/0x150 [ 2142.457998] __x64_sys_mount+0xbe/0x150 [ 2142.461968] do_syscall_64+0x103/0x610 [ 2142.465877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2142.471051] RIP: 0033:0x45a8aa [ 2142.474234] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2142.493122] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2142.500817] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2142.508084] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2142.515346] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2142.522600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2142.529868] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:31 executing program 3 (fault-call:0 fault-nth:90): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x40030000000000}}], 0x2, 0x0) 17:52:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xeffdffff00000000}}], 0x2, 0x0) 17:52:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff6000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 17:52:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xf6ffffff00000000}}], 0x2, 0x0) 17:52:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff9700000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x100000000000000}}], 0x2, 0x0) [ 2142.765858] FAULT_INJECTION: forcing a failure. [ 2142.765858] name failslab, interval 1, probability 0, space 0, times 0 17:52:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2142.870262] CPU: 1 PID: 17706 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2142.877548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2142.886925] Call Trace: [ 2142.886945] dump_stack+0x172/0x1f0 [ 2142.886962] should_fail.cold+0xa/0x1b [ 2142.886978] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2142.886992] ? lock_downgrade+0x810/0x810 [ 2142.887006] ? ___might_sleep+0x163/0x280 [ 2142.887026] __should_failslab+0x121/0x190 [ 2142.887056] should_failslab+0x9/0x14 [ 2142.887082] kmem_cache_alloc_trace+0x2d1/0x760 [ 2142.887096] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2142.887114] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2142.887129] __list_lru_init+0x3d3/0x6e0 [ 2142.918535] sget_userns+0x84d/0xd30 [ 2142.918565] ? kill_litter_super+0x60/0x60 [ 2142.918581] ? ns_test_super+0x50/0x50 [ 2142.918596] ? ns_test_super+0x50/0x50 [ 2142.918622] ? kill_litter_super+0x60/0x60 [ 2142.918636] sget+0x10c/0x150 [ 2142.918653] mount_bdev+0xff/0x3c0 [ 2142.928411] ? finish_unfinished+0x1120/0x1120 [ 2142.928437] get_super_block+0x35/0x40 [ 2142.928452] mount_fs+0x106/0x3ff [ 2142.928466] ? emergency_thaw_all+0x1a0/0x1a0 [ 2142.928479] ? __init_waitqueue_head+0x36/0x90 [ 2142.928496] vfs_kern_mount.part.0+0x6f/0x410 [ 2142.937465] do_mount+0x581/0x2d30 [ 2142.937494] ? finish_automount+0x461/0x490 [ 2142.937527] ? copy_mount_string+0x40/0x40 [ 2142.937539] ? kmem_cache_alloc_trace+0x354/0x760 [ 2142.937560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.011764] ? copy_mount_options+0x30e/0x440 [ 2143.016250] ksys_mount+0xdb/0x150 [ 2143.019786] __x64_sys_mount+0xbe/0x150 [ 2143.023753] do_syscall_64+0x103/0x610 [ 2143.027631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2143.032807] RIP: 0033:0x45a8aa [ 2143.035990] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2143.054876] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2143.062572] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa 17:52:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 17:52:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xa00000000000000}}], 0x2, 0x0) [ 2143.069826] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2143.077086] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2143.084359] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2143.091615] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:31 executing program 3 (fault-call:0 fault-nth:91): syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 17:52:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0xffffff7f00000000}}], 0x2, 0x0) 17:52:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101fff000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x1100000000000000}}], 0x2, 0x0) 17:52:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4030ae7b, &(0x7f0000000180)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 17:52:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:52:31 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x3f00000000000000}}], 0x2, 0x0) 17:52:31 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x4}}], 0x2, 0x0) [ 2143.317410] FAULT_INJECTION: forcing a failure. [ 2143.317410] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.386614] CPU: 0 PID: 17741 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2143.393911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2143.403252] Call Trace: [ 2143.403286] dump_stack+0x172/0x1f0 [ 2143.403303] should_fail.cold+0xa/0x1b [ 2143.403317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2143.418474] ? lock_downgrade+0x810/0x810 [ 2143.422639] ? ___might_sleep+0x163/0x280 [ 2143.426829] __should_failslab+0x121/0x190 [ 2143.426845] should_failslab+0x9/0x14 17:52:32 executing program 2: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0xa}}], 0x2, 0x0) [ 2143.434873] __kmalloc_track_caller+0x2d8/0x740 [ 2143.439543] ? lockdep_init_map+0x10c/0x5b0 [ 2143.443867] ? reiserfs_fill_super+0xb2b/0x2eb0 [ 2143.443885] kstrdup+0x3a/0x70 [ 2143.443916] reiserfs_fill_super+0xb2b/0x2eb0 [ 2143.443950] ? finish_unfinished+0x1120/0x1120 [ 2143.460848] ? up_write+0x1c/0x150 [ 2143.460866] ? snprintf+0xbb/0xf0 [ 2143.460878] ? vsprintf+0x40/0x40 [ 2143.460894] ? wait_for_completion+0x440/0x440 [ 2143.475861] ? ns_test_super+0x50/0x50 [ 2143.479741] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2143.484796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.490366] mount_bdev+0x307/0x3c0 [ 2143.493984] ? finish_unfinished+0x1120/0x1120 [ 2143.498571] get_super_block+0x35/0x40 [ 2143.502462] mount_fs+0x106/0x3ff [ 2143.505912] ? emergency_thaw_all+0x1a0/0x1a0 [ 2143.510400] ? __init_waitqueue_head+0x36/0x90 [ 2143.514986] vfs_kern_mount.part.0+0x6f/0x410 [ 2143.519475] do_mount+0x581/0x2d30 [ 2143.523007] ? finish_automount+0x461/0x490 [ 2143.527336] ? copy_mount_string+0x40/0x40 [ 2143.531565] ? kmem_cache_alloc_trace+0x354/0x760 [ 2143.536416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.541967] ? copy_mount_options+0x30e/0x440 [ 2143.546465] ksys_mount+0xdb/0x150 [ 2143.550000] __x64_sys_mount+0xbe/0x150 [ 2143.553986] do_syscall_64+0x103/0x610 [ 2143.557895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2143.563240] RIP: 0033:0x45a8aa [ 2143.566432] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 17:52:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff000a000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 17:52:32 executing program 5: socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x803e000000000000}}], 0x2, 0x0) [ 2143.585322] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2143.593018] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2143.600272] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2143.607562] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2143.614835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2143.622103] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 17:52:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x48000000002, 0x0, &(0x7f00000011c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 2143.736479] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate memory for journal device name [ 2143.766463] ------------[ cut here ]------------ [ 2143.771216] kernel BUG at fs/reiserfs/lock.c:44! [ 2143.800165] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 2143.805531] CPU: 1 PID: 17741 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #63 [ 2143.812787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2143.822137] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 2143.827401] Code: 5d c3 e8 48 1f 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 84 28 1b 05 e8 2f 1f 89 ff 5b 41 5c 5d c3 e8 25 1f 89 ff <0f> 0b e8 7e 1a c0 ff eb a1 e8 97 1a c0 ff e9 33 ff ff ff e8 8d 1a [ 2143.846299] RSP: 0018:ffff888054ef7a10 EFLAGS: 00010246 [ 2143.851648] RAX: 0000000000040000 RBX: ffff888052566000 RCX: ffffc90007db1000 [ 2143.858906] RDX: 0000000000040000 RSI: ffffffff81e6bbfb RDI: ffff8880525660a8 [ 2143.866161] RBP: ffff888054ef7a20 R08: 0000000000000065 R09: ffffed1015d25021 [ 2143.873458] R10: ffffed1015d25020 R11: ffff8880ae928107 R12: 00000000ffffffea [ 2143.880732] R13: ffff888092c32640 R14: ffff888054ef7bc0 R15: ffff888052566000 [ 2143.888021] FS: 00007fc9d4e4e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2143.896238] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2143.902101] CR2: 000000c42fee82e0 CR3: 0000000089361000 CR4: 00000000001406e0 [ 2143.909361] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 2143.916637] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2143.923889] Call Trace: [ 2143.926468] reiserfs_fill_super+0x2b51/0x2eb0 [ 2143.931045] ? finish_unfinished+0x1120/0x1120 [ 2143.935634] ? up_write+0x1c/0x150 [ 2143.939165] ? snprintf+0xbb/0xf0 [ 2143.942604] ? vsprintf+0x40/0x40 [ 2143.946049] ? wait_for_completion+0x440/0x440 [ 2143.950637] ? ns_test_super+0x50/0x50 [ 2143.954517] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2143.959528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.965060] mount_bdev+0x307/0x3c0 [ 2143.968695] ? finish_unfinished+0x1120/0x1120 [ 2143.973271] get_super_block+0x35/0x40 [ 2143.977199] mount_fs+0x106/0x3ff [ 2143.980663] ? emergency_thaw_all+0x1a0/0x1a0 [ 2143.985148] ? __init_waitqueue_head+0x36/0x90 [ 2143.989753] vfs_kern_mount.part.0+0x6f/0x410 [ 2143.994236] do_mount+0x581/0x2d30 [ 2143.997782] ? finish_automount+0x461/0x490 [ 2144.002112] ? copy_mount_string+0x40/0x40 [ 2144.006369] ? kmem_cache_alloc_trace+0x354/0x760 [ 2144.011204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.016735] ? copy_mount_options+0x30e/0x440 [ 2144.021223] ksys_mount+0xdb/0x150 [ 2144.024752] __x64_sys_mount+0xbe/0x150 [ 2144.028744] do_syscall_64+0x103/0x610 [ 2144.032620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2144.037814] RIP: 0033:0x45a8aa [ 2144.041013] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2144.059907] RSP: 002b:00007fc9d4e4da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2144.067600] RAX: ffffffffffffffda RBX: 00007fc9d4e4db30 RCX: 000000000045a8aa [ 2144.074861] RDX: 00007fc9d4e4dad0 RSI: 0000000020000080 RDI: 00007fc9d4e4daf0 [ 2144.082137] RBP: 0000000020000080 R08: 00007fc9d4e4db30 R09: 00007fc9d4e4dad0 [ 2144.089390] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2144.096647] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 2144.103925] Modules linked in: [ 2144.113238] ---[ end trace de3539f8cd15e8cc ]--- [ 2144.113319] kobject: 'loop3' (0000000089b9a314): kobject_uevent_env [ 2144.118126] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 2144.124482] kobject: 'loop3' (0000000089b9a314): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2144.153030] Code: 5d c3 e8 48 1f 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 84 28 1b 05 e8 2f 1f 89 ff 5b 41 5c 5d c3 e8 25 1f 89 ff <0f> 0b e8 7e 1a c0 ff eb a1 e8 97 1a c0 ff e9 33 ff ff ff e8 8d 1a [ 2144.173879] kobject: 'loop1' (00000000b648c143): kobject_uevent_env [ 2144.177845] RSP: 0018:ffff888054ef7a10 EFLAGS: 00010246 [ 2144.180387] kobject: 'loop1' (00000000b648c143): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2144.197779] RAX: 0000000000040000 RBX: ffff888052566000 RCX: ffffc90007db1000 [ 2144.205271] RDX: 0000000000040000 RSI: ffffffff81e6bbfb RDI: ffff8880525660a8 [ 2144.214951] RBP: ffff888054ef7a20 R08: 0000000000000065 R09: ffffed1015d25021 [ 2144.222680] R10: ffffed1015d25020 R11: ffff8880ae928107 R12: 00000000ffffffea [ 2144.232102] R13: ffff888092c32640 R14: ffff888054ef7bc0 R15: ffff888052566000 [ 2144.240939] FS: 00007fc9d4e4e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2144.251963] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2144.257859] CR2: 000000000070d6b4 CR3: 0000000089361000 CR4: 00000000001406e0 [ 2144.265315] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 2144.274815] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2144.282432] Kernel panic - not syncing: Fatal exception [ 2144.288771] Kernel Offset: disabled [ 2144.292392] Rebooting in 86400 seconds..