xt4_init_dot_dotdot+0x520/0x520 [ 401.370557] ? selinux_inode_mkdir+0x23/0x30 [ 401.375029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.380627] ? security_inode_mkdir+0xee/0x120 [ 401.385296] vfs_mkdir+0x433/0x690 [ 401.388929] do_mkdirat+0x234/0x2a0 [ 401.392638] ? __ia32_sys_mknod+0xb0/0xb0 [ 401.396847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 401.401676] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.407095] ? do_syscall_64+0x26/0x610 [ 401.411122] ? lockdep_hardirqs_on+0x415/0x5d0 [ 401.415776] __x64_sys_mkdir+0x5c/0x80 [ 401.419726] do_syscall_64+0x103/0x610 [ 401.423679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.428916] RIP: 0033:0x458047 12:04:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x20000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:48 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0404309, &(0x7f0000000240)=0x40000000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000480)={0x1, 0x2, @name="d7dc78c57ac1f6922059b83f4839b4f834ad4533643fe7e6b357122fdd1ec72e"}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) getsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x4) lsetxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:inetd_log_t:s0\x00', 0x21, 0x1) write$tun(r1, &(0x7f0000000080)={@void, @void, @mpls={[{0x401, 0x9, 0x3a8, 0x4}, {0x9, 0x80, 0xe85, 0x1f}, {0x100000000, 0xffffffffffffffff, 0x1, 0x1f}], @generic="8275d582b3bc0b9dd98f51ef0f9d874a383653c6ec8c677c6b5963b618ad02e2538d2dd6ac36fd380cf52e71f53032da298421cd81ab8c0e9f9e73cc57cfd57e0c0b0678a1b34f7c7d052d0cb5bdb39b458fe23b5901d07ef804a50a19d7114ddcb68aab880d713f1dbae9cff00e7ed9e11fdaa57d220354ebc516e7455e943d20a3f7c13351c9362080439215580866e31dea3604643bafdbcb8c1e1f28b2f8ed85681f0386ec6a66d96866ad2fcc62d98eb84dc1d74197b65e5fa35973bea07bc900bf624c795e145a4f0f485f7dd15ff545cf3091"}}, 0xe2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40040}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x124, r2, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcadf}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x75}]}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x9, @ipv4={[], [], @multicast1}, 0x7f}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @ipv4={[], [], @empty}, 0xe25}}}}]}]}, 0x124}}, 0x24004000) 12:04:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x200000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 401.432156] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.451096] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 401.458866] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 401.468741] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 401.476058] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 401.483374] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 401.490690] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:49 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x81, 0x800000ec2, 0x4000000000002}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x600}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = timerfd_create(0x8, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) read(r1, &(0x7f0000001200)=""/4096, 0x1000) 12:04:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:04:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:04:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x1000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 401.882320] audit: type=1400 audit(1555848289.255:109): avc: denied { wake_alarm } for pid=18874 comm="syz-executor.1" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 12:04:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x2000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 402.157649] FAULT_INJECTION: forcing a failure. [ 402.157649] name failslab, interval 1, probability 0, space 0, times 0 [ 402.217879] CPU: 1 PID: 18895 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 402.224963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.234397] Call Trace: [ 402.237084] dump_stack+0x172/0x1f0 [ 402.240827] should_fail.cold+0xa/0x1b [ 402.244841] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.250043] ? lock_downgrade+0x810/0x810 [ 402.254313] ? ___might_sleep+0x163/0x280 [ 402.258580] __should_failslab+0x121/0x190 [ 402.262919] should_failslab+0x9/0x14 [ 402.266808] kmem_cache_alloc+0x2b1/0x700 [ 402.271046] ? __d_lookup+0x433/0x760 [ 402.274916] ? lookup_dcache+0x23/0x140 [ 402.278924] ? d_lookup+0xf9/0x260 [ 402.282494] ? lockdep_hardirqs_on+0x415/0x5d0 [ 402.287084] __d_alloc+0x2e/0x9d0 [ 402.290555] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 402.295680] d_alloc+0x4d/0x2b0 [ 402.298990] __lookup_hash+0xcd/0x190 [ 402.302818] filename_create+0x1a7/0x4f0 [ 402.306904] ? kern_path_mountpoint+0x40/0x40 [ 402.311423] ? strncpy_from_user+0x21f/0x2e0 [ 402.315869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.321430] ? getname_flags+0x277/0x5b0 [ 402.325512] do_mkdirat+0xb5/0x2a0 [ 402.329073] ? __ia32_sys_mknod+0xb0/0xb0 [ 402.333238] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.338012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.343397] ? do_syscall_64+0x26/0x610 [ 402.347392] ? lockdep_hardirqs_on+0x415/0x5d0 [ 402.352017] __x64_sys_mkdir+0x5c/0x80 [ 402.357018] do_syscall_64+0x103/0x610 [ 402.360934] entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:04:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 402.366137] RIP: 0033:0x458047 [ 402.369346] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.388271] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 402.396019] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 402.403321] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 402.410620] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 12:04:49 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x4000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:04:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 402.410630] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 402.410637] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 402.559635] FAULT_INJECTION: forcing a failure. [ 402.559635] name failslab, interval 1, probability 0, space 0, times 0 [ 402.583577] CPU: 0 PID: 18922 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 402.590590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.599976] Call Trace: [ 402.602600] dump_stack+0x172/0x1f0 [ 402.606270] should_fail.cold+0xa/0x1b [ 402.610196] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.615343] ? lockdep_hardirqs_on+0x415/0x5d0 [ 402.619966] ? ___might_sleep+0x163/0x280 [ 402.624156] __should_failslab+0x121/0x190 [ 402.628432] should_failslab+0x9/0x14 [ 402.632265] kmem_cache_alloc+0x2b1/0x700 [ 402.636450] ? map_id_range_down+0x1ee/0x370 [ 402.640906] ? __put_user_ns+0x70/0x70 [ 402.644834] selinux_inode_alloc_security+0xb6/0x2a0 [ 402.649983] security_inode_alloc+0x90/0xe0 [ 402.654333] inode_init_always+0x56e/0xb40 [ 402.654367] alloc_inode+0x83/0x190 [ 402.662247] new_inode_pseudo+0x19/0xf0 [ 402.662263] new_inode+0x1f/0x40 [ 402.662277] __ext4_new_inode+0x3cb/0x52d0 [ 402.662296] ? kasan_check_read+0x11/0x20 [ 402.662317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.662335] ? ext4_free_inode+0x1470/0x1470 [ 402.662369] ? dquot_get_next_dqblk+0x180/0x180 [ 402.692695] ? selinux_determine_inode_label+0x1b1/0x360 [ 402.698182] ext4_mkdir+0x3d5/0xdf0 [ 402.701841] ? ext4_init_dot_dotdot+0x520/0x520 [ 402.706550] ? selinux_inode_mkdir+0x23/0x30 [ 402.710979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.716529] ? security_inode_mkdir+0xee/0x120 [ 402.721128] vfs_mkdir+0x433/0x690 [ 402.724687] do_mkdirat+0x234/0x2a0 [ 402.728328] ? __ia32_sys_mknod+0xb0/0xb0 [ 402.732496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.737290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.742667] ? do_syscall_64+0x26/0x610 [ 402.746657] ? lockdep_hardirqs_on+0x415/0x5d0 [ 402.751266] __x64_sys_mkdir+0x5c/0x80 [ 402.755168] do_syscall_64+0x103/0x610 [ 402.759079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.764284] RIP: 0033:0x458047 [ 402.767489] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.786410] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 402.794150] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 402.801443] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:04:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3d7, 0x0, 0x1800002, &(0x7f0000000040)={[{@utf8='utf8'}, {@fmask={'fmask', 0x3d, 0x5}}]}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x80, @rand_addr="83373f6900a10ae05d32023372e73b11", 0x4}}, 0x9, 0x1, 0x3, 0xfc, 0x80}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e22, 0xf2, @empty, 0x1}}}, &(0x7f00000002c0)=0x84) 12:04:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x5000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 402.808731] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 402.816033] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 402.823325] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:50 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:04:50 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000010007a) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0x8108551b, &(0x7f0000000200)={0x10000, 0x0, @start}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000100)=0xffffff15) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000000c0)={0x753, 0x80000000, 0x87d8, 0xa5, &(0x7f0000000140)=""/165, 0x1e, &(0x7f0000000080)=""/30, 0x62, &(0x7f0000000280)=""/98}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) 12:04:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x8000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:04:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x9000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:50 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYRES16], 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000, 0x0) r1 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r1, &(0x7f00000001c0)={0x40000004, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020c09100000000000004c9e0000000200080002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00080000000003200000000000020001007834e609000000020000000005000500000000000a00000000000004000000000000000000000000000000170000000000000000"], 0x80}}, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x3, 0x20, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x30fb3d89, 0x40000) setsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000180), 0x4) [ 403.199445] FAULT_INJECTION: forcing a failure. [ 403.199445] name failslab, interval 1, probability 0, space 0, times 0 [ 403.231486] CPU: 1 PID: 18955 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 403.238501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.247892] Call Trace: [ 403.247926] dump_stack+0x172/0x1f0 [ 403.254171] should_fail.cold+0xa/0x1b [ 403.258096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 403.263246] ? lockdep_hardirqs_on+0x415/0x5d0 [ 403.267877] ? ___might_sleep+0x163/0x280 [ 403.272069] __should_failslab+0x121/0x190 [ 403.276380] should_failslab+0x9/0x14 [ 403.280218] kmem_cache_alloc+0x2b1/0x700 [ 403.284435] ? map_id_range_down+0x1ee/0x370 [ 403.288920] ? __put_user_ns+0x70/0x70 [ 403.292862] selinux_inode_alloc_security+0xb6/0x2a0 [ 403.298009] security_inode_alloc+0x90/0xe0 [ 403.302373] inode_init_always+0x56e/0xb40 [ 403.306655] alloc_inode+0x83/0x190 [ 403.310332] new_inode_pseudo+0x19/0xf0 [ 403.314343] new_inode+0x1f/0x40 [ 403.317742] __ext4_new_inode+0x3cb/0x52d0 [ 403.322018] ? kasan_check_read+0x11/0x20 [ 403.326265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.331849] ? ext4_free_inode+0x1470/0x1470 [ 403.336342] ? dquot_get_next_dqblk+0x180/0x180 [ 403.341060] ? selinux_determine_inode_label+0x1b1/0x360 [ 403.346564] ext4_mkdir+0x3d5/0xdf0 [ 403.350245] ? ext4_init_dot_dotdot+0x520/0x520 [ 403.354964] ? selinux_inode_mkdir+0x23/0x30 [ 403.359415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.365000] ? security_inode_mkdir+0xee/0x120 [ 403.369618] vfs_mkdir+0x433/0x690 [ 403.373201] do_mkdirat+0x234/0x2a0 [ 403.376874] ? __ia32_sys_mknod+0xb0/0xb0 [ 403.381059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.385864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.391268] ? do_syscall_64+0x26/0x610 [ 403.395287] ? lockdep_hardirqs_on+0x415/0x5d0 [ 403.400261] __x64_sys_mkdir+0x5c/0x80 [ 403.404192] do_syscall_64+0x103/0x610 [ 403.408124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.413341] RIP: 0033:0x458047 [ 403.416565] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.435499] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 403.443245] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 12:04:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) [ 403.450541] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 403.457836] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 403.466639] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 403.473939] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xd000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:51 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:04:51 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYRES16], 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000, 0x0) r1 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r1, &(0x7f00000001c0)={0x40000004, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020c09100000000000004c9e0000000200080002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00080000000003200000000000020001007834e609000000020000000005000500000000000a00000000000004000000000000000000000000000000170000000000000000"], 0x80}}, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x3, 0x20, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x30fb3d89, 0x40000) setsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000180), 0x4) 12:04:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xbfffffff, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) [ 403.846398] FAULT_INJECTION: forcing a failure. [ 403.846398] name failslab, interval 1, probability 0, space 0, times 0 [ 403.862281] CPU: 1 PID: 18990 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 403.869268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.869331] Call Trace: [ 403.869362] dump_stack+0x172/0x1f0 [ 403.869387] should_fail.cold+0xa/0x1b [ 403.869411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 403.869438] ? ___might_sleep+0x163/0x280 [ 403.898204] __should_failslab+0x121/0x190 [ 403.902471] should_failslab+0x9/0x14 [ 403.906304] __kmalloc+0x2e5/0x750 [ 403.909896] ? ext4_find_extent+0x76e/0x9d0 [ 403.914252] ext4_find_extent+0x76e/0x9d0 [ 403.918450] ext4_ext_map_blocks+0x1c3/0x55d0 [ 403.922996] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 403.928058] ? __lock_is_held+0xb6/0x140 [ 403.932167] ? lock_acquire+0x16f/0x3f0 [ 403.936168] ? ext4_map_blocks+0x424/0x1a10 [ 403.936197] ext4_map_blocks+0xebd/0x1a10 [ 403.944722] ? ext4_issue_zeroout+0x170/0x170 [ 403.949269] ? kasan_check_write+0x14/0x20 [ 403.953538] ? __brelse+0x95/0xb0 [ 403.957028] ext4_getblk+0xc4/0x510 [ 403.960683] ? ext4_iomap_begin+0xfd0/0xfd0 [ 403.965039] ? ext4_free_inode+0x1470/0x1470 [ 403.969488] ext4_bread+0x8f/0x230 [ 403.973052] ? ext4_getblk+0x510/0x510 [ 403.976969] ext4_append+0x155/0x370 [ 403.980715] ext4_mkdir+0x61b/0xdf0 [ 403.984374] ? ext4_init_dot_dotdot+0x520/0x520 [ 403.984400] ? selinux_inode_mkdir+0x23/0x30 [ 403.984420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.984445] ? security_inode_mkdir+0xee/0x120 [ 403.999131] vfs_mkdir+0x433/0x690 [ 403.999157] do_mkdirat+0x234/0x2a0 [ 403.999177] ? __ia32_sys_mknod+0xb0/0xb0 [ 403.999195] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.999215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.999227] ? do_syscall_64+0x26/0x610 [ 403.999245] ? lockdep_hardirqs_on+0x415/0x5d0 [ 403.999264] __x64_sys_mkdir+0x5c/0x80 [ 403.999279] do_syscall_64+0x103/0x610 [ 403.999297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.999315] RIP: 0033:0x458047 [ 404.050221] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.069150] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 404.077081] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 404.084369] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:04:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x02\x00'}}) [ 404.091646] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 404.098926] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 404.106201] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:04:51 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r2) fcntl$setlease(r1, 0x400, 0x1) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r3 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0xe1, "0a83d68d49b9bc856921c5f8cb2269853251433a6177e72e32c7469a4241afff0ca56be0933eab865374837c71e215c3ee202cb09c70e7d61f3882d046af37af777bc9546cfb0b0052d7e9a3711f5de1bb87fadec9f2cc2075db7bf742353ec2a5f5ab63b5bdbceccfd7da09593830275828eb493fc62a210412c21e0a3bdfe0ac5d4b932e1c983a1c4744fa741b23bee04831622fb03b7fb2d3874f57a01748adb5ac607b79bddb55f46c42cbc57f04279a31c354f3e16db8759f284b60106716397a84c7dab38a87e2856ffc77c26b9c974ff877275387cede88cf91bb8f5b08"}, &(0x7f0000000080)=0xe9) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200)=r4, 0x4) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000000)=r0, 0x36) 12:04:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xc6000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 404.203399] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 12:04:51 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xfbffffff, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000e80)=""/4096, 0x1000}], 0x1}}], 0x400000000000125, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x200000, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x3300000000000000, &(0x7f00000009c0), 0x6a6, &(0x7f00000000c0), 0xffffffffffffff1c, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setregs(0xd, r2, 0xd4, &(0x7f0000000180)="82c2506bc833366d5440ca6baad9fad99735839065e43809b243632a619c707de30f194e50189fd8bce08a4905") ioctl$void(r0, 0x5451) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x801, 0x0) write$eventfd(r3, &(0x7f0000000100)=0x6, 0x8) 12:04:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\xc0\x00'}}) [ 404.670220] FAULT_INJECTION: forcing a failure. [ 404.670220] name failslab, interval 1, probability 0, space 0, times 0 [ 404.688577] CPU: 0 PID: 19028 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 404.695586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.704970] Call Trace: [ 404.707628] dump_stack+0x172/0x1f0 [ 404.711339] should_fail.cold+0xa/0x1b [ 404.715287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.720440] ? ___might_sleep+0x163/0x280 [ 404.724647] __should_failslab+0x121/0x190 [ 404.728948] should_failslab+0x9/0x14 [ 404.728963] __kmalloc+0x2e5/0x750 [ 404.728984] ? ext4_find_extent+0x76e/0x9d0 [ 404.729003] ext4_find_extent+0x76e/0x9d0 [ 404.729026] ext4_ext_map_blocks+0x1c3/0x55d0 [ 404.749445] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 404.754516] ? __lock_is_held+0xb6/0x140 [ 404.758633] ? lock_acquire+0x16f/0x3f0 [ 404.762643] ? ext4_map_blocks+0x424/0x1a10 [ 404.767020] ext4_map_blocks+0xebd/0x1a10 [ 404.771228] ? ext4_issue_zeroout+0x170/0x170 [ 404.771250] ? kasan_check_write+0x14/0x20 [ 404.771264] ? __brelse+0x95/0xb0 [ 404.771283] ext4_getblk+0xc4/0x510 [ 404.771300] ? ext4_iomap_begin+0xfd0/0xfd0 [ 404.771323] ? ext4_free_inode+0x1470/0x1470 [ 404.780132] ext4_bread+0x8f/0x230 [ 404.780150] ? ext4_getblk+0x510/0x510 [ 404.780170] ext4_append+0x155/0x370 [ 404.780188] ext4_mkdir+0x61b/0xdf0 [ 404.780213] ? ext4_init_dot_dotdot+0x520/0x520 [ 404.815622] ? selinux_inode_mkdir+0x23/0x30 [ 404.820090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.825678] ? security_inode_mkdir+0xee/0x120 [ 404.830314] vfs_mkdir+0x433/0x690 [ 404.833930] do_mkdirat+0x234/0x2a0 [ 404.837630] ? __ia32_sys_mknod+0xb0/0xb0 [ 404.841830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 404.846652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.852071] ? do_syscall_64+0x26/0x610 [ 404.856095] ? lockdep_hardirqs_on+0x415/0x5d0 [ 404.860829] __x64_sys_mkdir+0x5c/0x80 [ 404.864784] do_syscall_64+0x103/0x610 [ 404.868811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.874045] RIP: 0033:0x458047 [ 404.877276] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.896206] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 404.903949] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 404.911248] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:04:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xffffffbf, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:52 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000001580)='/dev/vcs#\x00', 0x3, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss, @sack_perm], 0x2) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/access\x00', 0x2, 0x0) ioctl$void(r0, 0xc0045c79) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000180)="172e2f25a5ccf119c14f178f0b294bd2b5c243e3054bba63f22ffb16871768d4e7b6c0779d203c285527d51e861e0f0fe9b85b9bfdfe00796b32f640f4c75fc3bbed4212b3b2b5fc078338a5c87c0686e45b4918c9dc0505cdd2cfa44bca79a82ebe9d5321e4b6e4be238e8365184a057e42e2de77354d3712", 0x79, 0x5}, {&(0x7f0000000200)="9e2459dd2fee4a495dcd77201857687ca934f0369d272b8746010c4bb41d8c3e0eb2649676092d4fcea63d4cf3407d35bc13130c7b9352bac45cc722d5446f542a61f6c61c6a29b2494b42493fbff7dac0cb54e16b3909f67c9480702599242b2b276415446f1a6f30e61ed45c60b1ce59a3473a2f0797826f769214e0fc697774c09af41ab5682c389a8e7fd2e0d4845c9c9e2b9c67388db010", 0x9a, 0x3}, {&(0x7f00000002c0)="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", 0x1000, 0x4}, {&(0x7f00000012c0)="9a2a8dced09bd6fa00106719414227018388d43b165f1cc4c93d23233d0fc0e6ca543d5395360065f4a0fddb101c67cb4f4b4c26b910b5dce7c8ae5e3890aee0912e27a92bf640e1bcb337129ac1d3e5fdea9f3b3bd2a9b85d2217c4132687809ddf5ae730ceb9b30e136ce160ae720e4ab2125d3faefe9ef2a264983d503bafd84aa58522f985737f85c7123fd6c352e4388b3464eec4697f377b4bd6a4807aa000b04f94bc", 0xa6, 0x9}, {&(0x7f0000001380)="69895d3a3f3dc0efeb85fe5a20254c", 0xf, 0x6b4}], 0x200000, &(0x7f0000001800)=ANY=[@ANYBLOB="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"]) fcntl$setstatus(r0, 0x4, 0x2000) 12:04:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) [ 404.918549] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 404.926111] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 404.933409] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 404.994652] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:04:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xfffffffb, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 405.090568] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 12:04:52 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x1000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfd, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f00000001c0)={0x90, 0xfffffffffffffffe, 0x1, {0x5, 0x0, 0x1, 0x401, 0x5, 0x10000, {0x0, 0x0, 0x207, 0xff, 0x3b, 0x1000, 0x0, 0x80, 0xa6, 0x7fffffff, 0x80000001, r2, r3, 0x14c0, 0x9}}}, 0x90) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) timerfd_create(0x9, 0x80800) r5 = fcntl$dupfd(r4, 0xfffffffffffffffc, r4) bind$bt_rfcomm(r5, &(0x7f0000000280), 0xa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x400448e6, 0x0) 12:04:52 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000100)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6a9a800d}, &(0x7f00000000c0)=0x8) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{}]}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140)=r2, 0x4) 12:04:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x2000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 405.313654] FAULT_INJECTION: forcing a failure. [ 405.313654] name failslab, interval 1, probability 0, space 0, times 0 12:04:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00@\x00'}}) [ 405.405028] CPU: 0 PID: 19070 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 405.412065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.421548] Call Trace: [ 405.424287] dump_stack+0x172/0x1f0 [ 405.427982] should_fail.cold+0xa/0x1b [ 405.431939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 405.437092] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 405.442965] ? ___might_sleep+0x163/0x280 [ 405.447186] __should_failslab+0x121/0x190 [ 405.451485] should_failslab+0x9/0x14 12:04:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 405.455339] __kmalloc+0x2e5/0x750 [ 405.458964] ? ext4_find_extent+0x76e/0x9d0 [ 405.464679] ext4_find_extent+0x76e/0x9d0 [ 405.468897] ext4_ext_map_blocks+0x1c3/0x55d0 [ 405.473489] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 405.478566] ? __lock_is_held+0xb6/0x140 [ 405.482692] ? lock_acquire+0x16f/0x3f0 [ 405.486715] ? ext4_map_blocks+0x87d/0x1a10 [ 405.491105] ext4_map_blocks+0x8e5/0x1a10 [ 405.495321] ? ext4_issue_zeroout+0x170/0x170 [ 405.499885] ? kasan_check_write+0x14/0x20 [ 405.504181] ? __brelse+0x95/0xb0 [ 405.504205] ext4_getblk+0xc4/0x510 [ 405.504225] ? ext4_iomap_begin+0xfd0/0xfd0 [ 405.504245] ? ext4_free_inode+0x1470/0x1470 [ 405.504265] ext4_bread+0x8f/0x230 [ 405.515771] ? ext4_getblk+0x510/0x510 [ 405.515794] ext4_append+0x155/0x370 [ 405.515823] ext4_mkdir+0x61b/0xdf0 [ 405.535195] ? ext4_init_dot_dotdot+0x520/0x520 [ 405.535220] ? selinux_inode_mkdir+0x23/0x30 [ 405.535240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.535264] ? security_inode_mkdir+0xee/0x120 [ 405.549976] vfs_mkdir+0x433/0x690 [ 405.550002] do_mkdirat+0x234/0x2a0 [ 405.550019] ? __ia32_sys_mknod+0xb0/0xb0 [ 405.550037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.550057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.550072] ? do_syscall_64+0x26/0x610 [ 405.550096] ? lockdep_hardirqs_on+0x415/0x5d0 [ 405.584801] __x64_sys_mkdir+0x5c/0x80 [ 405.588744] do_syscall_64+0x103/0x610 [ 405.592691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.597928] RIP: 0033:0x458047 [ 405.601159] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.620104] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 405.620121] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 405.620128] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 405.620136] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 405.620143] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 405.620152] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:53 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:53 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x8000, 0x5, 0x76775d56, 0x0, 0x5, 0x4, 0xc, 0x8}}) 12:04:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x20000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2f, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) 12:04:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x100000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 405.953490] FAULT_INJECTION: forcing a failure. [ 405.953490] name failslab, interval 1, probability 0, space 0, times 0 [ 406.016976] CPU: 0 PID: 19104 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 406.024019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.024041] Call Trace: [ 406.036074] dump_stack+0x172/0x1f0 [ 406.039761] should_fail.cold+0xa/0x1b [ 406.043725] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 406.049072] ? ___might_sleep+0x163/0x280 [ 406.053281] __should_failslab+0x121/0x190 [ 406.057579] should_failslab+0x9/0x14 [ 406.061434] kmem_cache_alloc+0x2b1/0x700 [ 406.061456] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.061480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 406.076299] ? __mark_inode_dirty+0x241/0x1290 [ 406.080980] ext4_mb_new_blocks+0x5a0/0x3c20 [ 406.085453] ? ext4_find_extent+0x76e/0x9d0 [ 406.089852] ext4_ext_map_blocks+0x2b2d/0x55d0 [ 406.094528] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 406.099605] ? __lock_is_held+0xb6/0x140 [ 406.103746] ext4_map_blocks+0x8e5/0x1a10 [ 406.107960] ? ext4_issue_zeroout+0x170/0x170 [ 406.112513] ? kasan_check_write+0x14/0x20 12:04:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) [ 406.116801] ? __brelse+0x95/0xb0 [ 406.120315] ext4_getblk+0xc4/0x510 [ 406.123996] ? ext4_iomap_begin+0xfd0/0xfd0 [ 406.128380] ? ext4_free_inode+0x1470/0x1470 [ 406.133288] ext4_bread+0x8f/0x230 [ 406.136898] ? ext4_getblk+0x510/0x510 [ 406.140852] ext4_append+0x155/0x370 [ 406.144623] ext4_mkdir+0x61b/0xdf0 [ 406.148284] ? ext4_init_dot_dotdot+0x520/0x520 [ 406.153001] ? selinux_inode_mkdir+0x23/0x30 [ 406.157487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.157507] ? security_inode_mkdir+0xee/0x120 [ 406.157530] vfs_mkdir+0x433/0x690 [ 406.157552] do_mkdirat+0x234/0x2a0 [ 406.157573] ? __ia32_sys_mknod+0xb0/0xb0 [ 406.171331] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 406.171364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.171376] ? do_syscall_64+0x26/0x610 [ 406.171394] ? lockdep_hardirqs_on+0x415/0x5d0 [ 406.171416] __x64_sys_mkdir+0x5c/0x80 [ 406.171434] do_syscall_64+0x103/0x610 [ 406.171453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.171466] RIP: 0033:0x458047 [ 406.171484] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.171500] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 406.240979] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 406.248274] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 406.255580] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 406.262907] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 406.270222] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:53 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x200000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:04:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:53 executing program 1: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, 0x0) [ 406.548338] audit: type=1804 audit(1555848293.915:110): pid=19135 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="bus" dev="sda1" ino=17535 res=1 12:04:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 406.618499] FAULT_INJECTION: forcing a failure. [ 406.618499] name failslab, interval 1, probability 0, space 0, times 0 12:04:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x9, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x407ffffffffff9) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @empty}, @in={0x2, 0x4e20, @broadcast}], 0x2c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@loopback, 0xc0000000, 0x0, 0x0, 0x6, 0x4, 0x10001}, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000), 0x4) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 406.667420] audit: type=1804 audit(1555848293.965:111): pid=19135 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="bus" dev="sda1" ino=17535 res=1 [ 406.710486] CPU: 1 PID: 19137 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 406.717482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.726882] Call Trace: [ 406.729513] dump_stack+0x172/0x1f0 [ 406.733188] should_fail.cold+0xa/0x1b [ 406.737128] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 406.742275] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 406.748121] ? ___might_sleep+0x163/0x280 [ 406.752324] __should_failslab+0x121/0x190 [ 406.756619] should_failslab+0x9/0x14 [ 406.760472] __kmalloc+0x2e5/0x750 [ 406.764072] ? ext4_find_extent+0x76e/0x9d0 [ 406.768452] ext4_find_extent+0x76e/0x9d0 [ 406.772668] ext4_ext_map_blocks+0x1c3/0x55d0 [ 406.777229] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 406.782295] ? __lock_is_held+0xb6/0x140 [ 406.786421] ? lock_acquire+0x16f/0x3f0 [ 406.790456] ? ext4_map_blocks+0x87d/0x1a10 [ 406.794840] ext4_map_blocks+0x8e5/0x1a10 [ 406.799062] ? ext4_issue_zeroout+0x170/0x170 [ 406.803614] ? kasan_check_write+0x14/0x20 [ 406.807907] ? __brelse+0x95/0xb0 [ 406.811414] ext4_getblk+0xc4/0x510 [ 406.815090] ? ext4_iomap_begin+0xfd0/0xfd0 [ 406.819468] ? ext4_free_inode+0x1470/0x1470 [ 406.823935] ext4_bread+0x8f/0x230 [ 406.827521] ? ext4_getblk+0x510/0x510 [ 406.827546] ext4_append+0x155/0x370 [ 406.827567] ext4_mkdir+0x61b/0xdf0 [ 406.839014] ? ext4_init_dot_dotdot+0x520/0x520 [ 406.843745] ? selinux_inode_mkdir+0x23/0x30 [ 406.848244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.853841] ? security_inode_mkdir+0xee/0x120 [ 406.853880] vfs_mkdir+0x433/0x690 [ 406.853904] do_mkdirat+0x234/0x2a0 [ 406.865771] ? __ia32_sys_mknod+0xb0/0xb0 [ 406.869965] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 406.874777] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.880187] ? do_syscall_64+0x26/0x610 [ 406.884207] ? lockdep_hardirqs_on+0x415/0x5d0 [ 406.888839] __x64_sys_mkdir+0x5c/0x80 [ 406.892782] do_syscall_64+0x103/0x610 [ 406.896714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.901926] RIP: 0033:0x458047 [ 406.905144] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.924078] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 406.931831] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 406.939151] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 406.946453] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 406.953756] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:04:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:54 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x400000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 406.961057] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:54 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x500000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 407.202431] FAULT_INJECTION: forcing a failure. [ 407.202431] name failslab, interval 1, probability 0, space 0, times 0 12:04:54 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 407.268627] CPU: 1 PID: 19162 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 407.275758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.285162] Call Trace: [ 407.287826] dump_stack+0x172/0x1f0 [ 407.291552] should_fail.cold+0xa/0x1b [ 407.295510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 407.300685] ? lock_downgrade+0x810/0x810 [ 407.304911] ? ___might_sleep+0x163/0x280 [ 407.309111] __should_failslab+0x121/0x190 [ 407.313402] should_failslab+0x9/0x14 [ 407.317259] __kmalloc_track_caller+0x2e1/0x750 [ 407.321994] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.327579] ? strndup_user+0x77/0xd0 [ 407.331443] memdup_user+0x26/0xb0 [ 407.335031] strndup_user+0x77/0xd0 [ 407.338709] ksys_mount+0x7b/0x150 [ 407.342312] __x64_sys_mount+0xbe/0x150 [ 407.346355] do_syscall_64+0x103/0x610 [ 407.350327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.355599] RIP: 0033:0x45b69a [ 407.355618] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 407.355625] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 407.355644] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 407.355653] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 407.355662] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 407.355670] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:04:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x800000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 407.355678] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x900000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:55 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:55 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xd00000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 407.755395] FAULT_INJECTION: forcing a failure. [ 407.755395] name failslab, interval 1, probability 0, space 0, times 0 [ 407.815715] CPU: 1 PID: 19196 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 407.822734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.832123] Call Trace: [ 407.834778] dump_stack+0x172/0x1f0 [ 407.838479] should_fail.cold+0xa/0x1b [ 407.842442] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 407.847609] ? lock_downgrade+0x810/0x810 [ 407.851813] ? ___might_sleep+0x163/0x280 [ 407.856040] __should_failslab+0x121/0x190 [ 407.860333] should_failslab+0x9/0x14 12:04:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 407.864183] kmem_cache_alloc_trace+0x2cf/0x760 [ 407.868908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.868928] ? _copy_from_user+0xdd/0x150 [ 407.868950] copy_mount_options+0x5c/0x3a0 [ 407.868965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.868982] ksys_mount+0xa7/0x150 [ 407.868998] __x64_sys_mount+0xbe/0x150 [ 407.869020] do_syscall_64+0x103/0x610 [ 407.869042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.869060] RIP: 0033:0x45b69a [ 407.878809] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 407.878819] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 407.878836] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 407.878845] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 407.878862] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 407.878877] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:04:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) [ 407.878885] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:04:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xbfffffff00000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:55 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:55 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xc600000000000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 408.250004] FAULT_INJECTION: forcing a failure. [ 408.250004] name failslab, interval 1, probability 0, space 0, times 0 [ 408.302951] CPU: 0 PID: 19230 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 408.309967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.319367] Call Trace: [ 408.321998] dump_stack+0x172/0x1f0 [ 408.325691] should_fail.cold+0xa/0x1b [ 408.329648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 408.334811] ? lock_downgrade+0x810/0x810 [ 408.339024] ? ___might_sleep+0x163/0x280 [ 408.343224] __should_failslab+0x121/0x190 [ 408.347509] should_failslab+0x9/0x14 [ 408.351372] kmem_cache_alloc_trace+0x2cf/0x760 [ 408.357113] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.362705] ? _copy_from_user+0xdd/0x150 [ 408.366917] copy_mount_options+0x5c/0x3a0 [ 408.371208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.376803] ksys_mount+0xa7/0x150 [ 408.380403] __x64_sys_mount+0xbe/0x150 [ 408.384440] do_syscall_64+0x103/0x610 [ 408.388388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.393627] RIP: 0033:0x45b69a 12:04:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) [ 408.396859] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 408.415923] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 408.423680] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 408.430990] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 408.438319] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 408.445642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:04:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0xfbffffff00000000, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:04:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:55 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 408.452955] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:04:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:04:56 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x2, '/dev/sg#\x00'}}, 0x32) 12:04:56 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:04:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:04:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:04:56 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 408.988701] FAULT_INJECTION: forcing a failure. [ 408.988701] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 409.000662] CPU: 0 PID: 19276 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 409.007634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.017142] Call Trace: [ 409.019825] dump_stack+0x172/0x1f0 [ 409.023576] should_fail.cold+0xa/0x1b [ 409.027592] ? do_syscall_64+0x103/0x610 [ 409.031781] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 409.036970] ? mark_held_locks+0x100/0x100 [ 409.041305] __alloc_pages_nodemask+0x1ee/0x760 [ 409.046418] ? __alloc_pages_slowpath+0x2870/0x2870 [ 409.051522] ? find_held_lock+0x35/0x130 [ 409.055680] cache_grow_begin+0x9c/0x8c0 [ 409.059815] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.065437] ? check_preemption_disabled+0x48/0x290 [ 409.070547] kmem_cache_alloc_trace+0x688/0x760 [ 409.075317] copy_mount_options+0x5c/0x3a0 [ 409.079647] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.085252] ksys_mount+0xa7/0x150 [ 409.088882] __x64_sys_mount+0xbe/0x150 [ 409.092925] do_syscall_64+0x103/0x610 [ 409.096891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.096908] RIP: 0033:0x45b69a [ 409.096935] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 409.124376] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:04:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x4, '/dev/sg#\x00'}}, 0x32) 12:04:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:04:56 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 409.124397] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 409.124404] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 409.124411] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 409.124418] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 409.124425] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 409.220279] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 12:04:56 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x5, '/dev/sg#\x00'}}, 0x32) 12:04:56 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 409.419411] FAULT_INJECTION: forcing a failure. [ 409.419411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 409.431394] CPU: 0 PID: 19300 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 409.438349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.447738] Call Trace: [ 409.450389] dump_stack+0x172/0x1f0 [ 409.454066] should_fail.cold+0xa/0x1b [ 409.458021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 409.464807] ? mark_held_locks+0x100/0x100 [ 409.469084] __alloc_pages_nodemask+0x1ee/0x760 [ 409.473811] ? __alloc_pages_slowpath+0x2870/0x2870 [ 409.478882] ? find_held_lock+0x35/0x130 [ 409.483024] cache_grow_begin+0x9c/0x8c0 [ 409.487146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.492753] ? check_preemption_disabled+0x48/0x290 [ 409.497827] kmem_cache_alloc+0x63e/0x700 [ 409.502040] getname_flags+0xd6/0x5b0 [ 409.505898] user_path_at_empty+0x2f/0x50 [ 409.505919] do_mount+0x150/0x2bc0 [ 409.505935] ? retint_kernel+0x2d/0x2d [ 409.505954] ? copy_mount_string+0x40/0x40 [ 409.505976] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 409.505993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.506013] ? copy_mount_options+0x280/0x3a0 [ 409.537474] ksys_mount+0xdb/0x150 [ 409.541075] __x64_sys_mount+0xbe/0x150 [ 409.545137] do_syscall_64+0x103/0x610 [ 409.549111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.554343] RIP: 0033:0x45b69a [ 409.557577] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 409.576535] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 409.584280] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 409.591599] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 409.598919] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 409.606219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:04:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x8, '/dev/sg#\x00'}}, 0x32) 12:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) [ 409.613518] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:57 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x9, '/dev/sg#\x00'}}, 0x32) [ 409.783016] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 12:04:57 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:57 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:04:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xd, '/dev/sg#\x00'}}, 0x32) 12:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:04:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:57 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xc6, '/dev/sg#\x00'}}, 0x32) 12:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 410.307529] FAULT_INJECTION: forcing a failure. [ 410.307529] name failslab, interval 1, probability 0, space 0, times 0 [ 410.321077] CPU: 0 PID: 19362 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 410.328095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.337487] Call Trace: [ 410.340135] dump_stack+0x172/0x1f0 [ 410.343834] should_fail.cold+0xa/0x1b [ 410.347774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 410.352938] ? lock_downgrade+0x810/0x810 [ 410.359010] ? ___might_sleep+0x163/0x280 [ 410.363209] __should_failslab+0x121/0x190 [ 410.367506] should_failslab+0x9/0x14 [ 410.371371] kmem_cache_alloc+0x2b1/0x700 [ 410.371393] ? find_held_lock+0x35/0x130 [ 410.371411] ? fs_reclaim_acquire+0x20/0x20 [ 410.371431] getname_flags+0xd6/0x5b0 [ 410.371450] user_path_at_empty+0x2f/0x50 [ 410.371472] do_mount+0x150/0x2bc0 [ 410.379762] ? rcu_read_lock_sched_held+0x110/0x130 [ 410.379782] ? copy_mount_string+0x40/0x40 [ 410.379799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.379815] ? _copy_from_user+0xdd/0x150 [ 410.379842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.420288] ? copy_mount_options+0x280/0x3a0 [ 410.424834] ksys_mount+0xdb/0x150 [ 410.428433] __x64_sys_mount+0xbe/0x150 [ 410.432464] do_syscall_64+0x103/0x610 [ 410.436420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.441651] RIP: 0033:0x45b69a [ 410.444916] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 410.463854] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 410.471602] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 410.478923] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 410.486226] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 410.493527] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 410.500827] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:57 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:57 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x500, '/dev/sg#\x00'}}, 0x32) 12:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:04:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x900, '/dev/sg#\x00'}}, 0x32) 12:04:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) [ 410.713493] FAULT_INJECTION: forcing a failure. [ 410.713493] name failslab, interval 1, probability 0, space 0, times 0 12:04:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 410.758980] CPU: 1 PID: 19380 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 410.765996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.766005] Call Trace: [ 410.766037] dump_stack+0x172/0x1f0 [ 410.766064] should_fail.cold+0xa/0x1b [ 410.766088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 410.790763] ? lock_downgrade+0x810/0x810 [ 410.794963] ? ___might_sleep+0x163/0x280 [ 410.799168] __should_failslab+0x121/0x190 [ 410.803449] should_failslab+0x9/0x14 12:04:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xd00, '/dev/sg#\x00'}}, 0x32) [ 410.807299] __kmalloc_track_caller+0x2e1/0x750 [ 410.812022] ? kstrdup_const+0x66/0x80 [ 410.815959] kstrdup+0x3a/0x70 [ 410.819200] kstrdup_const+0x66/0x80 [ 410.822962] alloc_vfsmnt+0xba/0x780 [ 410.826718] vfs_kern_mount.part.0+0x2a/0x410 [ 410.831260] do_mount+0x53e/0x2bc0 [ 410.834874] ? copy_mount_string+0x40/0x40 [ 410.839152] ? _copy_from_user+0xdd/0x150 [ 410.839179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.839196] ? copy_mount_options+0x280/0x3a0 [ 410.839214] ksys_mount+0xdb/0x150 [ 410.839231] __x64_sys_mount+0xbe/0x150 [ 410.839251] do_syscall_64+0x103/0x610 [ 410.839272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.839284] RIP: 0033:0x45b69a [ 410.839304] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 410.849052] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 410.849071] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a 12:04:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) [ 410.849078] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 410.849086] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 410.849093] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 410.849101] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:58 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:58 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040), 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x2000, '/dev/sg#\x00'}}, 0x32) 12:04:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:04:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:04:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:04:58 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040), 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 411.164377] FAULT_INJECTION: forcing a failure. [ 411.164377] name failslab, interval 1, probability 0, space 0, times 0 12:04:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xc600, '/dev/sg#\x00'}}, 0x32) [ 411.259246] CPU: 1 PID: 19409 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 411.266269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.275657] Call Trace: [ 411.278300] dump_stack+0x172/0x1f0 [ 411.281989] should_fail.cold+0xa/0x1b [ 411.285937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 411.291094] ? lock_downgrade+0x810/0x810 [ 411.295290] ? ___might_sleep+0x163/0x280 [ 411.299493] __should_failslab+0x121/0x190 [ 411.303778] should_failslab+0x9/0x14 [ 411.307630] __kmalloc_track_caller+0x2e1/0x750 [ 411.312358] ? kstrdup_const+0x66/0x80 [ 411.316303] kstrdup+0x3a/0x70 [ 411.319546] kstrdup_const+0x66/0x80 [ 411.323302] alloc_vfsmnt+0xba/0x780 [ 411.327068] vfs_kern_mount.part.0+0x2a/0x410 [ 411.331626] do_mount+0x53e/0x2bc0 [ 411.335218] ? copy_mount_string+0x40/0x40 [ 411.339523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.345117] ? copy_mount_options+0x280/0x3a0 [ 411.349674] ksys_mount+0xdb/0x150 [ 411.353273] __x64_sys_mount+0xbe/0x150 [ 411.357303] do_syscall_64+0x103/0x610 [ 411.361241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.366473] RIP: 0033:0x45b69a [ 411.369704] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 411.388643] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 411.396405] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a 12:04:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x20000, '/dev/sg#\x00'}}, 0x32) 12:04:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) [ 411.403718] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 411.411025] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 411.418333] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 411.425734] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:59 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:59 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040), 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:04:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x200000, '/dev/sg#\x00'}}, 0x32) 12:04:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x1000000, '/dev/sg#\x00'}}, 0x32) [ 411.804661] FAULT_INJECTION: forcing a failure. [ 411.804661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 411.876574] CPU: 0 PID: 19442 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 411.883664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.893081] Call Trace: [ 411.895765] dump_stack+0x172/0x1f0 [ 411.899520] should_fail.cold+0xa/0x1b [ 411.899557] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 411.899576] ? ___might_sleep+0x163/0x280 [ 411.899597] ? __might_sleep+0x95/0x190 [ 411.899624] __alloc_pages_nodemask+0x1ee/0x760 [ 411.899648] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 411.899667] ? pcpu_alloc+0x144/0x12d0 [ 411.899688] ? __alloc_pages_slowpath+0x2870/0x2870 [ 411.899712] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 411.899728] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 411.899753] alloc_pages_current+0x107/0x210 [ 411.899791] get_zeroed_page+0x14/0x50 [ 411.955469] mount_fs+0x210/0x331 [ 411.959019] vfs_kern_mount.part.0+0x6f/0x410 [ 411.963691] do_mount+0x53e/0x2bc0 [ 411.967327] ? copy_mount_string+0x40/0x40 [ 411.971645] ? _copy_from_user+0xdd/0x150 [ 411.975894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.981513] ? copy_mount_options+0x280/0x3a0 [ 411.986090] ksys_mount+0xdb/0x150 [ 411.989716] __x64_sys_mount+0xbe/0x150 [ 411.993777] do_syscall_64+0x103/0x610 [ 411.997749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.003012] RIP: 0033:0x45b69a [ 412.006271] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 12:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:04:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x2000000, '/dev/sg#\x00'}}, 0x32) 12:04:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 412.025242] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 412.033027] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 412.040375] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 412.047705] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 412.055045] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 412.055056] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:04:59 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:04:59 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x4000000, '/dev/sg#\x00'}}, 0x32) 12:04:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x5000000, '/dev/sg#\x00'}}, 0x32) 12:04:59 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:04:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:04:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x8000000, '/dev/sg#\x00'}}, 0x32) [ 412.557901] FAULT_INJECTION: forcing a failure. [ 412.557901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 412.586872] CPU: 1 PID: 19494 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 412.593895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.593913] Call Trace: [ 412.605935] dump_stack+0x172/0x1f0 [ 412.609619] should_fail.cold+0xa/0x1b [ 412.613564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 412.618717] ? ___might_sleep+0x163/0x280 [ 412.622928] ? __might_sleep+0x95/0x190 [ 412.626961] __alloc_pages_nodemask+0x1ee/0x760 [ 412.631683] ? check_preemption_disabled+0x48/0x290 [ 412.636763] ? __alloc_pages_slowpath+0x2870/0x2870 [ 412.641841] ? rcu_read_lock_sched_held+0x110/0x130 [ 412.646917] ? __alloc_pages_nodemask+0x63e/0x760 [ 412.651815] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 412.657415] ? pcpu_alloc+0x144/0x12d0 [ 412.661357] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 412.666950] alloc_pages_current+0x107/0x210 [ 412.671423] get_zeroed_page+0x14/0x50 [ 412.675356] selinux_sb_copy_data+0x2a/0x4a0 [ 412.675378] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 412.675401] security_sb_copy_data+0x71/0xb0 [ 412.675423] mount_fs+0x236/0x331 [ 412.693334] vfs_kern_mount.part.0+0x6f/0x410 [ 412.697891] do_mount+0x53e/0x2bc0 [ 412.701490] ? copy_mount_string+0x40/0x40 [ 412.705777] ? _copy_from_user+0xdd/0x150 [ 412.709975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.715568] ? copy_mount_options+0x280/0x3a0 [ 412.720124] ksys_mount+0xdb/0x150 [ 412.723724] __x64_sys_mount+0xbe/0x150 [ 412.727755] do_syscall_64+0x103/0x610 [ 412.732205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.737432] RIP: 0033:0x45b69a [ 412.740668] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 412.759603] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 412.767347] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 412.774652] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 412.781957] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 412.789254] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 412.796553] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:00 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:00 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x9000000, '/dev/sg#\x00'}}, 0x32) 12:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xd000000, '/dev/sg#\x00'}}, 0x32) 12:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 413.072326] FAULT_INJECTION: forcing a failure. [ 413.072326] name failslab, interval 1, probability 0, space 0, times 0 [ 413.118975] CPU: 0 PID: 19518 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 413.125986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.135379] Call Trace: [ 413.138014] dump_stack+0x172/0x1f0 [ 413.141699] should_fail.cold+0xa/0x1b [ 413.145654] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.150811] ? lock_downgrade+0x810/0x810 [ 413.155009] ? ___might_sleep+0x163/0x280 [ 413.159204] __should_failslab+0x121/0x190 [ 413.163486] should_failslab+0x9/0x14 [ 413.167330] kmem_cache_alloc+0x2b1/0x700 [ 413.171536] ? trace_hardirqs_on+0x67/0x230 [ 413.175905] ? kasan_check_read+0x11/0x20 [ 413.180108] getname_kernel+0x53/0x370 [ 413.180131] kern_path+0x20/0x40 [ 413.180152] lookup_bdev.part.0+0x7b/0x1b0 [ 413.180167] ? blkdev_open+0x290/0x290 [ 413.180183] ? __free_pages+0x72/0xb0 [ 413.180205] blkdev_get_by_path+0x81/0x130 [ 413.203695] mount_bdev+0x5d/0x3c0 [ 413.207285] ? finish_unfinished+0x1120/0x1120 [ 413.211920] get_super_block+0x35/0x40 [ 413.211942] mount_fs+0xae/0x331 [ 413.211963] vfs_kern_mount.part.0+0x6f/0x410 [ 413.211983] do_mount+0x53e/0x2bc0 [ 413.212002] ? copy_mount_string+0x40/0x40 [ 413.212018] ? _copy_from_user+0xdd/0x150 [ 413.212044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.227412] ? copy_mount_options+0x280/0x3a0 [ 413.227436] ksys_mount+0xdb/0x150 [ 413.227456] __x64_sys_mount+0xbe/0x150 [ 413.227478] do_syscall_64+0x103/0x610 [ 413.227503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.262606] RIP: 0033:0x45b69a 12:05:00 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 12:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 413.265832] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 413.284760] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 413.292516] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 413.299823] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 413.299834] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 413.299841] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 413.299849] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:00 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xbfffffff, '/dev/sg#\x00'}}, 0x32) 12:05:00 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 12:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 413.565678] FAULT_INJECTION: forcing a failure. [ 413.565678] name failslab, interval 1, probability 0, space 0, times 0 [ 413.635806] CPU: 0 PID: 19546 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 413.642819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.652233] Call Trace: [ 413.654863] dump_stack+0x172/0x1f0 [ 413.658551] should_fail.cold+0xa/0x1b [ 413.662493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.667653] ? lock_downgrade+0x810/0x810 [ 413.671851] ? ___might_sleep+0x163/0x280 [ 413.676062] __should_failslab+0x121/0x190 [ 413.680347] should_failslab+0x9/0x14 [ 413.684203] kmem_cache_alloc+0x2b1/0x700 [ 413.688587] ? trace_hardirqs_on+0x67/0x230 [ 413.692958] ? kasan_check_read+0x11/0x20 [ 413.697157] getname_kernel+0x53/0x370 [ 413.701101] kern_path+0x20/0x40 [ 413.704527] lookup_bdev.part.0+0x7b/0x1b0 [ 413.708817] ? blkdev_open+0x290/0x290 [ 413.712753] ? __free_pages+0x72/0xb0 [ 413.716613] blkdev_get_by_path+0x81/0x130 [ 413.720903] mount_bdev+0x5d/0x3c0 [ 413.724489] ? finish_unfinished+0x1120/0x1120 [ 413.729120] get_super_block+0x35/0x40 [ 413.733051] mount_fs+0xae/0x331 [ 413.736472] vfs_kern_mount.part.0+0x6f/0x410 [ 413.741023] do_mount+0x53e/0x2bc0 [ 413.744709] ? copy_mount_string+0x40/0x40 [ 413.748999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.754585] ? copy_mount_options+0x280/0x3a0 [ 413.759135] ksys_mount+0xdb/0x150 [ 413.762738] __x64_sys_mount+0xbe/0x150 [ 413.766763] do_syscall_64+0x103/0x610 [ 413.770698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.775922] RIP: 0033:0x45b69a [ 413.779148] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 413.798072] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 413.805816] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 413.805827] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 413.805835] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 413.805842] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:05:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:01 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 12:05:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xc6000000, '/dev/sg#\x00'}}, 0x32) 12:05:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xfbffffff, '/dev/sg#\x00'}}, 0x32) [ 413.805850] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:01 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:01 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[], 0x0) 12:05:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xffffffbf, '/dev/sg#\x00'}}, 0x32) 12:05:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:01 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[], 0x0) 12:05:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xfffffffb, '/dev/sg#\x00'}}, 0x32) 12:05:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 414.155127] FAULT_INJECTION: forcing a failure. [ 414.155127] name failslab, interval 1, probability 0, space 0, times 0 [ 414.209160] CPU: 0 PID: 19587 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 414.216175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.225567] Call Trace: [ 414.228208] dump_stack+0x172/0x1f0 [ 414.231907] should_fail.cold+0xa/0x1b [ 414.235855] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.241023] ? lock_downgrade+0x810/0x810 [ 414.245215] ? ___might_sleep+0x163/0x280 [ 414.249419] __should_failslab+0x121/0x190 [ 414.253706] should_failslab+0x9/0x14 [ 414.257567] kmem_cache_alloc+0x2b1/0x700 [ 414.261766] ? trace_hardirqs_on+0x67/0x230 [ 414.266136] ? kasan_check_read+0x11/0x20 [ 414.270332] getname_kernel+0x53/0x370 [ 414.274276] kern_path+0x20/0x40 [ 414.277689] lookup_bdev.part.0+0x7b/0x1b0 [ 414.281982] ? blkdev_open+0x290/0x290 [ 414.282001] ? __free_pages+0x72/0xb0 [ 414.282028] blkdev_get_by_path+0x81/0x130 [ 414.294015] mount_bdev+0x5d/0x3c0 [ 414.297608] ? finish_unfinished+0x1120/0x1120 [ 414.302245] get_super_block+0x35/0x40 [ 414.306180] mount_fs+0xae/0x331 [ 414.306203] vfs_kern_mount.part.0+0x6f/0x410 [ 414.306226] do_mount+0x53e/0x2bc0 [ 414.317904] ? copy_mount_string+0x40/0x40 [ 414.322197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.327783] ? copy_mount_options+0x280/0x3a0 [ 414.332320] ksys_mount+0xdb/0x150 [ 414.335926] __x64_sys_mount+0xbe/0x150 [ 414.340044] do_syscall_64+0x103/0x610 [ 414.343982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.343997] RIP: 0033:0x45b69a 12:05:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 414.344019] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 414.372883] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 414.372901] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 414.372908] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 414.372916] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 414.372923] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 414.372931] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:01 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x1000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:01 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[], 0x0) 12:05:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:02 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB], 0x0) 12:05:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x2000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 414.990722] FAULT_INJECTION: forcing a failure. [ 414.990722] name failslab, interval 1, probability 0, space 0, times 0 [ 415.003270] CPU: 1 PID: 19638 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 415.010279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.019677] Call Trace: [ 415.022331] dump_stack+0x172/0x1f0 [ 415.026041] should_fail.cold+0xa/0x1b [ 415.030026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.035187] ? lock_downgrade+0x810/0x810 [ 415.039390] ? ___might_sleep+0x163/0x280 [ 415.043600] __should_failslab+0x121/0x190 [ 415.047889] should_failslab+0x9/0x14 [ 415.051739] kmem_cache_alloc_trace+0x2cf/0x760 [ 415.056466] ? lock_acquire+0x16f/0x3f0 [ 415.060504] selinux_sb_alloc_security+0x46/0x220 [ 415.065588] security_sb_alloc+0x69/0xb0 [ 415.069705] ? kill_litter_super+0x60/0x60 [ 415.073996] sget_userns+0x210/0xd30 [ 415.077767] ? kill_litter_super+0x60/0x60 [ 415.082062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.087653] ? ns_test_super+0x50/0x50 [ 415.091607] ? ns_test_super+0x50/0x50 [ 415.095569] ? kill_litter_super+0x60/0x60 [ 415.099850] sget+0x10c/0x150 [ 415.103025] mount_bdev+0xff/0x3c0 [ 415.106612] ? finish_unfinished+0x1120/0x1120 [ 415.111244] get_super_block+0x35/0x40 [ 415.115269] mount_fs+0xae/0x331 [ 415.118687] vfs_kern_mount.part.0+0x6f/0x410 [ 415.123234] do_mount+0x53e/0x2bc0 [ 415.126833] ? copy_mount_string+0x40/0x40 [ 415.131123] ? _copy_from_user+0xdd/0x150 [ 415.135321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.140920] ? copy_mount_options+0x280/0x3a0 [ 415.145475] ksys_mount+0xdb/0x150 [ 415.149063] __x64_sys_mount+0xbe/0x150 [ 415.153087] do_syscall_64+0x103/0x610 [ 415.157020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.162244] RIP: 0033:0x45b69a [ 415.165471] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 415.184401] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 415.192148] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 415.199442] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 415.206739] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 415.214035] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 415.221332] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:02 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:02 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB], 0x0) 12:05:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x20000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:02 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB], 0x0) 12:05:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x100000000000000, '/dev/sg#\x00'}}, 0x32) [ 415.533199] FAULT_INJECTION: forcing a failure. [ 415.533199] name failslab, interval 1, probability 0, space 0, times 0 [ 415.559506] CPU: 1 PID: 19654 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 415.566496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.575962] Call Trace: [ 415.578582] dump_stack+0x172/0x1f0 [ 415.582244] should_fail.cold+0xa/0x1b [ 415.586157] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.591288] ? lock_downgrade+0x810/0x810 [ 415.595453] ? ___might_sleep+0x163/0x280 [ 415.599628] __should_failslab+0x121/0x190 [ 415.603904] should_failslab+0x9/0x14 [ 415.607739] kmem_cache_alloc_trace+0x2cf/0x760 [ 415.612527] ? kasan_unpoison_shadow+0x35/0x50 [ 415.617143] ? kasan_kmalloc+0xce/0xf0 [ 415.621065] __memcg_init_list_lru_node+0x8a/0x1e0 [ 415.626023] __list_lru_init+0x3d3/0x6e0 [ 415.630109] sget_userns+0x81e/0xd30 [ 415.633837] ? kill_litter_super+0x60/0x60 [ 415.638101] ? ns_test_super+0x50/0x50 [ 415.642010] ? ns_test_super+0x50/0x50 [ 415.645916] ? kill_litter_super+0x60/0x60 [ 415.650198] sget+0x10c/0x150 [ 415.653356] mount_bdev+0xff/0x3c0 [ 415.656912] ? finish_unfinished+0x1120/0x1120 [ 415.661515] get_super_block+0x35/0x40 [ 415.665522] mount_fs+0xae/0x331 [ 415.668924] vfs_kern_mount.part.0+0x6f/0x410 [ 415.673444] do_mount+0x53e/0x2bc0 [ 415.676998] ? retint_kernel+0x2d/0x2d 12:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x200000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 415.677021] ? copy_mount_string+0x40/0x40 [ 415.677045] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 415.677066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.685202] ? copy_mount_options+0x280/0x3a0 [ 415.685224] ksys_mount+0xdb/0x150 [ 415.685242] __x64_sys_mount+0xbe/0x150 [ 415.685266] do_syscall_64+0x103/0x610 [ 415.700759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.700773] RIP: 0033:0x45b69a [ 415.700791] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 415.700799] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 415.700813] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 415.700821] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 415.700829] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 415.700837] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 415.700845] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:03 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x400000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:03 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000000c46f0006000000070000003c9f0300000000000000c27ed0e8010003000000000000006700fb6c7a2ce29a00"/75], 0x4b) 12:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f00000004c0)=[{}], 0x1, 0x2000000271a6f9a) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000480)) 12:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x500000000000000, '/dev/sg#\x00'}}, 0x32) [ 416.028350] FAULT_INJECTION: forcing a failure. [ 416.028350] name failslab, interval 1, probability 0, space 0, times 0 12:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 416.159453] CPU: 0 PID: 19684 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 416.166437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.175809] Call Trace: [ 416.178427] dump_stack+0x172/0x1f0 [ 416.182081] should_fail.cold+0xa/0x1b [ 416.186106] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 416.191264] ? lock_downgrade+0x810/0x810 [ 416.195438] ? ___might_sleep+0x163/0x280 [ 416.199608] __should_failslab+0x121/0x190 [ 416.203867] should_failslab+0x9/0x14 [ 416.207678] __kmalloc+0x2e5/0x750 [ 416.211242] ? __list_lru_init+0xd5/0x6e0 [ 416.215409] __list_lru_init+0xd5/0x6e0 [ 416.219417] sget_userns+0x81e/0xd30 [ 416.223151] ? kill_litter_super+0x60/0x60 [ 416.227409] ? ns_test_super+0x50/0x50 [ 416.231310] ? ns_test_super+0x50/0x50 [ 416.235204] ? kill_litter_super+0x60/0x60 [ 416.239446] sget+0x10c/0x150 [ 416.242565] mount_bdev+0xff/0x3c0 [ 416.246113] ? finish_unfinished+0x1120/0x1120 [ 416.250706] get_super_block+0x35/0x40 [ 416.254612] mount_fs+0xae/0x331 [ 416.257987] vfs_kern_mount.part.0+0x6f/0x410 [ 416.262491] do_mount+0x53e/0x2bc0 [ 416.266043] ? copy_mount_string+0x40/0x40 [ 416.270276] ? _copy_from_user+0xdd/0x150 [ 416.274454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.280034] ? copy_mount_options+0x280/0x3a0 [ 416.284545] ksys_mount+0xdb/0x150 [ 416.288086] __x64_sys_mount+0xbe/0x150 [ 416.292068] do_syscall_64+0x103/0x610 [ 416.295965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.301154] RIP: 0033:0x45b69a [ 416.304347] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 416.323274] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 416.330983] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 416.338266] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 416.345537] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x800000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 416.352805] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 416.361567] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:03 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x900000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f00000004c0)=[{}], 0x1, 0x2000000271a6f9a) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000480)) 12:05:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xd00000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) [ 416.817418] FAULT_INJECTION: forcing a failure. [ 416.817418] name failslab, interval 1, probability 0, space 0, times 0 [ 416.851824] CPU: 1 PID: 19727 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 416.858847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.868271] Call Trace: [ 416.870928] dump_stack+0x172/0x1f0 [ 416.874595] should_fail.cold+0xa/0x1b [ 416.878552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 416.883708] ? lock_downgrade+0x810/0x810 [ 416.887905] ? ___might_sleep+0x163/0x280 [ 416.892110] __should_failslab+0x121/0x190 [ 416.896388] should_failslab+0x9/0x14 [ 416.900226] kmem_cache_alloc_node_trace+0x277/0x720 [ 416.905411] __kmalloc_node+0x3d/0x80 [ 416.909254] kvmalloc_node+0x68/0x100 [ 416.913096] __list_lru_init+0x4aa/0x6e0 [ 416.917220] sget_userns+0x81e/0xd30 [ 416.920968] ? kill_litter_super+0x60/0x60 [ 416.925250] ? ns_test_super+0x50/0x50 [ 416.929177] ? ns_test_super+0x50/0x50 [ 416.933271] ? kill_litter_super+0x60/0x60 [ 416.937548] sget+0x10c/0x150 [ 416.940698] mount_bdev+0xff/0x3c0 [ 416.944268] ? finish_unfinished+0x1120/0x1120 [ 416.948905] get_super_block+0x35/0x40 [ 416.952843] mount_fs+0xae/0x331 [ 416.956252] vfs_kern_mount.part.0+0x6f/0x410 [ 416.960793] do_mount+0x53e/0x2bc0 [ 416.964377] ? copy_mount_string+0x40/0x40 [ 416.968657] ? _copy_from_user+0xdd/0x150 [ 416.972844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.978432] ? copy_mount_options+0x280/0x3a0 [ 416.982970] ksys_mount+0xdb/0x150 [ 416.986580] __x64_sys_mount+0xbe/0x150 [ 416.990588] do_syscall_64+0x103/0x610 [ 416.994512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.999733] RIP: 0033:0x45b69a 12:05:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xbfffffff00000000, '/dev/sg#\x00'}}, 0x32) [ 417.002950] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 417.021881] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 417.029627] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 417.036933] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 417.044230] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 417.044239] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 417.044248] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:04 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:04 executing program 1: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x36, &(0x7f0000000040)={@empty, @remote, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6, 0x0, 0x0, 0x0, @rand_addr, @multicast1, {[@lsrr={0x83, 0x3}]}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "080bc2", 0x0, ';M%'}}}}}}, 0x0) 12:05:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xc600000000000000, '/dev/sg#\x00'}}, 0x32) 12:05:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0xfbffffff00000000, '/dev/sg#\x00'}}, 0x32) 12:05:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/14, 0x1221000, 0x1000}, 0x18) bind$xdp(r1, &(0x7f0000000100), 0x10) 12:05:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 417.456428] FAULT_INJECTION: forcing a failure. [ 417.456428] name failslab, interval 1, probability 0, space 0, times 0 12:05:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 417.503683] CPU: 0 PID: 19763 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 417.510706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.520103] Call Trace: [ 417.522735] dump_stack+0x172/0x1f0 [ 417.526400] should_fail.cold+0xa/0x1b [ 417.530305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 417.535430] ? lock_downgrade+0x810/0x810 [ 417.539606] ? ___might_sleep+0x163/0x280 [ 417.543783] __should_failslab+0x121/0x190 [ 417.548060] should_failslab+0x9/0x14 [ 417.551888] __kmalloc+0x2e5/0x750 [ 417.555452] ? __list_lru_init+0xd5/0x6e0 [ 417.559610] __list_lru_init+0xd5/0x6e0 [ 417.563620] sget_userns+0x81e/0xd30 [ 417.567397] ? kill_litter_super+0x60/0x60 [ 417.571682] ? ns_test_super+0x50/0x50 [ 417.575626] ? ns_test_super+0x50/0x50 [ 417.579570] ? kill_litter_super+0x60/0x60 [ 417.584322] sget+0x10c/0x150 [ 417.587483] mount_bdev+0xff/0x3c0 [ 417.591068] ? finish_unfinished+0x1120/0x1120 [ 417.595792] get_super_block+0x35/0x40 [ 417.599737] mount_fs+0xae/0x331 [ 417.603172] vfs_kern_mount.part.0+0x6f/0x410 [ 417.608194] do_mount+0x53e/0x2bc0 [ 417.611792] ? copy_mount_string+0x40/0x40 [ 417.616074] ? _copy_from_user+0xdd/0x150 [ 417.620284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.626383] ? copy_mount_options+0x280/0x3a0 [ 417.630942] ksys_mount+0xdb/0x150 [ 417.634526] __x64_sys_mount+0xbe/0x150 [ 417.638561] do_syscall_64+0x103/0x610 [ 417.642500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.647734] RIP: 0033:0x45b69a 12:05:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) [ 417.650959] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 417.669907] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 417.677649] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 417.684953] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 417.692263] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 417.699566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 417.706867] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:05 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x02'}}, 0x32) 12:05:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/14, 0x1221000, 0x1000}, 0x18) bind$xdp(r1, &(0x7f0000000100), 0x10) 12:05:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x04'}}, 0x32) 12:05:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) [ 418.095447] FAULT_INJECTION: forcing a failure. [ 418.095447] name failslab, interval 1, probability 0, space 0, times 0 [ 418.121160] CPU: 0 PID: 19799 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 418.128173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.137563] Call Trace: [ 418.137597] dump_stack+0x172/0x1f0 12:05:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 418.137624] should_fail.cold+0xa/0x1b [ 418.137646] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 418.152967] ? lock_downgrade+0x810/0x810 [ 418.157160] ? ___might_sleep+0x163/0x280 [ 418.161365] __should_failslab+0x121/0x190 [ 418.161385] should_failslab+0x9/0x14 [ 418.161401] kmem_cache_alloc_node_trace+0x277/0x720 [ 418.161426] __kmalloc_node+0x3d/0x80 [ 418.161444] kvmalloc_node+0x68/0x100 [ 418.161465] __list_lru_init+0x4aa/0x6e0 [ 418.174678] sget_userns+0x81e/0xd30 [ 418.174696] ? kill_litter_super+0x60/0x60 [ 418.174714] ? ns_test_super+0x50/0x50 [ 418.174729] ? ns_test_super+0x50/0x50 [ 418.174748] ? kill_litter_super+0x60/0x60 [ 418.182408] sget+0x10c/0x150 [ 418.182431] mount_bdev+0xff/0x3c0 [ 418.182449] ? finish_unfinished+0x1120/0x1120 [ 418.182468] get_super_block+0x35/0x40 [ 418.190311] mount_fs+0xae/0x331 [ 418.190340] vfs_kern_mount.part.0+0x6f/0x410 [ 418.198514] do_mount+0x53e/0x2bc0 [ 418.198539] ? copy_mount_string+0x40/0x40 [ 418.198558] ? _copy_from_user+0xdd/0x150 [ 418.198583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.213413] ? copy_mount_options+0x280/0x3a0 [ 418.213434] ksys_mount+0xdb/0x150 [ 418.213454] __x64_sys_mount+0xbe/0x150 [ 418.213476] do_syscall_64+0x103/0x610 [ 418.213503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.222031] RIP: 0033:0x45b69a [ 418.222050] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 12:05:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 418.222058] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 418.222080] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 418.305834] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 418.313144] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 418.320447] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 418.327748] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/14, 0x1221000, 0x1000}, 0x18) bind$xdp(r1, &(0x7f0000000100), 0x10) 12:05:05 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x05'}}, 0x32) 12:05:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\b'}}, 0x32) [ 418.632259] FAULT_INJECTION: forcing a failure. [ 418.632259] name failslab, interval 1, probability 0, space 0, times 0 12:05:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 418.752847] CPU: 1 PID: 19830 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 418.759888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.769270] Call Trace: [ 418.771912] dump_stack+0x172/0x1f0 [ 418.775595] should_fail.cold+0xa/0x1b [ 418.779526] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 418.784675] ? lock_downgrade+0x810/0x810 [ 418.788887] ? ___might_sleep+0x163/0x280 [ 418.793098] __should_failslab+0x121/0x190 [ 418.797377] should_failslab+0x9/0x14 [ 418.801223] kmem_cache_alloc_trace+0x2cf/0x760 [ 418.805968] ? kasan_unpoison_shadow+0x35/0x50 [ 418.810590] ? kasan_kmalloc+0xce/0xf0 [ 418.814538] __memcg_init_list_lru_node+0x8a/0x1e0 [ 418.819528] __list_lru_init+0x3d3/0x6e0 [ 418.823662] sget_userns+0x81e/0xd30 [ 418.827418] ? kill_litter_super+0x60/0x60 [ 418.831705] ? ns_test_super+0x50/0x50 [ 418.835638] ? ns_test_super+0x50/0x50 [ 418.839570] ? kill_litter_super+0x60/0x60 [ 418.843844] sget+0x10c/0x150 [ 418.847010] mount_bdev+0xff/0x3c0 [ 418.850594] ? finish_unfinished+0x1120/0x1120 [ 418.855220] get_super_block+0x35/0x40 [ 418.859154] mount_fs+0xae/0x331 [ 418.862570] vfs_kern_mount.part.0+0x6f/0x410 [ 418.867124] do_mount+0x53e/0x2bc0 [ 418.870703] ? copy_mount_string+0x40/0x40 [ 418.874985] ? _copy_from_user+0xdd/0x150 [ 418.879188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.884765] ? copy_mount_options+0x280/0x3a0 [ 418.889314] ksys_mount+0xdb/0x150 [ 418.892917] __x64_sys_mount+0xbe/0x150 [ 418.896968] do_syscall_64+0x103/0x610 [ 418.900939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.906167] RIP: 0033:0x45b69a [ 418.909398] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 418.928328] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 418.936077] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 418.943381] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\t'}}, 0x32) 12:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/14, 0x1221000, 0x1000}, 0x18) bind$xdp(r1, &(0x7f0000000100), 0x10) [ 418.950692] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 418.957991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 418.965297] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:06 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\r'}}, 0x32) 12:05:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:06 executing program 1: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() link(&(0x7f00000000c0)='./file1/file0\x00', 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ftruncate(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") 12:05:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\xc6'}}, 0x32) 12:05:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) [ 419.342119] FAULT_INJECTION: forcing a failure. [ 419.342119] name failslab, interval 1, probability 0, space 0, times 0 [ 419.421733] CPU: 0 PID: 19870 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 419.428748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.438134] Call Trace: [ 419.440763] dump_stack+0x172/0x1f0 [ 419.444443] should_fail.cold+0xa/0x1b [ 419.448389] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 419.453540] ? lock_downgrade+0x810/0x810 [ 419.457729] ? ___might_sleep+0x163/0x280 [ 419.461940] __should_failslab+0x121/0x190 [ 419.467206] should_failslab+0x9/0x14 [ 419.471053] kmem_cache_alloc_node_trace+0x277/0x720 [ 419.476213] __kmalloc_node+0x3d/0x80 [ 419.480059] kvmalloc_node+0x68/0x100 [ 419.483923] __list_lru_init+0x4aa/0x6e0 [ 419.490299] sget_userns+0x81e/0xd30 [ 419.494139] ? kill_litter_super+0x60/0x60 [ 419.498429] ? ns_test_super+0x50/0x50 [ 419.502382] ? ns_test_super+0x50/0x50 [ 419.506315] ? kill_litter_super+0x60/0x60 [ 419.510603] sget+0x10c/0x150 [ 419.513756] mount_bdev+0xff/0x3c0 [ 419.517340] ? finish_unfinished+0x1120/0x1120 [ 419.521978] get_super_block+0x35/0x40 [ 419.525919] mount_fs+0xae/0x331 [ 419.529334] vfs_kern_mount.part.0+0x6f/0x410 [ 419.534059] do_mount+0x53e/0x2bc0 [ 419.537651] ? copy_mount_string+0x40/0x40 [ 419.541943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.547531] ? copy_mount_options+0x280/0x3a0 [ 419.552169] ksys_mount+0xdb/0x150 [ 419.555754] __x64_sys_mount+0xbe/0x150 [ 419.559781] do_syscall_64+0x103/0x610 [ 419.563722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.568954] RIP: 0033:0x45b69a [ 419.572188] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 419.591124] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 419.598875] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 419.606270] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 419.613579] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 419.620886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 419.628194] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:07 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 419.971822] FAULT_INJECTION: forcing a failure. [ 419.971822] name failslab, interval 1, probability 0, space 0, times 0 [ 420.042609] CPU: 0 PID: 19909 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 420.049785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.049792] Call Trace: [ 420.049821] dump_stack+0x172/0x1f0 [ 420.049848] should_fail.cold+0xa/0x1b [ 420.049872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 420.049895] ? lock_downgrade+0x810/0x810 [ 420.049919] ? ___might_sleep+0x163/0x280 [ 420.069982] __should_failslab+0x121/0x190 [ 420.070003] should_failslab+0x9/0x14 [ 420.070017] kmem_cache_alloc_trace+0x2cf/0x760 [ 420.070032] ? kasan_unpoison_shadow+0x35/0x50 [ 420.070046] ? kasan_kmalloc+0xce/0xf0 [ 420.070068] __memcg_init_list_lru_node+0x8a/0x1e0 [ 420.070088] __list_lru_init+0x3d3/0x6e0 [ 420.113867] sget_userns+0x81e/0xd30 [ 420.117621] ? kill_litter_super+0x60/0x60 [ 420.121902] ? ns_test_super+0x50/0x50 [ 420.125833] ? ns_test_super+0x50/0x50 [ 420.129758] ? kill_litter_super+0x60/0x60 [ 420.134024] sget+0x10c/0x150 [ 420.137255] mount_bdev+0xff/0x3c0 [ 420.140827] ? finish_unfinished+0x1120/0x1120 [ 420.145458] get_super_block+0x35/0x40 [ 420.149387] mount_fs+0xae/0x331 [ 420.152797] vfs_kern_mount.part.0+0x6f/0x410 [ 420.157341] do_mount+0x53e/0x2bc0 [ 420.160945] ? copy_mount_string+0x40/0x40 [ 420.165412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.171084] ? copy_mount_options+0x280/0x3a0 [ 420.175634] ksys_mount+0xdb/0x150 [ 420.179218] __x64_sys_mount+0xbe/0x150 [ 420.183242] do_syscall_64+0x103/0x610 [ 420.187174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.192406] RIP: 0033:0x45b69a [ 420.195628] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 420.214559] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 420.222415] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 420.230146] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 420.237449] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 420.245274] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 420.252584] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) lremovexattr(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)=@known='system.posix_acl_default\x00') 12:05:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:09 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) [ 422.417544] FAULT_INJECTION: forcing a failure. [ 422.417544] name failslab, interval 1, probability 0, space 0, times 0 [ 422.480450] CPU: 1 PID: 19922 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 422.487433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.496809] Call Trace: [ 422.499423] dump_stack+0x172/0x1f0 [ 422.503079] should_fail.cold+0xa/0x1b [ 422.506988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 422.512111] ? lock_downgrade+0x810/0x810 [ 422.516275] ? ___might_sleep+0x163/0x280 [ 422.520444] __should_failslab+0x121/0x190 [ 422.524696] should_failslab+0x9/0x14 [ 422.528510] kmem_cache_alloc_trace+0x2cf/0x760 [ 422.533211] ? kasan_unpoison_shadow+0x35/0x50 [ 422.537799] ? kasan_kmalloc+0xce/0xf0 [ 422.541740] __memcg_init_list_lru_node+0x8a/0x1e0 [ 422.546695] __list_lru_init+0x3d3/0x6e0 [ 422.550773] sget_userns+0x81e/0xd30 [ 422.554516] ? kill_litter_super+0x60/0x60 [ 422.558764] ? ns_test_super+0x50/0x50 [ 422.562665] ? ns_test_super+0x50/0x50 [ 422.566569] ? kill_litter_super+0x60/0x60 [ 422.570817] sget+0x10c/0x150 [ 422.573939] mount_bdev+0xff/0x3c0 [ 422.577527] ? finish_unfinished+0x1120/0x1120 [ 422.582139] get_super_block+0x35/0x40 [ 422.586077] mount_fs+0xae/0x331 [ 422.589470] vfs_kern_mount.part.0+0x6f/0x410 [ 422.593984] do_mount+0x53e/0x2bc0 [ 422.597543] ? copy_mount_string+0x40/0x40 [ 422.601788] ? _copy_from_user+0xdd/0x150 [ 422.605951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.611507] ? copy_mount_options+0x280/0x3a0 [ 422.616021] ksys_mount+0xdb/0x150 [ 422.619583] __x64_sys_mount+0xbe/0x150 [ 422.623619] do_syscall_64+0x103/0x610 [ 422.627535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.632764] RIP: 0033:0x45b69a [ 422.635981] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 422.654906] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 422.662647] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 422.669927] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:10 executing program 1: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='1.7.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xc004, &(0x7f0000000640)={'trans=rdma,', {'port'}, 0x2c, {[{@rq={'rq'}}, {@sq={'sq'}}, {@rq={'rq', 0x3d, 0x4}}], [{@smackfsroot={'smackfsroot', 0x3d, '/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xff\xff\xff\x8c\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) 12:05:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 422.677207] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 422.684488] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 422.691793] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:10 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:10 executing program 1: socket(0x0, 0x0, 0x0) r0 = gettid() futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) prlimit64(r0, 0xe, 0x0, 0x0) 12:05:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x80005, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000003c0), &(0x7f0000000400)=0x4) [ 423.118253] FAULT_INJECTION: forcing a failure. [ 423.118253] name failslab, interval 1, probability 0, space 0, times 0 12:05:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 423.365025] CPU: 1 PID: 19969 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 423.372051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.381470] Call Trace: [ 423.384088] dump_stack+0x172/0x1f0 [ 423.387751] should_fail.cold+0xa/0x1b [ 423.391661] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 423.396785] ? lock_downgrade+0x810/0x810 [ 423.400961] ? ___might_sleep+0x163/0x280 [ 423.405139] __should_failslab+0x121/0x190 [ 423.409404] should_failslab+0x9/0x14 [ 423.413235] kmem_cache_alloc_trace+0x2cf/0x760 [ 423.418011] ? kasan_unpoison_shadow+0x35/0x50 [ 423.422612] ? kasan_kmalloc+0xce/0xf0 [ 423.426527] __memcg_init_list_lru_node+0x8a/0x1e0 [ 423.431501] __list_lru_init+0x3d3/0x6e0 [ 423.435583] sget_userns+0x81e/0xd30 [ 423.439314] ? kill_litter_super+0x60/0x60 [ 423.443563] ? ns_test_super+0x50/0x50 [ 423.447462] ? ns_test_super+0x50/0x50 [ 423.451384] ? kill_litter_super+0x60/0x60 [ 423.455636] sget+0x10c/0x150 [ 423.458766] mount_bdev+0xff/0x3c0 [ 423.462328] ? finish_unfinished+0x1120/0x1120 [ 423.468387] get_super_block+0x35/0x40 [ 423.472307] mount_fs+0xae/0x331 [ 423.475698] vfs_kern_mount.part.0+0x6f/0x410 [ 423.480226] do_mount+0x53e/0x2bc0 [ 423.483788] ? copy_mount_string+0x40/0x40 [ 423.488086] ? copy_mount_options+0x1f8/0x3a0 [ 423.492606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.498157] ? copy_mount_options+0x280/0x3a0 [ 423.502674] ksys_mount+0xdb/0x150 [ 423.506235] __x64_sys_mount+0xbe/0x150 [ 423.510231] do_syscall_64+0x103/0x610 [ 423.514140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.519354] RIP: 0033:0x45b69a [ 423.522659] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 423.541581] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 423.549325] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 423.556606] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 423.563901] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 423.571181] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 423.578460] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:11 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000180)={"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"}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x40000071, 0xff0b011e, 0x1b], [0xc1]}) 12:05:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) ioctl(r0, 0x7, &(0x7f0000000200)="41d616abfe76f2351ec0185a2503a9b74a7527aba69ebbc3633cd62793bd92a19b2f361720fde759322e9f4c2c9b0850777e77385914c85ecb6c1ac166ff266c6d693f") ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000440)=""/217) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$selinux_attr(r0, &(0x7f00000003c0)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="f8b8da57717f3e3840a45ea13092eb11a74fc15aee48bfc63a5e08c34ffcc05ed180a7e647205e2e1909f0f06152a0375781028f7356694e8eb12c62ba688092ab34769dbae721296db4", 0x4a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002e80)=0xe8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6787, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f000001a000)=[{}, {}], 0x2) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x0, 0x2) close(r1) creat(&(0x7f0000000400)='./bus\x00', 0x2) [ 423.804357] FAULT_INJECTION: forcing a failure. [ 423.804357] name failslab, interval 1, probability 0, space 0, times 0 [ 423.847909] CPU: 0 PID: 20008 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 423.854912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.864303] Call Trace: [ 423.867003] dump_stack+0x172/0x1f0 [ 423.870656] should_fail.cold+0xa/0x1b [ 423.874567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 423.879699] ? lock_downgrade+0x810/0x810 [ 423.883869] ? ___might_sleep+0x163/0x280 [ 423.888043] __should_failslab+0x121/0x190 [ 423.892411] should_failslab+0x9/0x14 12:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) [ 423.896237] kmem_cache_alloc_trace+0x2cf/0x760 [ 423.900946] __memcg_init_list_lru_node+0x8a/0x1e0 [ 423.905905] __list_lru_init+0x3d3/0x6e0 [ 423.909993] sget_userns+0x81e/0xd30 [ 423.913726] ? kill_litter_super+0x60/0x60 [ 423.917984] ? ns_test_super+0x50/0x50 [ 423.921901] ? ns_test_super+0x50/0x50 [ 423.925805] ? kill_litter_super+0x60/0x60 [ 423.930055] sget+0x10c/0x150 [ 423.933188] mount_bdev+0xff/0x3c0 [ 423.936748] ? finish_unfinished+0x1120/0x1120 [ 423.941351] get_super_block+0x35/0x40 [ 423.945272] mount_fs+0xae/0x331 [ 423.948662] vfs_kern_mount.part.0+0x6f/0x410 [ 423.953181] do_mount+0x53e/0x2bc0 [ 423.956745] ? copy_mount_string+0x40/0x40 [ 423.961007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.966561] ? copy_mount_options+0x280/0x3a0 [ 423.971079] ksys_mount+0xdb/0x150 [ 423.974641] __x64_sys_mount+0xbe/0x150 [ 423.978638] do_syscall_64+0x103/0x610 [ 423.982571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.987791] RIP: 0033:0x45b69a [ 423.991021] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 424.010211] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 424.017949] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 424.025241] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 424.032529] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 424.039814] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 424.047099] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:11 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) 12:05:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 424.442832] FAULT_INJECTION: forcing a failure. [ 424.442832] name failslab, interval 1, probability 0, space 0, times 0 [ 424.456908] CPU: 0 PID: 20050 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 424.463863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.473256] Call Trace: [ 424.475873] dump_stack+0x172/0x1f0 [ 424.479541] should_fail.cold+0xa/0x1b [ 424.483449] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 424.483470] ? lock_downgrade+0x810/0x810 [ 424.483495] ? ___might_sleep+0x163/0x280 [ 424.492765] __should_failslab+0x121/0x190 [ 424.492789] should_failslab+0x9/0x14 [ 424.501179] kmem_cache_alloc_trace+0x2cf/0x760 [ 424.509633] ? kasan_unpoison_shadow+0x35/0x50 [ 424.509648] ? kasan_kmalloc+0xce/0xf0 [ 424.509672] __memcg_init_list_lru_node+0x8a/0x1e0 [ 424.509693] __list_lru_init+0x3d3/0x6e0 [ 424.527206] sget_userns+0x81e/0xd30 [ 424.530945] ? kill_litter_super+0x60/0x60 [ 424.535208] ? ns_test_super+0x50/0x50 [ 424.539157] ? ns_test_super+0x50/0x50 [ 424.543055] ? kill_litter_super+0x60/0x60 [ 424.547301] sget+0x10c/0x150 [ 424.550430] mount_bdev+0xff/0x3c0 [ 424.553987] ? finish_unfinished+0x1120/0x1120 [ 424.558590] get_super_block+0x35/0x40 [ 424.562579] mount_fs+0xae/0x331 [ 424.565965] vfs_kern_mount.part.0+0x6f/0x410 [ 424.570486] do_mount+0x53e/0x2bc0 [ 424.574052] ? copy_mount_string+0x40/0x40 [ 424.579012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.584584] ? copy_mount_options+0x280/0x3a0 [ 424.584607] ksys_mount+0xdb/0x150 [ 424.584625] __x64_sys_mount+0xbe/0x150 [ 424.584649] do_syscall_64+0x103/0x610 [ 424.592686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.592700] RIP: 0033:0x45b69a [ 424.592722] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 424.627856] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 424.635623] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a 12:05:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) [ 424.642919] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 424.650199] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 424.657478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 424.664783] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:12 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 424.931646] FAULT_INJECTION: forcing a failure. [ 424.931646] name failslab, interval 1, probability 0, space 0, times 0 [ 424.982384] CPU: 1 PID: 20081 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 424.989362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.998737] Call Trace: [ 425.001351] dump_stack+0x172/0x1f0 [ 425.005008] should_fail.cold+0xa/0x1b [ 425.008920] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 425.014049] ? lock_downgrade+0x810/0x810 [ 425.018216] ? ___might_sleep+0x163/0x280 [ 425.022385] __should_failslab+0x121/0x190 [ 425.026637] should_failslab+0x9/0x14 [ 425.030453] kmem_cache_alloc_node_trace+0x277/0x720 [ 425.035570] ? kmem_cache_alloc_trace+0x34b/0x760 [ 425.040430] ? kasan_unpoison_shadow+0x35/0x50 [ 425.045037] __kmalloc_node+0x3d/0x80 [ 425.048855] kvmalloc_node+0x68/0x100 [ 425.052683] __list_lru_init+0x4aa/0x6e0 [ 425.056766] sget_userns+0x81e/0xd30 [ 425.060494] ? kill_litter_super+0x60/0x60 [ 425.065011] ? ns_test_super+0x50/0x50 [ 425.068911] ? ns_test_super+0x50/0x50 [ 425.072816] ? kill_litter_super+0x60/0x60 [ 425.077417] sget+0x10c/0x150 [ 425.080543] mount_bdev+0xff/0x3c0 [ 425.084097] ? finish_unfinished+0x1120/0x1120 [ 425.088695] get_super_block+0x35/0x40 [ 425.092598] mount_fs+0xae/0x331 [ 425.095985] vfs_kern_mount.part.0+0x6f/0x410 [ 425.100511] do_mount+0x53e/0x2bc0 [ 425.104079] ? copy_mount_string+0x40/0x40 [ 425.108369] ? _copy_from_user+0xdd/0x150 [ 425.112541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.118096] ? copy_mount_options+0x280/0x3a0 [ 425.122610] ksys_mount+0xdb/0x150 [ 425.126167] __x64_sys_mount+0xbe/0x150 12:05:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 425.130166] do_syscall_64+0x103/0x610 [ 425.134073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.139273] RIP: 0033:0x45b69a [ 425.142473] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 425.161385] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 425.169113] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a 12:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 425.176403] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 425.183696] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 425.190991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 425.198357] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:12 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:12 executing program 1 (fault-call:2 fault-nth:0): rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 425.394727] FAULT_INJECTION: forcing a failure. [ 425.394727] name failslab, interval 1, probability 0, space 0, times 0 [ 425.455198] CPU: 0 PID: 20105 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 425.462182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.472537] Call Trace: [ 425.472588] dump_stack+0x172/0x1f0 [ 425.472618] should_fail.cold+0xa/0x1b [ 425.472642] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 425.472667] ? lock_downgrade+0x810/0x810 [ 425.472684] ? ___might_sleep+0x163/0x280 [ 425.472711] __should_failslab+0x121/0x190 [ 425.472740] should_failslab+0x9/0x14 [ 425.492477] kmem_cache_alloc_trace+0x2cf/0x760 [ 425.492495] ? kasan_unpoison_shadow+0x35/0x50 [ 425.492508] ? kasan_kmalloc+0xce/0xf0 [ 425.492527] __memcg_init_list_lru_node+0x8a/0x1e0 [ 425.492544] __list_lru_init+0x3d3/0x6e0 [ 425.492562] sget_userns+0x81e/0xd30 [ 425.492575] ? kill_litter_super+0x60/0x60 [ 425.492590] ? ns_test_super+0x50/0x50 [ 425.492604] ? ns_test_super+0x50/0x50 [ 425.492617] ? kill_litter_super+0x60/0x60 [ 425.492629] sget+0x10c/0x150 [ 425.492645] mount_bdev+0xff/0x3c0 12:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) [ 425.492663] ? finish_unfinished+0x1120/0x1120 [ 425.492684] get_super_block+0x35/0x40 [ 425.504992] mount_fs+0xae/0x331 [ 425.505016] vfs_kern_mount.part.0+0x6f/0x410 [ 425.505036] do_mount+0x53e/0x2bc0 [ 425.505058] ? copy_mount_string+0x40/0x40 [ 425.518355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.518385] ? copy_mount_options+0x280/0x3a0 [ 425.518403] ksys_mount+0xdb/0x150 [ 425.518423] __x64_sys_mount+0xbe/0x150 [ 425.518444] do_syscall_64+0x103/0x610 [ 425.518471] entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\xff'}}, 0x32) [ 425.600565] RIP: 0033:0x45b69a [ 425.600586] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 425.600592] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 425.600605] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 425.600613] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 425.600619] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 425.600626] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 425.600634] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:13 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x2) 12:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\xff'}}, 0x32) 12:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) [ 426.004800] FAULT_INJECTION: forcing a failure. [ 426.004800] name failslab, interval 1, probability 0, space 0, times 0 [ 426.022283] CPU: 0 PID: 20150 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 426.029257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.038615] Call Trace: [ 426.041222] dump_stack+0x172/0x1f0 [ 426.044897] should_fail.cold+0xa/0x1b [ 426.048798] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 426.053940] ? lock_downgrade+0x810/0x810 [ 426.053958] ? ___might_sleep+0x163/0x280 [ 426.053981] __should_failslab+0x121/0x190 [ 426.054000] should_failslab+0x9/0x14 [ 426.070328] kmem_cache_alloc_trace+0x2cf/0x760 [ 426.075027] ? kasan_unpoison_shadow+0x35/0x50 [ 426.079655] ? kasan_kmalloc+0xce/0xf0 [ 426.083608] __memcg_init_list_lru_node+0x8a/0x1e0 [ 426.088562] __list_lru_init+0x3d3/0x6e0 [ 426.092650] sget_userns+0x81e/0xd30 [ 426.096384] ? kill_litter_super+0x60/0x60 [ 426.100643] ? ns_test_super+0x50/0x50 12:05:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) [ 426.104540] ? ns_test_super+0x50/0x50 [ 426.108527] ? kill_litter_super+0x60/0x60 [ 426.112779] sget+0x10c/0x150 [ 426.115919] mount_bdev+0xff/0x3c0 [ 426.119478] ? finish_unfinished+0x1120/0x1120 [ 426.124170] get_super_block+0x35/0x40 [ 426.128093] mount_fs+0xae/0x331 [ 426.131495] vfs_kern_mount.part.0+0x6f/0x410 [ 426.136012] do_mount+0x53e/0x2bc0 [ 426.139579] ? copy_mount_string+0x40/0x40 [ 426.143844] ? _copy_from_user+0xdd/0x150 [ 426.148014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 426.153568] ? copy_mount_options+0x280/0x3a0 [ 426.158079] ksys_mount+0xdb/0x150 [ 426.161651] __x64_sys_mount+0xbe/0x150 [ 426.165643] do_syscall_64+0x103/0x610 [ 426.169550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.174788] RIP: 0033:0x45b69a [ 426.178145] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 426.197230] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:05:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) [ 426.204958] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 426.212238] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 426.219520] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 426.226803] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 426.234083] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:13 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\xbf'}}, 0x32) 12:05:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x5) 12:05:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\xfb'}}, 0x32) [ 426.478563] FAULT_INJECTION: forcing a failure. [ 426.478563] name failslab, interval 1, probability 0, space 0, times 0 [ 426.525212] CPU: 1 PID: 20192 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 426.532207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.541572] Call Trace: [ 426.541603] dump_stack+0x172/0x1f0 [ 426.541630] should_fail.cold+0xa/0x1b [ 426.541654] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 426.541676] ? lock_downgrade+0x810/0x810 [ 426.541697] ? ___might_sleep+0x163/0x280 [ 426.556906] __should_failslab+0x121/0x190 [ 426.556927] should_failslab+0x9/0x14 [ 426.556948] kmem_cache_alloc_node_trace+0x277/0x720 [ 426.578917] ? kmem_cache_alloc_trace+0x34b/0x760 [ 426.583787] __kmalloc_node+0x3d/0x80 [ 426.587608] kvmalloc_node+0x68/0x100 [ 426.591435] __list_lru_init+0x4aa/0x6e0 [ 426.595537] sget_userns+0x81e/0xd30 [ 426.599283] ? kill_litter_super+0x60/0x60 [ 426.603541] ? ns_test_super+0x50/0x50 [ 426.607450] ? ns_test_super+0x50/0x50 [ 426.611355] ? kill_litter_super+0x60/0x60 [ 426.615607] sget+0x10c/0x150 [ 426.618732] mount_bdev+0xff/0x3c0 [ 426.622319] ? finish_unfinished+0x1120/0x1120 [ 426.626948] get_super_block+0x35/0x40 [ 426.630856] mount_fs+0xae/0x331 [ 426.634249] vfs_kern_mount.part.0+0x6f/0x410 [ 426.638852] do_mount+0x53e/0x2bc0 [ 426.642423] ? copy_mount_string+0x40/0x40 [ 426.646711] ? copy_mount_options+0x1fb/0x3a0 [ 426.646734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.646752] ? copy_mount_options+0x280/0x3a0 [ 426.656805] ksys_mount+0xdb/0x150 [ 426.656832] __x64_sys_mount+0xbe/0x150 [ 426.668913] do_syscall_64+0x103/0x610 [ 426.672870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.678107] RIP: 0033:0x45b69a [ 426.681339] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 426.700292] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 426.708032] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 426.715339] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:14 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x223) 12:05:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) [ 426.722658] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 426.730060] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 426.737369] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:14 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:14 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x300) 12:05:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 427.096313] FAULT_INJECTION: forcing a failure. [ 427.096313] name failslab, interval 1, probability 0, space 0, times 0 [ 427.116021] CPU: 1 PID: 20229 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 427.122998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.132367] Call Trace: [ 427.132394] dump_stack+0x172/0x1f0 [ 427.132421] should_fail.cold+0xa/0x1b [ 427.132445] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 427.132471] ? lock_downgrade+0x810/0x810 [ 427.151850] ? ___might_sleep+0x163/0x280 [ 427.156053] __should_failslab+0x121/0x190 [ 427.160320] should_failslab+0x9/0x14 [ 427.164156] kmem_cache_alloc_trace+0x2cf/0x760 [ 427.168860] ? kasan_unpoison_shadow+0x35/0x50 [ 427.173481] ? kasan_kmalloc+0xce/0xf0 [ 427.173507] __memcg_init_list_lru_node+0x8a/0x1e0 [ 427.173531] __list_lru_init+0x3d3/0x6e0 [ 427.182370] sget_userns+0x81e/0xd30 [ 427.182387] ? kill_litter_super+0x60/0x60 [ 427.182405] ? ns_test_super+0x50/0x50 [ 427.182419] ? ns_test_super+0x50/0x50 [ 427.182431] ? kill_litter_super+0x60/0x60 [ 427.182445] sget+0x10c/0x150 [ 427.182463] mount_bdev+0xff/0x3c0 [ 427.182479] ? finish_unfinished+0x1120/0x1120 [ 427.182498] get_super_block+0x35/0x40 [ 427.190284] mount_fs+0xae/0x331 [ 427.190321] vfs_kern_mount.part.0+0x6f/0x410 [ 427.190361] do_mount+0x53e/0x2bc0 [ 427.233174] ? copy_mount_string+0x40/0x40 [ 427.237449] ? _copy_from_user+0xdd/0x150 [ 427.241618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.247173] ? copy_mount_options+0x280/0x3a0 [ 427.251701] ksys_mount+0xdb/0x150 [ 427.255268] __x64_sys_mount+0xbe/0x150 [ 427.259279] do_syscall_64+0x103/0x610 [ 427.263198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.268406] RIP: 0033:0x45b69a [ 427.271613] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 12:05:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:14 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x301) [ 427.290541] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 427.298283] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 427.305588] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 427.312887] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 427.320186] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 427.320195] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:14 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:14 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x20000bc1) 12:05:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:15 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x1, 0xffffffffa909e71e) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="008c887295dc475737ecc577508b8375acf2c561885f06a3efc3a5cf6ef4448dc87bc3b4441b7adc860efe037f23a0f198d5499155eca30f6742bb52921f1a589ff91b240a6f0bdc4fb65e48f806825e8cd8c810b57c48058dbf1aed26364c2c04af693839fc4792e87daaf29f5b4cd7c80c4b7a2f69137be3fc6c60ee5c07cf05fdc6b737415118102af931670c32e8bef11b050e381783b52b32f73ac3ab34467f93d067d4b35075be9d31dea351d212cc120e"], 0x1) [ 427.644760] FAULT_INJECTION: forcing a failure. [ 427.644760] name failslab, interval 1, probability 0, space 0, times 0 [ 427.699966] CPU: 1 PID: 20266 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 427.706971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.716363] Call Trace: [ 427.718991] dump_stack+0x172/0x1f0 [ 427.719017] should_fail.cold+0xa/0x1b [ 427.719037] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 427.719057] ? lock_downgrade+0x810/0x810 [ 427.719076] ? ___might_sleep+0x163/0x280 [ 427.719103] __should_failslab+0x121/0x190 [ 427.726680] should_failslab+0x9/0x14 [ 427.740130] kmem_cache_alloc_trace+0x2cf/0x760 [ 427.748237] ? kasan_unpoison_shadow+0x35/0x50 [ 427.757546] ? kasan_kmalloc+0xce/0xf0 [ 427.761488] __memcg_init_list_lru_node+0x8a/0x1e0 [ 427.766472] __list_lru_init+0x3d3/0x6e0 [ 427.770587] sget_userns+0x81e/0xd30 [ 427.774351] ? kill_litter_super+0x60/0x60 [ 427.778638] ? ns_test_super+0x50/0x50 [ 427.782575] ? ns_test_super+0x50/0x50 [ 427.786500] ? kill_litter_super+0x60/0x60 [ 427.790777] sget+0x10c/0x150 [ 427.793944] mount_bdev+0xff/0x3c0 [ 427.797525] ? finish_unfinished+0x1120/0x1120 [ 427.802160] get_super_block+0x35/0x40 [ 427.806120] mount_fs+0xae/0x331 [ 427.809663] vfs_kern_mount.part.0+0x6f/0x410 [ 427.814208] do_mount+0x53e/0x2bc0 [ 427.817790] ? copy_mount_string+0x40/0x40 [ 427.822074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.827653] ? copy_mount_options+0x280/0x3a0 [ 427.832195] ksys_mount+0xdb/0x150 [ 427.835787] __x64_sys_mount+0xbe/0x150 [ 427.839815] do_syscall_64+0x103/0x610 [ 427.843748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.848969] RIP: 0033:0x45b69a [ 427.852188] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 427.871120] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 427.871138] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 427.871146] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 427.871154] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 427.871161] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 427.871169] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:15 executing program 3 (fault-call:0 fault-nth:67): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:15 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0xa8cba3da3f4abab0) r0 = socket$caif_stream(0x25, 0x1, 0x4) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) write$selinux_validatetrans(r1, &(0x7f00000000c0)={'system_u:object_r:net_conf_t:s0', 0x20, 'system_u:object_r:getty_log_t:s0', 0x20, 0x8, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x6d) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x2, {0xffffffff, 0x6, 0x8, 0x5}}) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 428.229742] FAULT_INJECTION: forcing a failure. [ 428.229742] name failslab, interval 1, probability 0, space 0, times 0 [ 428.241179] CPU: 1 PID: 20297 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 428.248145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.257532] Call Trace: [ 428.260165] dump_stack+0x172/0x1f0 [ 428.263849] should_fail.cold+0xa/0x1b [ 428.267816] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 428.272982] ? lock_downgrade+0x810/0x810 12:05:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 428.277188] ? ___might_sleep+0x163/0x280 [ 428.277211] __should_failslab+0x121/0x190 [ 428.277231] should_failslab+0x9/0x14 [ 428.277245] kmem_cache_alloc_trace+0x2cf/0x760 [ 428.277267] ? kasan_unpoison_shadow+0x35/0x50 [ 428.298896] ? kasan_kmalloc+0xce/0xf0 [ 428.302840] __memcg_init_list_lru_node+0x8a/0x1e0 [ 428.307859] __list_lru_init+0x3d3/0x6e0 [ 428.312005] sget_userns+0x81e/0xd30 [ 428.315778] ? kill_litter_super+0x60/0x60 [ 428.315797] ? ns_test_super+0x50/0x50 [ 428.315811] ? ns_test_super+0x50/0x50 [ 428.315825] ? kill_litter_super+0x60/0x60 [ 428.315840] sget+0x10c/0x150 [ 428.315858] mount_bdev+0xff/0x3c0 [ 428.315893] ? finish_unfinished+0x1120/0x1120 [ 428.315913] get_super_block+0x35/0x40 [ 428.347425] mount_fs+0xae/0x331 [ 428.347448] vfs_kern_mount.part.0+0x6f/0x410 [ 428.347470] do_mount+0x53e/0x2bc0 [ 428.347492] ? copy_mount_string+0x40/0x40 [ 428.347512] ? _copy_from_user+0xdd/0x150 [ 428.347534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.347553] ? copy_mount_options+0x280/0x3a0 [ 428.368645] ksys_mount+0xdb/0x150 [ 428.368666] __x64_sys_mount+0xbe/0x150 [ 428.368691] do_syscall_64+0x103/0x610 [ 428.368716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.368729] RIP: 0033:0x45b69a [ 428.368750] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 428.417692] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:05:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 428.417710] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 428.417718] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 428.417726] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 428.417733] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 428.417741] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:15 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:15 executing program 1: rt_sigprocmask(0x3, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x9, 0x40000) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x10, 0x1000, 0xffff, 0x4, 0x1, r1, 0x2480, [], r2, r0, 0x3, 0x2}, 0x3c) 12:05:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:16 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x6, 0x200) iopl(0x8) bind$tipc(r0, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x3, 0x4}}, 0xfffffffffffffeba) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1b"], 0x1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000080)={0x2ca90443, 0x56, "7a148cb054a8b90e4940441358e040177d6951f8cf88ca9dce2eb285b139199a166a0b432f10d76479243246deb271a5945944e60dac8d82f7d1026978db156bbe4a6809c8393960c7ac71937525b8bda9bdb172c8ef"}) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000100)="f383ff5a1b8ee41788dc223e2e3f64eb3aaef20aedcfedebf752dcea9f2fcc08fb0e55985387b3367c3ec472d31b64fcfe4e60bb76d64c151b0566feb6acdc612cab3ed5df39f00f931fa430ea92cf580a0eaf0d8cb6233c05cafd2dee8d58772377b61fe6d6d1750303690a6e") 12:05:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 428.749161] FAULT_INJECTION: forcing a failure. [ 428.749161] name failslab, interval 1, probability 0, space 0, times 0 [ 428.792235] CPU: 1 PID: 20327 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 428.799251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.808644] Call Trace: [ 428.811282] dump_stack+0x172/0x1f0 [ 428.814972] should_fail.cold+0xa/0x1b [ 428.818943] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 428.824111] ? lock_downgrade+0x810/0x810 [ 428.828312] ? ___might_sleep+0x163/0x280 [ 428.832510] __should_failslab+0x121/0x190 [ 428.836805] should_failslab+0x9/0x14 [ 428.840652] kmem_cache_alloc_trace+0x2cf/0x760 [ 428.845365] ? kasan_unpoison_shadow+0x35/0x50 [ 428.850002] ? kasan_kmalloc+0xce/0xf0 [ 428.853959] __memcg_init_list_lru_node+0x8a/0x1e0 [ 428.858957] __list_lru_init+0x3d3/0x6e0 [ 428.863072] sget_userns+0x81e/0xd30 [ 428.866833] ? kill_litter_super+0x60/0x60 [ 428.871162] ? ns_test_super+0x50/0x50 [ 428.875102] ? ns_test_super+0x50/0x50 [ 428.879030] ? kill_litter_super+0x60/0x60 [ 428.883316] sget+0x10c/0x150 [ 428.886474] mount_bdev+0xff/0x3c0 [ 428.890088] ? finish_unfinished+0x1120/0x1120 [ 428.894725] get_super_block+0x35/0x40 [ 428.898683] mount_fs+0xae/0x331 [ 428.902109] vfs_kern_mount.part.0+0x6f/0x410 [ 428.906669] do_mount+0x53e/0x2bc0 [ 428.910269] ? copy_mount_string+0x40/0x40 [ 428.914569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.920159] ? copy_mount_options+0x280/0x3a0 [ 428.924702] ksys_mount+0xdb/0x150 [ 428.928316] __x64_sys_mount+0xbe/0x150 [ 428.932347] do_syscall_64+0x103/0x610 [ 428.936309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.941542] RIP: 0033:0x45b69a [ 428.944781] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 428.963725] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 428.971615] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 428.978938] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 428.986242] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 428.993590] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 429.000913] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:16 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:16 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000080)={0xfffffffffffffffc}, 0x0, 0x8) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x8000) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x200, @ipv4={[], [], @broadcast}, 0x7}}, 0x24) r1 = socket$caif_stream(0x25, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0x0, 0x8, {0x3, 0x1, 0x200, 0x0, 0x6, 0xd8, {0x3, 0x100000001, 0x4, 0x10001, 0x2, 0x8, 0xf6a, 0x0, 0x8, 0x8, 0x7, r2, r3, 0x2, 0xb379}}}, 0x90) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) 12:05:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 429.323493] FAULT_INJECTION: forcing a failure. [ 429.323493] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.335403] CPU: 1 PID: 20366 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 429.342373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.351852] Call Trace: [ 429.354504] dump_stack+0x172/0x1f0 [ 429.358183] should_fail.cold+0xa/0x1b [ 429.358208] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 429.358236] ? mark_held_locks+0x100/0x100 [ 429.358262] ? __list_lru_init+0x4aa/0x6e0 [ 429.375800] ? sget_userns+0x81e/0xd30 [ 429.379733] __alloc_pages_nodemask+0x1ee/0x760 [ 429.384462] ? do_syscall_64+0x103/0x610 [ 429.388584] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.394028] ? __alloc_pages_slowpath+0x2870/0x2870 [ 429.399106] cache_grow_begin+0x9c/0x8c0 [ 429.403222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 429.408812] ? check_preemption_disabled+0x48/0x290 [ 429.413898] kmem_cache_alloc_trace+0x688/0x760 [ 429.418631] ? kasan_unpoison_shadow+0x35/0x50 [ 429.423375] __memcg_init_list_lru_node+0x8a/0x1e0 [ 429.428387] __list_lru_init+0x3d3/0x6e0 [ 429.432526] sget_userns+0x81e/0xd30 [ 429.436318] ? kill_litter_super+0x60/0x60 [ 429.440631] ? ns_test_super+0x50/0x50 [ 429.444598] ? ns_test_super+0x50/0x50 [ 429.448545] ? kill_litter_super+0x60/0x60 [ 429.452854] sget+0x10c/0x150 [ 429.456042] mount_bdev+0xff/0x3c0 [ 429.459643] ? finish_unfinished+0x1120/0x1120 [ 429.466768] get_super_block+0x35/0x40 [ 429.470721] mount_fs+0xae/0x331 [ 429.474163] vfs_kern_mount.part.0+0x6f/0x410 [ 429.478719] do_mount+0x53e/0x2bc0 [ 429.482349] ? copy_mount_string+0x40/0x40 [ 429.486694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.492298] ? copy_mount_options+0x280/0x3a0 [ 429.496871] ksys_mount+0xdb/0x150 [ 429.500472] __x64_sys_mount+0xbe/0x150 [ 429.504524] do_syscall_64+0x103/0x610 [ 429.508482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.513750] RIP: 0033:0x45b69a [ 429.517002] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 429.536255] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 429.544020] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 429.551329] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 429.558641] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 429.565985] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:05:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:16 executing program 1: rt_sigprocmask(0x200, &(0x7f0000000000)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB='#'], 0x1) [ 429.574185] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 429.680913] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 12:05:17 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:17 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x20800, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 429.928324] FAULT_INJECTION: forcing a failure. [ 429.928324] name failslab, interval 1, probability 0, space 0, times 0 [ 429.992887] CPU: 0 PID: 20399 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 429.999978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.009409] Call Trace: [ 430.012079] dump_stack+0x172/0x1f0 [ 430.015810] should_fail.cold+0xa/0x1b [ 430.019792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 430.024990] ? lock_downgrade+0x810/0x810 [ 430.029224] ? ___might_sleep+0x163/0x280 [ 430.033463] __should_failslab+0x121/0x190 [ 430.037774] should_failslab+0x9/0x14 [ 430.041659] kmem_cache_alloc_trace+0x2cf/0x760 [ 430.046404] ? kasan_unpoison_shadow+0x35/0x50 [ 430.051083] ? kasan_kmalloc+0xce/0xf0 [ 430.055048] __memcg_init_list_lru_node+0x8a/0x1e0 [ 430.055081] __list_lru_init+0x3d3/0x6e0 [ 430.064208] sget_userns+0x81e/0xd30 [ 430.067993] ? kill_litter_super+0x60/0x60 [ 430.072301] ? ns_test_super+0x50/0x50 [ 430.076260] ? ns_test_super+0x50/0x50 [ 430.080218] ? kill_litter_super+0x60/0x60 [ 430.084521] sget+0x10c/0x150 [ 430.087700] mount_bdev+0xff/0x3c0 [ 430.091304] ? finish_unfinished+0x1120/0x1120 [ 430.096129] get_super_block+0x35/0x40 [ 430.100087] mount_fs+0xae/0x331 [ 430.103527] vfs_kern_mount.part.0+0x6f/0x410 [ 430.108075] do_mount+0x53e/0x2bc0 [ 430.111679] ? copy_mount_string+0x40/0x40 [ 430.115983] ? _copy_from_user+0xdd/0x150 [ 430.120192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.125794] ? copy_mount_options+0x280/0x3a0 [ 430.130359] ksys_mount+0xdb/0x150 [ 430.133970] __x64_sys_mount+0xbe/0x150 [ 430.138001] do_syscall_64+0x103/0x610 [ 430.141952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.147224] RIP: 0033:0x45b69a [ 430.147246] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 430.147253] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 430.147267] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 430.147275] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x2}}, 0x32) 12:05:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 430.147283] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 430.147290] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 430.147306] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:17 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x10001, 0x109000) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x9, 0x44495658, 0x1, @stepwise={0x80000000, 0x4, 0x1, 0x0, 0xbae4, 0xf307}}) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000000c0)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x1) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:17 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x4}}, 0x32) 12:05:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:17 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') signalfd(r0, &(0x7f0000000080)={0x3}, 0x8) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 430.444237] FAULT_INJECTION: forcing a failure. [ 430.444237] name failslab, interval 1, probability 0, space 0, times 0 12:05:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 430.514377] CPU: 0 PID: 20434 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 430.521411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.530806] Call Trace: [ 430.533441] dump_stack+0x172/0x1f0 [ 430.537139] should_fail.cold+0xa/0x1b [ 430.541075] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 430.546229] ? lock_downgrade+0x810/0x810 [ 430.550433] ? ___might_sleep+0x163/0x280 [ 430.554649] __should_failslab+0x121/0x190 [ 430.558940] should_failslab+0x9/0x14 [ 430.562809] kmem_cache_alloc_trace+0x2cf/0x760 [ 430.567539] ? kasan_unpoison_shadow+0x35/0x50 [ 430.572177] ? kasan_kmalloc+0xce/0xf0 [ 430.576147] __memcg_init_list_lru_node+0x8a/0x1e0 [ 430.581141] __list_lru_init+0x3d3/0x6e0 [ 430.585257] sget_userns+0x81e/0xd30 [ 430.589021] ? kill_litter_super+0x60/0x60 [ 430.593316] ? ns_test_super+0x50/0x50 [ 430.597260] ? ns_test_super+0x50/0x50 [ 430.601208] ? kill_litter_super+0x60/0x60 [ 430.605580] sget+0x10c/0x150 [ 430.608735] mount_bdev+0xff/0x3c0 [ 430.612325] ? finish_unfinished+0x1120/0x1120 [ 430.616968] get_super_block+0x35/0x40 [ 430.620923] mount_fs+0xae/0x331 [ 430.624371] vfs_kern_mount.part.0+0x6f/0x410 [ 430.628937] do_mount+0x53e/0x2bc0 [ 430.632531] ? copy_mount_string+0x40/0x40 [ 430.636813] ? _copy_from_user+0xdd/0x150 [ 430.641019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.646608] ? copy_mount_options+0x280/0x3a0 [ 430.651152] ksys_mount+0xdb/0x150 [ 430.654757] __x64_sys_mount+0xbe/0x150 [ 430.658779] do_syscall_64+0x103/0x610 12:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 430.662727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.668315] RIP: 0033:0x45b69a [ 430.671550] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 430.671560] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 430.671575] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 430.671582] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x5}}, 0x32) 12:05:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:18 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x1) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 430.671590] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 430.671597] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 430.671605] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:18 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x8}}, 0x32) 12:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 430.959913] FAULT_INJECTION: forcing a failure. [ 430.959913] name failslab, interval 1, probability 0, space 0, times 0 [ 430.972037] CPU: 0 PID: 20468 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 430.979019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.988586] Call Trace: [ 430.991243] dump_stack+0x172/0x1f0 [ 430.995020] should_fail.cold+0xa/0x1b [ 430.998970] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 431.004125] ? lock_downgrade+0x810/0x810 [ 431.008332] ? ___might_sleep+0x163/0x280 [ 431.012556] __should_failslab+0x121/0x190 [ 431.016843] should_failslab+0x9/0x14 [ 431.020716] __kmalloc+0x2e5/0x750 [ 431.024315] ? __list_lru_init+0xd5/0x6e0 [ 431.028525] __list_lru_init+0xd5/0x6e0 [ 431.032563] sget_userns+0x84d/0xd30 [ 431.036380] ? kill_litter_super+0x60/0x60 [ 431.040667] ? ns_test_super+0x50/0x50 [ 431.044603] ? ns_test_super+0x50/0x50 [ 431.048539] ? kill_litter_super+0x60/0x60 [ 431.052819] sget+0x10c/0x150 [ 431.055989] mount_bdev+0xff/0x3c0 [ 431.059565] ? finish_unfinished+0x1120/0x1120 [ 431.059588] get_super_block+0x35/0x40 [ 431.059609] mount_fs+0xae/0x331 [ 431.059630] vfs_kern_mount.part.0+0x6f/0x410 [ 431.059650] do_mount+0x53e/0x2bc0 [ 431.059678] ? copy_mount_string+0x40/0x40 [ 431.068202] ? _copy_from_user+0xdd/0x150 [ 431.088106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.093693] ? copy_mount_options+0x280/0x3a0 [ 431.098359] ksys_mount+0xdb/0x150 [ 431.101954] __x64_sys_mount+0xbe/0x150 [ 431.105980] do_syscall_64+0x103/0x610 12:05:18 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0x6}, 0x0, 0xffffffffffffff9b) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7fbab837823bb5b02852e7b7744a6ce2be92d9b016c76015"], 0x1) 12:05:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x9}}, 0x32) [ 431.110020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.115246] RIP: 0033:0x45b69a [ 431.118472] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 431.137412] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 431.137430] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 431.137438] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) [ 431.137445] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 431.137452] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 431.137459] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xd}}, 0x32) 12:05:18 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:18 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0xff) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) socket$xdp(0x2c, 0x3, 0x0) 12:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) [ 431.391854] FAULT_INJECTION: forcing a failure. [ 431.391854] name failslab, interval 1, probability 0, space 0, times 0 [ 431.478997] CPU: 0 PID: 20494 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 431.486022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.495415] Call Trace: [ 431.498049] dump_stack+0x172/0x1f0 [ 431.501736] should_fail.cold+0xa/0x1b [ 431.505698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 431.510865] ? lock_downgrade+0x810/0x810 [ 431.515161] ? ___might_sleep+0x163/0x280 [ 431.519381] __should_failslab+0x121/0x190 [ 431.523680] should_failslab+0x9/0x14 [ 431.527528] kmem_cache_alloc_trace+0x2cf/0x760 [ 431.532277] ? kasan_unpoison_shadow+0x35/0x50 [ 431.536907] ? kasan_kmalloc+0xce/0xf0 [ 431.540866] __memcg_init_list_lru_node+0x8a/0x1e0 [ 431.545885] __list_lru_init+0x3d3/0x6e0 [ 431.550000] sget_userns+0x81e/0xd30 [ 431.553767] ? kill_litter_super+0x60/0x60 [ 431.558052] ? ns_test_super+0x50/0x50 [ 431.561998] ? ns_test_super+0x50/0x50 [ 431.565931] ? kill_litter_super+0x60/0x60 [ 431.570216] sget+0x10c/0x150 [ 431.573387] mount_bdev+0xff/0x3c0 [ 431.576982] ? finish_unfinished+0x1120/0x1120 [ 431.581620] get_super_block+0x35/0x40 [ 431.585563] mount_fs+0xae/0x331 [ 431.588986] vfs_kern_mount.part.0+0x6f/0x410 [ 431.593542] do_mount+0x53e/0x2bc0 [ 431.597136] ? copy_mount_string+0x40/0x40 [ 431.601425] ? _copy_from_user+0xdd/0x150 [ 431.605625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.611218] ? copy_mount_options+0x280/0x3a0 [ 431.615775] ksys_mount+0xdb/0x150 [ 431.619372] __x64_sys_mount+0xbe/0x150 [ 431.623409] do_syscall_64+0x103/0x610 [ 431.627356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.632637] RIP: 0033:0x45b69a [ 431.635874] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 431.654809] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 431.662572] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 431.669881] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xc6}}, 0x32) 12:05:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 431.677193] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 431.684499] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 431.691809] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:19 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000080)=""/133, &(0x7f0000000140)=0x85) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB='\x00'], 0x1) 12:05:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x500}}, 0x32) 12:05:19 executing program 3 (fault-call:0 fault-nth:74): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:19 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast2, @initdev}, &(0x7f0000000080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', r1}) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x900}}, 0x32) 12:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 431.990939] FAULT_INJECTION: forcing a failure. [ 431.990939] name failslab, interval 1, probability 0, space 0, times 0 [ 432.065549] CPU: 1 PID: 20534 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 432.072574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.081963] Call Trace: [ 432.084599] dump_stack+0x172/0x1f0 [ 432.088280] should_fail.cold+0xa/0x1b [ 432.088305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 432.097442] ? lock_downgrade+0x810/0x810 [ 432.101645] ? ___might_sleep+0x163/0x280 [ 432.105853] __should_failslab+0x121/0x190 [ 432.110162] should_failslab+0x9/0x14 [ 432.110179] kmem_cache_alloc_node_trace+0x277/0x720 [ 432.110201] __kmalloc_node+0x3d/0x80 [ 432.110218] kvmalloc_node+0x68/0x100 [ 432.110237] __list_lru_init+0x4aa/0x6e0 [ 432.110259] sget_userns+0x84d/0xd30 [ 432.110273] ? kill_litter_super+0x60/0x60 [ 432.110293] ? ns_test_super+0x50/0x50 [ 432.143451] ? ns_test_super+0x50/0x50 [ 432.147392] ? kill_litter_super+0x60/0x60 [ 432.151677] sget+0x10c/0x150 [ 432.154843] mount_bdev+0xff/0x3c0 [ 432.158447] ? finish_unfinished+0x1120/0x1120 [ 432.163086] get_super_block+0x35/0x40 [ 432.167033] mount_fs+0xae/0x331 [ 432.170457] vfs_kern_mount.part.0+0x6f/0x410 [ 432.175020] do_mount+0x53e/0x2bc0 [ 432.178620] ? copy_mount_string+0x40/0x40 [ 432.182918] ? _copy_from_user+0xdd/0x150 [ 432.187137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.192724] ? copy_mount_options+0x280/0x3a0 [ 432.197271] ksys_mount+0xdb/0x150 [ 432.200861] __x64_sys_mount+0xbe/0x150 [ 432.204919] do_syscall_64+0x103/0x610 [ 432.208858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.214109] RIP: 0033:0x45b69a [ 432.217339] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 432.236448] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 432.244197] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 432.251503] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 432.258804] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xd00}}, 0x32) 12:05:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:19 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f000082ef0a)=""/246) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 432.266106] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 432.273416] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:19 executing program 3 (fault-call:0 fault-nth:75): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x2000}}, 0x32) 12:05:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:19 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x400) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000080)=0x1, 0x4) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@l2={0x1f, 0x3ff, {0xffff, 0x0, 0x0, 0x7fffffff, 0x3, 0x5}, 0x7, 0x26f8000000000}, {&(0x7f00000000c0)=""/174, 0xae}, &(0x7f0000000180), 0x10}, 0xa0) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xc600}}, 0x32) [ 432.541948] FAULT_INJECTION: forcing a failure. [ 432.541948] name failslab, interval 1, probability 0, space 0, times 0 [ 432.627547] CPU: 1 PID: 20571 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 432.634578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.643978] Call Trace: [ 432.646628] dump_stack+0x172/0x1f0 [ 432.650317] should_fail.cold+0xa/0x1b [ 432.654262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 432.659425] ? lock_downgrade+0x810/0x810 [ 432.663629] ? ___might_sleep+0x163/0x280 [ 432.667840] __should_failslab+0x121/0x190 [ 432.672141] should_failslab+0x9/0x14 [ 432.675992] kmem_cache_alloc_trace+0x2cf/0x760 [ 432.680718] ? kasan_unpoison_shadow+0x35/0x50 [ 432.685367] ? kasan_kmalloc+0xce/0xf0 [ 432.689321] __memcg_init_list_lru_node+0x8a/0x1e0 [ 432.694312] __list_lru_init+0x3d3/0x6e0 [ 432.698429] sget_userns+0x84d/0xd30 [ 432.702187] ? kill_litter_super+0x60/0x60 [ 432.706469] ? ns_test_super+0x50/0x50 [ 432.710398] ? ns_test_super+0x50/0x50 [ 432.714336] ? kill_litter_super+0x60/0x60 [ 432.718615] sget+0x10c/0x150 [ 432.721766] mount_bdev+0xff/0x3c0 [ 432.725339] ? finish_unfinished+0x1120/0x1120 [ 432.729972] get_super_block+0x35/0x40 [ 432.733922] mount_fs+0xae/0x331 [ 432.737328] vfs_kern_mount.part.0+0x6f/0x410 [ 432.741863] do_mount+0x53e/0x2bc0 [ 432.745438] ? copy_mount_string+0x40/0x40 [ 432.749714] ? _copy_from_user+0xdd/0x150 [ 432.753901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.759466] ? copy_mount_options+0x280/0x3a0 [ 432.764011] ksys_mount+0xdb/0x150 [ 432.767570] __x64_sys_mount+0xbe/0x150 [ 432.771575] do_syscall_64+0x103/0x610 [ 432.775494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.780699] RIP: 0033:0x45b69a [ 432.783911] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 432.802838] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 432.810592] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 432.817981] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 432.825283] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 432.832569] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 432.832579] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x20000}}, 0x32) 12:05:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:20 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0xfffffffffffffffc) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$rfkill(r1, &(0x7f0000000080)={0x8, 0x4, 0x3}, 0x8) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:20 executing program 3 (fault-call:0 fault-nth:76): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x200000}}, 0x32) 12:05:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 433.105786] FAULT_INJECTION: forcing a failure. [ 433.105786] name failslab, interval 1, probability 0, space 0, times 0 [ 433.136145] CPU: 0 PID: 20601 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 433.143158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.152542] Call Trace: [ 433.155164] dump_stack+0x172/0x1f0 [ 433.158831] should_fail.cold+0xa/0x1b [ 433.162769] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 433.167925] ? lock_downgrade+0x810/0x810 [ 433.172114] ? ___might_sleep+0x163/0x280 [ 433.176314] __should_failslab+0x121/0x190 [ 433.180590] should_failslab+0x9/0x14 [ 433.184426] kmem_cache_alloc_trace+0x2cf/0x760 [ 433.189137] ? kasan_unpoison_shadow+0x35/0x50 [ 433.193761] ? kasan_kmalloc+0xce/0xf0 [ 433.197692] __memcg_init_list_lru_node+0x8a/0x1e0 [ 433.202674] __list_lru_init+0x3d3/0x6e0 [ 433.206780] sget_userns+0x84d/0xd30 [ 433.210637] ? kill_litter_super+0x60/0x60 [ 433.214919] ? ns_test_super+0x50/0x50 [ 433.218842] ? ns_test_super+0x50/0x50 [ 433.222775] ? kill_litter_super+0x60/0x60 [ 433.227045] sget+0x10c/0x150 [ 433.230181] mount_bdev+0xff/0x3c0 [ 433.233750] ? finish_unfinished+0x1120/0x1120 [ 433.238380] get_super_block+0x35/0x40 [ 433.242304] mount_fs+0xae/0x331 [ 433.245706] vfs_kern_mount.part.0+0x6f/0x410 [ 433.250246] do_mount+0x53e/0x2bc0 [ 433.253817] ? retint_kernel+0x2d/0x2d [ 433.257740] ? copy_mount_string+0x40/0x40 [ 433.262010] ? copy_mount_options+0x208/0x3a0 [ 433.266540] ? write_comp_data+0x9/0x70 [ 433.270557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.276133] ? copy_mount_options+0x280/0x3a0 [ 433.280677] ksys_mount+0xdb/0x150 [ 433.284255] __x64_sys_mount+0xbe/0x150 [ 433.288270] do_syscall_64+0x103/0x610 [ 433.292199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.297422] RIP: 0033:0x45b69a [ 433.300637] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 433.319567] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 433.327315] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 433.334612] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 433.341917] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 433.349218] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:05:20 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000080)=0x64, 0x4) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)=0x871a) 12:05:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 433.357004] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x1000000}}, 0x32) 12:05:20 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[], 0xfffffffffffffff5) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={r2, 0xaf, "1c28ada21c9249f135b64e43ad333b2c02b997cdf97f2e96579cace524e765cc53d29dbfb8f13e47fc3211e5c69acd40d938ebc1b132f8ba6917df05f3b29e48e14592f503f8abe22660749b698363ac0082b1d314b791095c337a84c246bfd7011adb486724f97cb70be824f050d79dfedb6bdea30bc7c3405505936c723d21bab1b283a965304506c9df1d1f54169414a06a533106f8dc963a48c557b7622fbf2aec1ce7322ee08eafb3df3a7c86"}, &(0x7f00000001c0)=0xb7) 12:05:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:20 executing program 3 (fault-call:0 fault-nth:77): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:21 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x2000000}}, 0x32) 12:05:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 433.655072] FAULT_INJECTION: forcing a failure. [ 433.655072] name failslab, interval 1, probability 0, space 0, times 0 [ 433.699019] CPU: 0 PID: 20632 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 433.706038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.715423] Call Trace: [ 433.718048] dump_stack+0x172/0x1f0 [ 433.721722] should_fail.cold+0xa/0x1b [ 433.725651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 433.730799] ? lock_downgrade+0x810/0x810 [ 433.735001] ? ___might_sleep+0x163/0x280 [ 433.739207] __should_failslab+0x121/0x190 [ 433.743495] should_failslab+0x9/0x14 [ 433.747345] kmem_cache_alloc_trace+0x2cf/0x760 [ 433.752066] ? kasan_unpoison_shadow+0x35/0x50 [ 433.756696] ? kasan_kmalloc+0xce/0xf0 [ 433.760641] __memcg_init_list_lru_node+0x8a/0x1e0 [ 433.765631] __list_lru_init+0x3d3/0x6e0 [ 433.769748] sget_userns+0x84d/0xd30 [ 433.773505] ? kill_litter_super+0x60/0x60 [ 433.777786] ? ns_test_super+0x50/0x50 [ 433.781721] ? ns_test_super+0x50/0x50 [ 433.785652] ? kill_litter_super+0x60/0x60 [ 433.789929] sget+0x10c/0x150 [ 433.793083] mount_bdev+0xff/0x3c0 [ 433.796665] ? finish_unfinished+0x1120/0x1120 [ 433.801298] get_super_block+0x35/0x40 [ 433.805229] mount_fs+0xae/0x331 [ 433.808638] vfs_kern_mount.part.0+0x6f/0x410 [ 433.813181] do_mount+0x53e/0x2bc0 [ 433.816764] ? copy_mount_string+0x40/0x40 [ 433.821047] ? _copy_from_user+0xdd/0x150 [ 433.825237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.830817] ? copy_mount_options+0x280/0x3a0 [ 433.835356] ksys_mount+0xdb/0x150 [ 433.838965] __x64_sys_mount+0xbe/0x150 [ 433.842990] do_syscall_64+0x103/0x610 12:05:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) [ 433.846934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.852150] RIP: 0033:0x45b69a [ 433.852167] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 433.852183] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 [ 433.874320] ORIG_RAX: 00000000000000a5 [ 433.874331] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 433.874339] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 433.874346] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 433.874353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 433.874361] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:21 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) io_setup(0xfffffffffffff030, &(0x7f0000000000)=0x0) io_pgetevents(r1, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0xa4}, 0x8}) 12:05:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x4000000}}, 0x32) 12:05:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:21 executing program 3 (fault-call:0 fault-nth:78): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:21 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0df96ac9d8a9dd69eda4413809db8f9b52f5f5752a18b749c23c8983425511a52a457532c31fa722a6bdcd1e91d92571ababd54cd6f6b7d47278a105d832813d678ec907e5746edf90bb1380380ec91d647075339aa4df726ee7e126eea299755baa8d86ab3ae0fe87a5dab21e3d1820346431420050911d61d71cefc03a19913afcf991e91380afc9af65bf298c9be28f0f0497c637b23d52980ebee28a85549070633f5483881e7d9bcbfeadb132b2b5fd50173263dab3a78fccf8dcd24b0056fb9b63de53452b35fa4e25a49253c55a6554857bb9f8"], 0x1) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x800) 12:05:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x5000000}}, 0x32) 12:05:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 434.217357] FAULT_INJECTION: forcing a failure. [ 434.217357] name failslab, interval 1, probability 0, space 0, times 0 [ 434.279045] CPU: 1 PID: 20675 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 434.286042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.295441] Call Trace: [ 434.298075] dump_stack+0x172/0x1f0 [ 434.301745] should_fail.cold+0xa/0x1b [ 434.305680] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 434.310834] ? lock_downgrade+0x810/0x810 [ 434.315033] ? ___might_sleep+0x163/0x280 [ 434.319226] __should_failslab+0x121/0x190 [ 434.323511] should_failslab+0x9/0x14 [ 434.327441] kmem_cache_alloc_trace+0x2cf/0x760 [ 434.332165] ? kasan_unpoison_shadow+0x35/0x50 [ 434.336794] ? kasan_kmalloc+0xce/0xf0 [ 434.340829] __memcg_init_list_lru_node+0x8a/0x1e0 [ 434.345817] __list_lru_init+0x3d3/0x6e0 [ 434.349941] sget_userns+0x84d/0xd30 [ 434.353698] ? kill_litter_super+0x60/0x60 [ 434.359147] ? ns_test_super+0x50/0x50 [ 434.363075] ? ns_test_super+0x50/0x50 [ 434.367005] ? kill_litter_super+0x60/0x60 [ 434.371291] sget+0x10c/0x150 [ 434.374438] mount_bdev+0xff/0x3c0 [ 434.378013] ? finish_unfinished+0x1120/0x1120 [ 434.382648] get_super_block+0x35/0x40 [ 434.386584] mount_fs+0xae/0x331 [ 434.389999] vfs_kern_mount.part.0+0x6f/0x410 [ 434.394541] do_mount+0x53e/0x2bc0 [ 434.398138] ? copy_mount_string+0x40/0x40 [ 434.402412] ? _copy_from_user+0xdd/0x150 [ 434.406611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.412199] ? copy_mount_options+0x280/0x3a0 [ 434.416734] ksys_mount+0xdb/0x150 [ 434.420298] __x64_sys_mount+0xbe/0x150 [ 434.424321] do_syscall_64+0x103/0x610 [ 434.428246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.433437] RIP: 0033:0x45b69a [ 434.436643] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 434.455549] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 434.463831] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 434.471216] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:21 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x2) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 434.478502] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 434.485808] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 434.493115] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x8000000}}, 0x32) 12:05:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:22 executing program 3 (fault-call:0 fault-nth:79): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x9000000}}, 0x32) 12:05:22 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10040, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x3b2b) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="7f499505c735dc1144a696ccbcbe93f5c7e9e90a1aafd01176e94e4c7b77f2bfae7f9a4431b5beb5cb67a6ade6fdafdc8db701afb52e773beb4ef73be8c4af349c18aff6ee01622c79c89a23eb9ad3e54c73f91ede695cb6f31d7801b939585e5c836d5d26fd434f624e8fee81c67dd15d73e78b32988090f30e3d0814baa730686b3ca9ab132379fa1c2a4fefccfb74c1f6ba521519216464f3f512f48a642c34e5031e8c4076ec509b1b9d02cc1baca47fa85518b500ae82bfd67fbdb9cca5c0fcf534463325349d0d4a5aba8a74f46e9c687352137ecd576c60cbf7910bb06a3ecb936a9dc5c33245129c3b6d52a53909967552ec5baba9ff874bad77d6b55eb42fbf52fff4f43e"], 0x1) 12:05:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xd000000}}, 0x32) 12:05:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:22 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101100, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x110802}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x20, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4, 0x58, 0x7fff, {"30039b570a47ce165a6b15fca3a0cd9f45f17db8ce3d82694c053782bd827065ab0841b080f8889b531c068ce35057895c14673ad03a05b389195aa4e1"}}, {0x0, "d8b2a36b9402d9d01acdf1b904707455e9472d9ae589cc07aafb27df1419667528f26e9e371dfd62aad1cfcd27903ff4ba68e111d0010746189d08b347707c90bf3d33d10f4f2c8af9ba3194bb731d6969454151abadee90c77b84ffd3a0d40d8a69e684f5d0d15d965c496ef0b71bc3f06dc4d9b1c4c7cc83abe04aedd719218768531deda49feeb6db6714589d744ba54a0afcf1bbf6af756105983f504e56f3708fba906ef8bfc11df6c8a3b8d7ed8de6150728abb110309c438e8aaf9d4c0a5a7a755b"}}, &(0x7f0000000300)=""/63, 0x11f, 0x3f}, 0x20) pipe(&(0x7f0000000380)) [ 434.963504] FAULT_INJECTION: forcing a failure. [ 434.963504] name failslab, interval 1, probability 0, space 0, times 0 [ 434.975382] CPU: 1 PID: 20719 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 434.982369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.991766] Call Trace: [ 434.994404] dump_stack+0x172/0x1f0 [ 434.998101] should_fail.cold+0xa/0x1b [ 435.002093] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 435.007277] ? lock_downgrade+0x810/0x810 [ 435.011495] ? ___might_sleep+0x163/0x280 [ 435.015692] __should_failslab+0x121/0x190 [ 435.015714] should_failslab+0x9/0x14 [ 435.015735] kmem_cache_alloc_trace+0x2cf/0x760 [ 435.028493] ? kasan_unpoison_shadow+0x35/0x50 [ 435.033128] ? kasan_kmalloc+0xce/0xf0 [ 435.037071] __memcg_init_list_lru_node+0x8a/0x1e0 [ 435.042031] __list_lru_init+0x3d3/0x6e0 [ 435.046246] sget_userns+0x84d/0xd30 [ 435.049991] ? kill_litter_super+0x60/0x60 [ 435.054278] ? ns_test_super+0x50/0x50 [ 435.058212] ? ns_test_super+0x50/0x50 [ 435.062146] ? kill_litter_super+0x60/0x60 [ 435.066426] sget+0x10c/0x150 [ 435.069581] mount_bdev+0xff/0x3c0 [ 435.073162] ? finish_unfinished+0x1120/0x1120 [ 435.077803] get_super_block+0x35/0x40 [ 435.081751] mount_fs+0xae/0x331 [ 435.085169] vfs_kern_mount.part.0+0x6f/0x410 [ 435.090155] do_mount+0x53e/0x2bc0 [ 435.093738] ? copy_mount_string+0x40/0x40 [ 435.098026] ? _copy_from_user+0xdd/0x150 [ 435.102222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.107810] ? copy_mount_options+0x280/0x3a0 [ 435.112357] ksys_mount+0xdb/0x150 [ 435.115948] __x64_sys_mount+0xbe/0x150 [ 435.119975] do_syscall_64+0x103/0x610 [ 435.123934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.129170] RIP: 0033:0x45b69a [ 435.132393] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 435.151452] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 435.159212] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 435.167116] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 435.174422] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 435.181732] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 435.189043] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:22 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x4) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="dec46dc75bede20302923c8f769ac6d42007d226d4d948df590e00000000edad1ab31f8a06b7114490716b53c9a1e25226e883283fc2b391e79ecb9da7c7430ebf4fe66da51a9d0a97ed5c84449a26622d83a8441f74d5c91139e3b65d8e3a68a8c0214e223ff4b02f090fa686aca46a5238ef509bbce6b486981ee59e599d805e8df432ea1caa72f3741f3a5d12f063cb1f4df3e59c71a2fb6c621a8540f164dc65f5fe59b2ccd37fc91ec7f8216f05a25a505c687630d9337dcd41752cf035545f68181b32f41d8e2abb0364f7c3b0bd0854f6712308020f8cf9c13b3d3fefaa20db36fbf92d9a3f"], 0x1) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) ptrace$setopts(0x4206, r2, 0x8000, 0x1) 12:05:22 executing program 3 (fault-call:0 fault-nth:80): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xbfffffff}}, 0x32) 12:05:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:22 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0, 0x80}], 0x1, &(0x7f00000000c0)={r1, r2+30000000}, &(0x7f0000000100)={0xcbd3}, 0x8) prctl$PR_SET_FPEXC(0xc, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x2) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000006c0)={0x0, 0x100000000}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000740)={r4, 0x3}, &(0x7f0000000780)=0x8) execveat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000180)='/selinux/avc/hash_stats\x00', &(0x7f00000001c0)='\\-ppp1-%nodevwlan1\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='/selinux/avc/hash_stats\x00', &(0x7f0000000280)='cpuset{\x00', &(0x7f00000002c0)='*\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)='/selinux/avc/hash_stats\x00', &(0x7f0000000380)='^nodevcpusetposix_acl_access@eth0)\x00', &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', &(0x7f0000000400)='selfbdev):,\x00', &(0x7f0000000440)='/selinux/avc/hash_stats\x00', &(0x7f0000000480)='posix_acl_accesswlan1nodev)\x00'], 0x400) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="ee"], 0x1) 12:05:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xc6000000}}, 0x32) [ 435.473343] FAULT_INJECTION: forcing a failure. [ 435.473343] name failslab, interval 1, probability 0, space 0, times 0 [ 435.529095] CPU: 1 PID: 20751 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 435.536137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.545548] Call Trace: [ 435.548198] dump_stack+0x172/0x1f0 [ 435.551914] should_fail.cold+0xa/0x1b [ 435.555894] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 435.561109] ? lock_downgrade+0x810/0x810 [ 435.565360] ? ___might_sleep+0x163/0x280 [ 435.569577] __should_failslab+0x121/0x190 [ 435.573864] should_failslab+0x9/0x14 [ 435.577744] kmem_cache_alloc_trace+0x2cf/0x760 [ 435.582470] ? kasan_unpoison_shadow+0x35/0x50 [ 435.587114] ? kasan_kmalloc+0xce/0xf0 [ 435.591056] __memcg_init_list_lru_node+0x8a/0x1e0 [ 435.596054] __list_lru_init+0x3d3/0x6e0 [ 435.600175] sget_userns+0x84d/0xd30 [ 435.603955] ? kill_litter_super+0x60/0x60 [ 435.608249] ? ns_test_super+0x50/0x50 [ 435.612192] ? ns_test_super+0x50/0x50 [ 435.616124] ? kill_litter_super+0x60/0x60 [ 435.620410] sget+0x10c/0x150 [ 435.623575] mount_bdev+0xff/0x3c0 [ 435.627168] ? finish_unfinished+0x1120/0x1120 [ 435.631800] get_super_block+0x35/0x40 [ 435.635775] mount_fs+0xae/0x331 [ 435.639196] vfs_kern_mount.part.0+0x6f/0x410 [ 435.643743] do_mount+0x53e/0x2bc0 [ 435.647339] ? copy_mount_string+0x40/0x40 [ 435.651625] ? _copy_from_user+0xdd/0x150 [ 435.655832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.661438] ? copy_mount_options+0x280/0x3a0 [ 435.665988] ksys_mount+0xdb/0x150 [ 435.669579] __x64_sys_mount+0xbe/0x150 [ 435.673600] do_syscall_64+0x103/0x610 12:05:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xfbffffff}}, 0x32) 12:05:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 435.677535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.682771] RIP: 0033:0x45b69a [ 435.686013] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 435.704953] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 435.712997] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 435.720304] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 435.727602] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 435.734915] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 435.742218] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:23 executing program 3 (fault-call:0 fault-nth:81): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:23 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x3) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) r1 = fcntl$dupfd(r0, 0x416, r0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0)=0x5, 0x4) 12:05:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xffffffbf}}, 0x32) 12:05:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xfffffffb}}, 0x32) 12:05:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:23 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000080)) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x800, 0x0) utimensat(r3, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x0, 0x2710}}, 0x100) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x1, 0x7, 0x82, 0x200, 0x4c, 0x7fff, 0x3, {0x0, @in={{0x2, 0x4e23, @remote}}, 0x0, 0x9, 0x40000000, 0x80000001, 0x3}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000280)={r4, 0x4}, 0x8) [ 436.135279] FAULT_INJECTION: forcing a failure. [ 436.135279] name failslab, interval 1, probability 0, space 0, times 0 [ 436.188120] CPU: 1 PID: 20793 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 436.195138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.204531] Call Trace: [ 436.207170] dump_stack+0x172/0x1f0 [ 436.210854] should_fail.cold+0xa/0x1b [ 436.214815] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 436.219978] ? lock_downgrade+0x810/0x810 [ 436.224174] ? ___might_sleep+0x163/0x280 [ 436.228379] __should_failslab+0x121/0x190 [ 436.232669] should_failslab+0x9/0x14 [ 436.236520] kmem_cache_alloc_node_trace+0x277/0x720 [ 436.241676] ? kmem_cache_alloc_trace+0x34b/0x760 [ 436.246573] ? kasan_unpoison_shadow+0x35/0x50 [ 436.251219] __kmalloc_node+0x3d/0x80 [ 436.255080] kvmalloc_node+0x68/0x100 [ 436.258952] __list_lru_init+0x4aa/0x6e0 [ 436.263071] sget_userns+0x84d/0xd30 [ 436.266835] ? kill_litter_super+0x60/0x60 [ 436.271128] ? ns_test_super+0x50/0x50 [ 436.275062] ? ns_test_super+0x50/0x50 [ 436.278987] ? kill_litter_super+0x60/0x60 [ 436.283272] sget+0x10c/0x150 [ 436.286426] mount_bdev+0xff/0x3c0 [ 436.290013] ? finish_unfinished+0x1120/0x1120 [ 436.294644] get_super_block+0x35/0x40 [ 436.298584] mount_fs+0xae/0x331 [ 436.302003] vfs_kern_mount.part.0+0x6f/0x410 [ 436.306553] do_mount+0x53e/0x2bc0 [ 436.310148] ? copy_mount_string+0x40/0x40 [ 436.314430] ? _copy_from_user+0xdd/0x150 [ 436.318656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.324247] ? copy_mount_options+0x280/0x3a0 [ 436.328798] ksys_mount+0xdb/0x150 [ 436.332389] __x64_sys_mount+0xbe/0x150 12:05:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) [ 436.336415] do_syscall_64+0x103/0x610 [ 436.340358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.345593] RIP: 0033:0x45b69a [ 436.348917] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 436.368961] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.376709] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 436.384023] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 436.391332] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 436.398656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 436.398666] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:23 executing program 3 (fault-call:0 fault-nth:82): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x1000000000000}}, 0x32) 12:05:23 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) r2 = getpgid(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000cc0)={0x0}, &(0x7f0000000d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000e40)=0xe8) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f40)=0x0) r9 = geteuid() fstat(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001000)=0x0) r12 = geteuid() lstat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001140)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000001100)='$/((:cpusetvmnet0\x00', 0xffffffffffffffff}, 0x30) r15 = getuid() fstat(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getpgid(0x0) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = gettid() stat(&(0x7f0000004000)='./file0\x00', &(0x7f0000004040)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = getgid() r23 = getpgid(0x0) stat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000004240)=0x0) fstat(r0, &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000004300)='./file0\x00', &(0x7f0000004340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r29 = getpgid(0xffffffffffffffff) getresuid(&(0x7f00000043c0)=0x0, &(0x7f0000004400), &(0x7f0000004440)) getgroups(0xa, &(0x7f0000004480)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000044c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004500)={0x0, 0x0}, &(0x7f0000004540)=0xc) lstat(&(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r35 = getpid() stat(&(0x7f0000006180)='./file0\x00', &(0x7f00000061c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006240)={0x0, 0x0, 0x0}, &(0x7f0000006280)=0xc) r38 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000062c0)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f00000063c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006400)={0x0, 0x0, 0x0}, &(0x7f0000006440)=0xc) r41 = getpgid(0xffffffffffffffff) r42 = getuid() fstat(r0, &(0x7f0000006480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)=0x0) r45 = getuid() r46 = getegid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000006700)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006840)=0xe8) r49 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000068c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006880)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000006900)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000006a00)=0xe8) getresgid(&(0x7f0000006a40), &(0x7f0000006a80)=0x0, &(0x7f0000006ac0)) sendmmsg$unix(r1, &(0x7f0000006b80)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000100)="c59127876ddac836", 0x8}, {&(0x7f0000000140)="013e6649c4d6f99bfd54bfcc941c3d38", 0x10}, {&(0x7f0000000180)="4d2ba136cf7a722b056682ccc32fad1fe6dbbc585b4ea48a6489a2522a7dee8d648cb252e46f220edf34e9a9045cf765123ff034266496ccf8a5b2f2cb503198a7c4cb6fef624105b901d3a629acb0a8fa3b642d071a35bfa74faaa9f49308caa74e131427026fa2d06d39682aca7bf77b4a33eade90f5beb56e9aba64dd18dfe43868c446575ad8c3752b6a86c700abc2382101ddc1f390df4c95ec69487d25ba1520da4b194b62b5b7603916", 0xad}, {&(0x7f0000000240)="5c5069bc75809f85446be1788ddc97a595d2e8db8672eca3ef1a0e3784f3b280919bd60df8f53c89f15c8c3eb15bf9eaa67bba3261be8ce38d90d0c2e38f40c0d79ecba1766921369625b626ebc304dfc199a4e44610fbc7ff1db98dd7ea16904366ed835c0e0211c2339fb91419799f3519a51f7947b6fe8a3b08c1f330ba93cfde05aee69f753e14b92eee69019d51382593c2b2002b693d", 0x99}, {&(0x7f0000000300)="66330c157e37082874cb1d3ba8e5160052c6da1044209305a11bda7b040b9894abd405028fbc986b966859371a525a679fef5117e6c00de5b9c936e73b443f0e8c0acda3bfda4f6ca16e626e1a6d64739012e0303f468ec99840a934976911b9d16568a797e830159f9838f02c17039e4f287814af4a5d03ba131baba177155e95c83362c99f405761113da18f41bc44b23f9be832eb654c7d66ff4a9317b053eb036753a3b1ab9ff5a485ea", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0xd8}, {&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)="afe15a41206dd7a2e6f623a22ab2d930ffe5c1ec0179ef5446a53e05a65ec3119a626a8e410e7cdab877386c03fc5ec397546357d7f5344a50952f8cee360b5fbda275688a493ecfe2731b6fee148d2041bada6ca37495e4ceff51834113054dda300ff5aafc58170e3b085e667f2e68cb20f35fe2343b93b0d2d0193b32793bada7179a316486aebce90116bbab420cb2ea5e2153ed420d71f6de9628031a9b69292169c38cf7b840063aa2db09e6e687f1bea11a9edc1572d8604beacd1e9ecb034716a7e61a16ba6e6f0e761132f0dd95b725223f4538", 0xd8}, {&(0x7f00000007c0)="99e15e84be7f2190968d3eb0760d9c3c26c2f390ba284784eb6737e697588a10632b4cde02f3872880baf3653fbbcebf14b6e874c5ee4025c02fa4cae6a5f8b95641e3c6f3aa9f1bda9121f2360a4430790e6751f3cc2e324894f0f51c4ff68bf19af2655f60e98d89eb99a73575b9d38e2f9b9d3e6bd221ad70b3be09ec1e1c0186ee6654fb52fffaffa915b1be49035d1cd6bfda52dcbfcb8e1593c17146555bb9cd1e1d", 0xa5}, {&(0x7f0000000880)="b36cc8ee05ca", 0x6}, {&(0x7f00000008c0)="584abe83095167f2e99e05f5112a036f7a2f3c55ec", 0x15}, {&(0x7f0000000900)="af1d8583b7a58e48a8e2d57f0311c0099ad92b90f1313352a579590f5e9ca108ff1d59f0301d79d8614862e7d12dcce756ff472b545bfeb1cabbc3728cc6c7a28b6ebcac37b029bc4a344a8725d2c442412d3354fbf8170cf5988de81d79f76653fc0a38b3389364f5ed803bb4384634145fc130bfaf379ac3b41389eb788c570d71cdd79ae34dda29a569fdddc472272a49a2ace5a03661273950d8a019cac7b8c2274896", 0xa5}, {&(0x7f00000009c0)="e4d8e10dc748ff9ca81a5aaef56db62e2b09734c1fc513411a4756a5000fc146b35f1e6539bc3e0173effd5b57fd4faabbdfe8593cbd6a01da0bf04c38a9b259571791b6721e39dea9a1123e9af923fd4b63aa7c267eb9f13c276ee8692d99f183084f7d0fc64fcd19450254830829d05cad2fb0af12066a06f2f13acbfa909ad1d4e2242f52fb833d3ab109c30037b50bdb84108fe9c8fe4bddad03145672ba5d0dc8765cebe71b8fcd7c2da2164752c064", 0xb2}, {&(0x7f0000000a80)="473b88ce39e6745b369af316dc7f15d9db1b12052f117c1114847e32148c4c3ffc4fee1a2e767c9f2fbeaeabf5a4f11ea39eaf9653a9346e3f7c2e38ae64e81e6e5b0065dbbfaf4822c7f955b8f3791f250432ff9e597fd3a6f097ffc2dad594f0c9ba8f0e59167db5826d169fcf618c448643e6e52dfb9dba66022a7a53c9045497cf226625089f87775d120dd3b4886e05fff2cf273f42c49a4d4bbd77f29fffa7247851d688f76e885399e9a2154e", 0xb0}], 0x7}, {&(0x7f0000000c00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000c80), 0x0, &(0x7f0000001200)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x80, 0x4000000}, {&(0x7f0000001280)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002740)=[{&(0x7f0000001300)="0be68480fe8f0eda24dd19513e19c5b44f45212a28bada199b94b4b3bdc8deea9490a89477308d777cc119c4120aa9d6e89e9662e574cd5236bec11918bdcdae777f252dca3f3a9e9b4f3fd2ffcbf5ae9db35c0c35c2db62894670fc9f326ac8cce27ffe4e9607", 0x67}, {&(0x7f0000001380)="3e748a4ebded3121258f75c43ff771b7a070e5ec0b327aad61f9a664ba4015af095e69da76c5cf61f4aa45850b1ae818da0b393c", 0x34}, {&(0x7f00000013c0)="48f53817727ca853aa", 0x9}, {&(0x7f0000001400)="d43cfc01ba9d644693e4ccdb57c8523594d236295a144e931b31adfe2155e168e443d140f7c04ba58a47420a2f849b666e214a583d9532e5c41c9f01d6f79a81a2f72deabc2b3137e6d1f76b7fd6140e8bf04254459911f87aec0e2990874086e8203ce53dfa10cc3d", 0x69}, {&(0x7f0000001480)="3f0c8fcede488363fb3bc61c475d78c832e75ee82c075b19cd3e0c7d959ee878e29cd8745a2d70cf3e568adc0599d184365c1a99eb64be45764200035e2f03582b5d98e87c80781bb3522b6ec20661a56f2b9ef83dedd1cbf65cd2c753eb9edd329a637d2ad5354a432ef943fd3345f66486c7b028b1a67fc66ad8eb456361658d00dfe76149fe18684b96bf94cc37438d120b6640c11ae7e9325283e7823df8cbd9d3fb075ba242a8d625e7d203c2615bf17cb5b5b5287f914a06eb9b5237154a4d955d09b55962", 0xc8}, {&(0x7f0000001580)="d9068023f5a77f575a9486e73741d7f8e83f4aad3639eb48ce54d4551d1f52", 0x1f}, {&(0x7f00000015c0)="5722cdcd799fecb41a7982c0b584efaaf5d12859efa78320730d21acd3f56f47497004b5a1665aa67c290ccd6aa3f7d32da4a1e686e73fcdc402227b51749638784e85a67bcd931bbb5c2d6121f69bcf1c2428b33f342752526fa4caf64090113954e1717c9cb2ae31cfbd3dde7be649dca2f55a23e966d7288161738bd30355ca6760f7f7ac6e2600bed3e1a6146d10506a04b87e9f857dd72825a5f3351726e3ffb1a55f00aadd10e6b1747480589af7567db48ab23ed1088dfc67e780e88af5927236406421b9f48dc368374bea27ca757a01ccd669c0e830d5e08bf16aa5db67e71ea9b76fd4ce84bb56ea07a4e421683bcfb2b893465b8f2f2d", 0xfc}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="0a29ed3e5a9873fb0b184954702258525aafefcab2fc393f84f7be9339ea0c2529dc178f3b7616fa1b842aa2fc7997eaa5f8bb2e0561985db4007a1e2e5c9230fa0c4d12880f03e244d442", 0x4b}], 0x9, &(0x7f0000002980)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}], 0x50}, {&(0x7f0000002a00)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003d40)=[{&(0x7f0000002a80)="980a7f60f720fe1dfe1dba7f2b2afcc0f4b20c01f6602c46e5a7502893c8b588ce695df5102cd1e5aab29d43cbba3c5782dad2a879a5e687da6eb40b9137672aefd9336ff4b58292ca07d1197931e36584bc81726d4e07c42ccb5539271aa8314f736e483d6328a959a39df3edbdc043a58e386828ab7f569cb5e4d8e288a3a7dc6e399b4eafbe1e3239e14852ce0501f863afebb1fa2a1e69b36bae33f43589f9d16da9d2a6973fa28e0d63bc68c59bc6afd7c09fdcf995940ea6bc3abec149f309f79a0a0b9ad99b35731aa88364925d0bcce6275883133da85a77deadd25dbf03f40d6c5d44f562bbbd13f91612908491e9f064db", 0xf6}, {&(0x7f0000002b80)="b5ea6496d6ade59aee", 0x9}, {&(0x7f0000002bc0)="407f268b947892544d8fe7329e0da6ba80d882c060a494826ee66b969473d11de837a41908ab646aee4cec883de6f0d5502a11", 0x33}, {&(0x7f0000002c00)="c22a03f2b9643afe8cf921a6d5cfd636d60d1fadde67ccda3f3adc95de7a103f9ccf713741d1592c6d59a2217db53318173d484aea29e2a3a207493229cac287f9d47dcdd9e432d96fd0a9d562658c0483419d76ab339a8b80c37dceeffef9790d9a27591f7007a9acc4dbb0266141532d9e20d802c8982762d01659fe0eb4b7c73f2922ced98d00d63b2eeaf23ad24f08dca59660b4c1f3c9e515348817f6cee716b39caee6cd2d2438810772ddf0a494b763a491f1f8ed0033963a5b849e32d30e149b3d33810a81db0ad328d30f1683c24bd62703c84a23b82e4dcd3814a37b759822d1fdedf0945604ed6b5657", 0xef}, {&(0x7f0000002d00)="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", 0x1000}, {&(0x7f0000003d00)="b36f9fde63091f1f9999bf526c77a729", 0x10}], 0x6, 0x0, 0x0, 0x40}, {&(0x7f0000003dc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003fc0)=[{&(0x7f0000003e40)="4aad4d465cf58450f221aac15f2e0bfd717b30438f75848954d04e575095d2b87285d3e8deac94f2d2c1a7af2b16123f66e7cc8cf90086fe48b7b41c8e430342e2db63728884f7735ea7077de5bbde8f60001d7ddae6809a9baa91df066c", 0x5e}, {&(0x7f0000003ec0)="30719a21b720da9b580a55764d3e22abf17dff4a2f95813988e4c8a2ffe6a4a788c77eda98882250cfd9e26f6b76c70f7d5967b53d73256fd13cd044fadea858b72ed9d263989c495f90ff1a371d810c719482ac80d645f9ace2dcd3deeef1c2408aa5ee1d9aba954fe157ece61d8e91d8da73f9745f55623186bf7550ade89461ea6ff13c6ee02e11c32c1b9911df5cd2e043a2bb7e8ca12fb355f1ca032fdbdc1b696ad739429cd86a1ff49fb0e6796faa60bec4cccebb778c24a1179b5b2bb7859b3ff56cb6940b2beb1cefb6", 0xce}], 0x2, &(0x7f0000004640)=[@cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @cred={0x20, 0x1, 0x2, r32, r33, r34}], 0xe0, 0x20004000}, {&(0x7f0000004740)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004940)=[{&(0x7f00000047c0)="211e61a1ad82bded17cd95d963d337dbb65f9cb200026fe456c097196d6cc41c2fe8c7beea251ae1bb71a67da2466800257491884734b5a8f35d70a6ee", 0x3d}, {&(0x7f0000004800)="708b6f0385fc033e97a355d10069305c6d07ba3629c96f459fd166202dc0133a29aefac64cec002d8362344d72543d0fddf793ae8465", 0x36}, {&(0x7f0000004840)="b0c683af181e8c0ed0c7b476f7221d83da365e815d88ee0bd80cabcd19b61d05bc6d66193fba92fde3b910c23a630c374191a6a0b0d2282f1bab2b141005b6f9c521fca43b3dc04583df64b9b4a65b1b4bca72500fc6cad33583b9f1928abcf17f508bf5a915d290653722dfe3a13c60f402b1eabfbcec171710e025a8b5f4a5e491cfd8225ef26d4ad2c38dfe170893b4ef14caaa7d2e16f481fa3df6e14eec3204b25a7045cb5d63df73f8faae52c02a9e860b2fad4fc21d0562797f75fc39a857c40b341e42741fe8f0", 0xcb}], 0x3, &(0x7f0000004980)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0x98, 0x1}, {&(0x7f0000004a40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000060c0)=[{&(0x7f0000004ac0)="bc5f7c40ddec546cc761dedbcfa4284dc6346a0b034e09a0c9ec1e3fed2c9e22e13c8153661b0c7dc092e4330211ef8f334363f4542a70f5559b3662476cc5594f1f699a1a564d7076c7a000067e12747082b689e130fca714b5746b32c02ae910c9ad67e81b134559295ebb1bff8a1a292ace38fe558a0352d0a7b07c4e134bb8c33ed425955bc3f86b0c7bea08eb5169ecbf583a5c6601712fa9", 0x9b}, {&(0x7f0000004b80)="faaf0b782def91ea51380503d7af0160d3eac1898c509300548a70b6b92fc8eac71a205d489442ea2292b969a6a43ab3d8c4877737a96cd6309d8a00e48fc03ecd07047460a2a12494018ca03ae738f3703cc3c43a32ae4fe332ab09d71326cb176c52705923c980dcf3f4a42b9dece95c0023039432e9d14ac513b61ca211402f98514c306e499af15e72c9564f9c5b33", 0x91}, {&(0x7f0000004c40)="06f19806ec739eee52f7", 0xa}, {&(0x7f0000004c80)="e9567f2f6322d88da443c7ef737124635907d384c9cbe50714f325e0bf8d144fda28e779d8a6650a32069513fd593d983795dee26484edd781ac7369184d18e2432beb64314435961caaf28179d8ac69bf76cdd3438a1e5a7cc09da64a3c2f8bcbb623a166b356a73173c23e70edb7c67d68fc0bb8ab836aa1c3faacec8192c50b0da16c2e8cf3f5573b5b75761be001d8fb4606fe89e8ceb462928b0597a8feaa8715764eb1008a1fb155aa61bdd7324f02416a42f08d5799b4e71180b39556", 0xc0}, {&(0x7f0000004d40)="bee8846f7982b8b6398463e9e91ccecbf0ce1f032833b8ffd949df610845f100adfa6f523af8e3a23a3952b7a2f67636003d36b54d2ec42326935f3c6bf7901bd4fe14339788ddeef8ef2612c0461d5f67f4ce6e4f908877b3b35ae0c01fb9841462b61f51ce75d100af63b562150e93f27c26af05d31f25d50029f8607a741631497f916b981390a66c2a3ca816878ee0b95cb42bebb8e054c9e69e05b8dedf67ee9ad88fd144619dadc84fa4fb4d6cac8296b0febbe6e82d7130", 0xbb}, {&(0x7f0000004e00)="461564f4d3bfc8c3cb21b5c8eb0badee35dbd96a8317f74727e30bf2c52f2bb99b391a2b93e4acc71f6f0e760d82f96897476db0ab1801fb4f5b778ef2b7863dc82f31fc2d42c65c9c8b9613e0878017d93b0c52e9d9fae93872e5026e2a040a7a176033b94295e29d5ea413fdb82590bc28aa1ad09fefc5f8c731fb771fbfa66bd7d8a162cbb6dacfff0b5e87d0782ebbcb4e834ef8664292b4021fba3d7e12b776823174aa624434b414a09cb7e1e4234db6fe3300e56585927412ef924db4623e023c17180e789d7574715b5d51b8857a08c9506c05", 0xd7}, {&(0x7f0000004f00)="871498eb26fe95b6f20291e9596eb3a753c6ee49f70c8c63a932d3a1ec83f724202ac11729cce3c74553e7a1e20451f9e586afc94f35b5297ae9e1ab407437343a03e0ce4fd8da9a0c1ea01933a13aa95de49e2feea1866f7da449ee616c65c6b94aa5984db08b38ae2107524a75bd8ecb6545b834ef3ad3e8dd7f97e48a57497717a5a6928db9456a9946de303645aee900e27002ff508015e91b88f6f87428633bbcfb62ada532775c1a5bbfa11aa229efd3aa6ec2e8d619c92fb9646ac2e07fbef4dd2028ea7ab3d3f2c77a1ff8cb396508a45a4ddea845a2349dde1a440efdf401a5fcd2e5d14825506ef8c807c0ccc6ca9289c4ea627c38f16547d39bc409d4adc654e2d45a781dfde7f5e2f87f55ae275832435efdaac071e179e2e6675baea6ae69b090a1c5605225706155f8d483e0242d3760d5436c03ed75012a26fa0f7f0f43c34ce773fa7a4d435405dea0654089e4d667ba5368d3cb05eb818f734382a3e8cd81ee5d177cd9bfa6ce0373829949949b1d38bb45d1060e305eeafffc7ce5907b059ec8bb9c485bafac0c1163235295c86992b0edb03d26581950a1ae300e2a9e396aaba9cec7501668829f70beb663faf513e322751c560ffd92301ba75ae737f219d3460bf51601f659f4604674f5f964f7cc9dacedb1b391decea88f0caed4643fdbfee4ca7f7b78e921faac2635b9fb8feb18c54034f19038bb43e68939f59bc304df03a84016d2a72290a426f510ad22ddc715632a8797fa9e0feba56be9b9e12f1f6ad326ae96fa07f86588938dfe479ff960378af5f4c90ac4162dd88f7662125b85116512779f97556cd0c8c83d55b0c3677f57c9ba8cf339506688798c59bce5522c39b893d555618d7ab074302a2131b8685cb7cbee2d3599c3167762628ca2e6b30b5f2a4471aec6cc1b45a57f88a966ddbd92e3e710f231732b6f6376b15007e4df600276343fdd1eb0b10db60ff5972f34b5dc21cd44080c66ef32a334eb75bf92149dc9f775d4dc49220adaf753deef806d4b6e719906d802af3fce91127bdd23f6627bdfb119920cff557a29f687dbc3f4a4dc24ddf50fd4dbec72ec067385e24e93b9288fee554c21cbb58c3399681302f75265176ec44ee08a61f6d08e8f822353d15fa6b445f34992ff8364bc49ee6abc93ef099d625a785e466cf067590092b6c090d456a0f2c3f2f39b03c0cce401d68073451cc1b29c22b672adab5c624f480f3a1a9182aae677371a2dc7cc0e1f1fee83fc0ff72b4116f68a735728cab1af9f720e59c7fa764da6cf908f5bb435862453f0bd0990682c187902f7aa32c271844c507c164a932ab7de841c0cd060ef75bab7e3c5eb319f6bce8cce57d502b850a3678e9da78328eee905f184eff0ff9dc6745b64574ec1d295949b399e2c7a5dd195ec9ca16b41efbb4150a1363d4703290fbf4330456a0023f7bdd7f12b77434ce393590ac9eecf946123ca94dfe1c4d5cfe9d58c3e3b9efb9829af6a095cebb2ab8b64bdb3d856fea2bd40431401227aefb3631a58886dfd682e3cc46753de8e9c30d31b5508495f32309b4a90cb7204775e90958d86f7d29fab01e2b7a8f911186b12d15fbf007d8711d6e4fa49e71f26c0fc6c63c7a6568501ed7ba41a27e6e984a2842a88b6efebaae21ebf7bb964893c325771d95f0154a1f56e2bd41d7ac0c185d2cdbddddbe0824f73ec4e64bd9db7048fd7ece69c31b056c5633545d64732933a1c5cc19c86f52b0ea1f1e6863d2aa51509e6b490cfb9fce31a34704b8c4177aafccd497cfc7258cc82138a4f0308170b04e1f240c2262f0138b37c43062d70f43dfb79f6bb27f28dce4d448855effa483d6d22bb0a20b5df32a9d93aa9ab32f8971833f2da88a91db677cd85b9848e13fd8169697980e137a58fe1d39381bf626fd2b2648543f131684378bc84ac04af07c8f44fd3b712eade4af301f2ccaab16042132a6c08be03da0a0e1080dcbaf35bc0b5d10c1793f938cca98ed36cb346ff634b0a13ceef5838380a30844bdf1be270f5a65745ab74d57f0c8eba292ef649647463c22086f645ac486296817322f584308b873de59fbcfc897e4e2061ea070e071464fdbe75e552b941e63e5ed55012e734f4afbfddbd4064f5e005251c62afb544202b6d31693f88610996d1e0d615474c74a6a41a3d0660dbcc1952aa36bbc0765ccff68ff1ae6e3426cc19a194a9c906c512fdf4461ff0ac16f3967d702b5628ac8e10a6decf6f4e950e0280b96aaec78d1327d697134862715526f954ec3dabb91ab61e7fa8b8f093d6b104cc70f6a9225d341da8ab905c50ddb6ce9dd75d55739d4cf2cca320c2eac859e8edff3eac541c72c860c5bcba9ce49a6dcbb2be588e4d5aa8fb5a46984136860bcf6c61b339509256ac16c7a660586635232cd028d6f3903b3f478483ed4bbebb7c4137130ec3033e9f3ebe60cea852d3e1f602b89c5d22dfe9a41bb03f4b8dc5b2ad658c16527863900c39a2c689c3885e0602d3dfd6ce7f5877a4ee31135c96f5c1b109e6169a990687b948238f689f9eb3f127cec31a9169a2c4fd93d0a92a971d58f227b2945ac53685b566ba0636fe554550fbf0219ee62da52ed6bc08a06425bb26e1a9722bdb4f1afb8f0db8ff4e02e7aa39e6e0a9e922634c6b89612bdb472d00d1e81cefd2fbecbf1d03cbef004666b1d114ea026aec33e54b4a26f33bc0926776287c7e9ba5ddca6d1dc0f10120f21834fe39283f2d4b763f2af797ef341c38d86f840037dc2dd9190199f6de81d1e6f72b81fa9a25d34b5365076dfe187ca3dfe9de6e863348775098fc1ffe906ca31bcdc7dd48ad4f3e3d889cae9397c70fcf30565aac9232ef1cf2918c28feb8795a06aab09b9a3dbeeda6a4a5f954ad59188a4ba3ff65065f175f09a6fb6924732a6d0ddf464fea4fca96b15e23ce3f7865b462d78df321131ef5bbb0389f31bdefe6287aad7e786bf4c48f5749e58a3a00bbcddedf4b228633fcd86a4f1969dc514fdbdc6a63b1249160ed8e14954e5b51dd011eb049fe2f65be3497e79cbe8acfc8780e9d402f138b37a46098ca4c2cc4ce0931215b984ad8e2c8961e92e93ff686ce5b4d0af373d8709d7a5bafe77f2c5bd4d13c8890bccb65234c842de0d5528f8d04a9f0ccc0b0cb066567d42bf3432b4829a62a8124290933a5455b6def412cdbaa11a7f5333faa81ea1f3c3cc0c08e9527a30468eb22d8f6676152ef555c2ad852b4f22b7426a3fe61f989b1f2caed5d57c762419e1653dcc8d1c97c834da8c68beb83e9f3aad61a86e7327d33372dabac1e05afb8f81d6993542586dbd587944c7ba9a3605eabbb6e5e9e2b480f6849b987e6213ff5b74dee5e4bb86a10ce3a2656833953999092cd2c002350f2ece9e16323acd4b3faff8b4206bd1d1f6b6f6bc0754792ff0fe8ccb43f8ee63d64223d4422f696cd926da2b6de1b471ce56cf05ec78a6f07e1822cbbdab9cae868b2aaaa68068380906fec7c425a21660c05bef39fd4fc462d91ff94b22db1be6f7e5fff95b0eac47cbb07acce86fc082e2eb316da10cc6f4ffd6f66d7c3e417beaa7650ef716350009b820b115571bef9b7d555ee7ba7151a70e69c7d8ac8c5e12a102fe2cc4575bf9adce2ca70a91d4be8f77c9bae95031dc1dae04e6d5c6c2b174dbe34fa398ca7f5191653d69901fe0af35a6e43ed4194cbfd2a1b34560c2ce140dead99c052f037e36c1718864eba19e554c4a40ee59a5d46420ba5d1f45c72398b5ce350b2a2368e3751744ebd00cb30304d73776a6458235a817e22d18243fd5ee1886587bbbf216be6fc7dcc65ded0bcbd8eea5a5de9b78841191b03eac44b3b804dbd6bdf4bd14625b70a1ac3441c0d5b8c97e36e1f8481cb9eabff672bb608f2ce3abb7bc5789b523cfd7a367d1ca02fa83c2268dd54d1f9fa4bca115f500eaf25e9ae38e61c014f17b96be619f881446249d3ee7bf631f39181cc93caf35de5ab460d3966f5137c52dd5753e5d301fca37c107c2501b10dbdb3d466758e21fdbfd79f36c207354e3dae8848d529f4b4673ae40d921555531497279725aef8c25966c538fc2c4f1a719180e57e96320922bf635151306d1e09e273ab11e1479662bb62c1632f10be8ff27abbe75dbd74508e27cd281dc0b585ab7b68acea35e0066c94d4f8ad49e05d53a965cebea70241e71042291ec0972e0ce6151e65b6defc84a2a74b480241ab2ae93d111acf74d4e74efeac78d26a75aaf703a5a840ba2f4091e3f9628a3ee8be166ed3eb2b4f84ce49a3477ab7293879629d74c23f96c576ce900b9333ec4117313701bd18981e2cca3164a1f6ba1aff221d90c36087c7e2d943dbf8398c14f78ed251be9232e2f1749e38faa7412e104cd6b3e568b2e667f9cc83d1cf3809c5e103198b6932ca2f279ca528def832556c32bf26186517b83b7f8f9d26aac4d390de6c7b9c736a6f81361e98aad9e33772abf6ad79fe4e977efd2e34faddc7272e5ba38d7df62b65d8249b437d7d1afc1d9208a691b7aedc361de63f71974e86aa865c075879ce470060d123c97e376a7f8ba5ad6c40c294d748269535d81d7cc600fb732a5bece11fffee8e53a8139f865b779c77b3c58689848ce4c946b833aac234d6f6b4329aa4ea0654e40961ba41596b32cdb4b50b8908c5b360b4a705de406d3180ce8020d3b84794d44c074401f6833d3e65568a0b1602abc7adc534c3673a9e1fed1faa51f9c85cc3d837135fb98959b0616c9d6d3916d44de33ea847caf2531411ee09d0d62154cac984d4d74154283b8e1b79670db8a778f6b29d3b862a406a7baeeaa7b676c190b72c91665bd2ca6147ba78a8e82b3215fcb73b8a577ef8aa1c7b5f13a3fedf42b8909c8da3eac48b3cceca9b9b2bd192ba2ba344f3bcfc5af8f292e9c8323b92852e761ecf3454cab2e0947ffd8d213d3b0fb74ffe21d8b78eff26e5297893b33fba9128d7e142098c164fa3822efe4ce39a8d5a6eb83411c742ec54b2a24d994ff2349c57ad69b7fc20c66e9c984f34425c0a200f1813340e9bc64eb227854a8fc08e1afda6240f7c5222c81f0149d57f76f181131152b2124da488b88ed5163c57bd38680f7a594f2db18e4b5b539bac964e8232a5b5a9342fb541b4b3cefd865ca046bb8d32eada87bd99dc6a54410be0b50bd9fe6cc05abbe5aaccafaf6292f5d4bbcc498bc8315d882e82aeb04da5afba64b71964fc43392f16e1e3d273430d04123e3de7aa9084752c9675cd184b7e72a0a72f53f6566bf66741c40acac40f98d50319d46272b12d12796658e65658bf558a4ad1c8342161ca9e9537fa2172816345ab9ad706267e23145e72707b66e8edcb655f3934f2ef743ec5ab7c67dfb81f63144aecbfa478093af213e5e7d69cbbf85e05e38544212640c061cd6cacdb95c6bd8553f6a3730e74475d5d680c878e1571d17ffc5e7122b7ad54f1e81ffd4df9af88067799d628159d581cce70027f6c3e052e8be9d29b949f3f5cfc67d7a8ee6472695e40b8be06681483a58b3be1b3ec0d006bfa5b76e0703ea1494fe2ab8e163dd216e4c6fbad77765d28c7b93bf56b6979e7dcae82f6df718884b90e74ed11cac568e0a6682db630b6b2ec55ce059251f89999544b4deb3f979c1f55b3f4cf6ae212d0d2031fe83c007c624b1e0044834f115d59e4893bf71013e8bf1b2755ab1883adca4af6d0ab34b25cfdd9e13d56b752653a2122f3a02b0117f48cd790f19b07ff8e8a9f105866a70a24abdb5f6f43de52", 0x1000}, {&(0x7f0000005f00)="768499145ef46cf04d28b7c319c41eb461fe9cdd24fcd9b79e7413521c899c8607fb9c18f9345e70587a5d964b01f450b5fa378c767a6b062dc15048", 0x3c}, {&(0x7f0000005f40)="cb6236a70e030c592dd6f5024f52586f34e4d481b80787e7c001998104248e6ae58bb2a34433a63988d8fb89538ec37a772a46be183bd1f5bce1c8501fbb6d7f89828db3b4e5ff214b70c4b8a7986af9dd4a7a1e1ed33b4119a2bafef51d225b1cfbb4b7125233105c377c2b80563330b5a22d4a78512a2fb26090c49df77a9eb3ce4bcff6511e1868", 0x89}, {&(0x7f0000006000)="ad9a8bdb9239889cbfcd4c76348b51ef52b2c3ac2dc944ef41b66f3b16c9e8e63bc792d196f00ceba974b79bbb2b874807fd66cf4faada1c7640e027c4b0c2e2f40c6507a7945ddbf2d3b37fb7c1165dd925e462b4eb5c1f0f5f87418552767a3ad1409dfbf978760301e700c4cf92af5086bf40bafc3161174496dd80501a80f4c16e287bdf481e7dabbe04b733b97b467079982f95b2402d949c4da445549024773302b242e91bafcbc1bcaa5958f7e8c5b07a28", 0xb5}], 0xa, &(0x7f0000006540)=[@cred={0x20, 0x1, 0x2, r35, r36, r37}, @cred={0x20, 0x1, 0x2, r38, r39, r40}, @cred={0x20, 0x1, 0x2, r41, r42, r43}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r44, r45, r46}], 0x98, 0x44000}, {&(0x7f0000006600)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000066c0)=[{&(0x7f0000006680)="fe28ab6b260e9918da0185", 0xb}], 0x1, &(0x7f0000006b00)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r47, r48, r49}, @cred={0x20, 0x1, 0x2, r50, r51, r52}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x78, 0x8010}], 0x9, 0x1) 12:05:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x2000000000000}}, 0x32) 12:05:24 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x181000, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xc) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r1 = socket$caif_stream(0x25, 0x1, 0x0) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7f5f301092435552ed82faf2db75e39e5f7e0dca3c2b3f0d113ecd16c1b475d4b99a0f40526216e47caba4dee0c38ce9"], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x10001}}, 0x10) [ 436.670380] FAULT_INJECTION: forcing a failure. [ 436.670380] name failslab, interval 1, probability 0, space 0, times 0 [ 436.736646] CPU: 1 PID: 20826 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 436.743662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.753049] Call Trace: [ 436.755681] dump_stack+0x172/0x1f0 [ 436.759374] should_fail.cold+0xa/0x1b [ 436.763327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 436.768499] ? lock_downgrade+0x810/0x810 [ 436.772701] ? ___might_sleep+0x163/0x280 [ 436.776906] __should_failslab+0x121/0x190 [ 436.781199] should_failslab+0x9/0x14 [ 436.785048] kmem_cache_alloc_trace+0x2cf/0x760 [ 436.789772] ? kasan_unpoison_shadow+0x35/0x50 [ 436.794404] ? kasan_kmalloc+0xce/0xf0 [ 436.798440] __memcg_init_list_lru_node+0x8a/0x1e0 [ 436.803433] __list_lru_init+0x3d3/0x6e0 [ 436.807549] sget_userns+0x84d/0xd30 [ 436.811309] ? kill_litter_super+0x60/0x60 [ 436.815594] ? ns_test_super+0x50/0x50 [ 436.819528] ? ns_test_super+0x50/0x50 [ 436.823456] ? kill_litter_super+0x60/0x60 [ 436.827743] sget+0x10c/0x150 [ 436.830909] mount_bdev+0xff/0x3c0 [ 436.834500] ? finish_unfinished+0x1120/0x1120 [ 436.839147] get_super_block+0x35/0x40 [ 436.843091] mount_fs+0xae/0x331 [ 436.846517] vfs_kern_mount.part.0+0x6f/0x410 [ 436.851066] do_mount+0x53e/0x2bc0 [ 436.854673] ? copy_mount_string+0x40/0x40 [ 436.858966] ? _copy_from_user+0xdd/0x150 [ 436.863180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.868776] ? copy_mount_options+0x280/0x3a0 [ 436.873335] ksys_mount+0xdb/0x150 [ 436.876935] __x64_sys_mount+0xbe/0x150 [ 436.880974] do_syscall_64+0x103/0x610 12:05:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x20000000000000}}, 0x32) [ 436.884923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.890159] RIP: 0033:0x45b69a [ 436.893395] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 436.912334] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.920094] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 436.927409] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 436.934717] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 436.942021] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 436.942031] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:24 executing program 3 (fault-call:0 fault-nth:83): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:24 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0xfffffffffffffffd) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) 12:05:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x100000000000000}}, 0x32) 12:05:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x200000000000000}}, 0x32) [ 437.318023] FAULT_INJECTION: forcing a failure. [ 437.318023] name failslab, interval 1, probability 0, space 0, times 0 [ 437.355583] CPU: 0 PID: 20863 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 437.362685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.362693] Call Trace: [ 437.362726] dump_stack+0x172/0x1f0 [ 437.362753] should_fail.cold+0xa/0x1b [ 437.362778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 437.387477] ? lock_downgrade+0x810/0x810 [ 437.387495] ? ___might_sleep+0x163/0x280 [ 437.387515] __should_failslab+0x121/0x190 [ 437.387535] should_failslab+0x9/0x14 [ 437.387556] kmem_cache_alloc_trace+0x2cf/0x760 [ 437.395963] ? kasan_unpoison_shadow+0x35/0x50 [ 437.395979] ? kasan_kmalloc+0xce/0xf0 [ 437.396003] __memcg_init_list_lru_node+0x8a/0x1e0 [ 437.396025] __list_lru_init+0x3d3/0x6e0 [ 437.404128] sget_userns+0x84d/0xd30 [ 437.404144] ? kill_litter_super+0x60/0x60 [ 437.404161] ? ns_test_super+0x50/0x50 [ 437.404181] ? ns_test_super+0x50/0x50 [ 437.444106] ? kill_litter_super+0x60/0x60 [ 437.448389] sget+0x10c/0x150 [ 437.451544] mount_bdev+0xff/0x3c0 [ 437.455124] ? finish_unfinished+0x1120/0x1120 [ 437.459752] get_super_block+0x35/0x40 [ 437.464742] mount_fs+0xae/0x331 [ 437.468155] vfs_kern_mount.part.0+0x6f/0x410 [ 437.472711] do_mount+0x53e/0x2bc0 [ 437.476303] ? copy_mount_string+0x40/0x40 [ 437.480593] ? _copy_from_user+0xdd/0x150 [ 437.484793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.490388] ? copy_mount_options+0x280/0x3a0 [ 437.494941] ksys_mount+0xdb/0x150 [ 437.498531] __x64_sys_mount+0xbe/0x150 [ 437.502644] do_syscall_64+0x103/0x610 [ 437.506587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.511818] RIP: 0033:0x45b69a [ 437.515044] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 437.534006] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 437.541752] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 437.549055] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 437.556361] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:24 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x5) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20000000080, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x5}) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="d9"], 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x420000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000200)={0x7ff, 0x14, [0x3, 0x1000000000000005, 0x7, 0x401, 0xbeb]}) [ 437.563667] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 437.570965] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:25 executing program 3 (fault-call:0 fault-nth:84): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x400000000000000}}, 0x32) 12:05:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:25 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x16, "aa2f70a06a2aadde5e9cc4a3a24da582622bd57a37ef"}, &(0x7f00000000c0)=0x1e) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e21, 0x7fffffff, @mcast2, 0x7fffffff}}, 0x2, 0x7, 0x28, 0x400000000000000, 0x61}, 0x98) [ 437.814915] FAULT_INJECTION: forcing a failure. [ 437.814915] name failslab, interval 1, probability 0, space 0, times 0 [ 437.909799] CPU: 1 PID: 20885 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 437.916888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.926294] Call Trace: [ 437.928958] dump_stack+0x172/0x1f0 [ 437.932688] should_fail.cold+0xa/0x1b [ 437.936646] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 437.941804] ? lock_downgrade+0x810/0x810 [ 437.946013] ? ___might_sleep+0x163/0x280 [ 437.950288] __should_failslab+0x121/0x190 [ 437.950311] should_failslab+0x9/0x14 [ 437.950324] kmem_cache_alloc_node_trace+0x277/0x720 [ 437.950335] ? kmem_cache_alloc_trace+0x34b/0x760 [ 437.950349] ? kasan_unpoison_shadow+0x35/0x50 [ 437.950367] __kmalloc_node+0x3d/0x80 [ 437.950384] kvmalloc_node+0x68/0x100 [ 437.950400] __list_lru_init+0x4aa/0x6e0 [ 437.950433] sget_userns+0x84d/0xd30 [ 437.958592] ? kill_litter_super+0x60/0x60 [ 437.992976] ? ns_test_super+0x50/0x50 [ 437.996933] ? ns_test_super+0x50/0x50 [ 438.000888] ? kill_litter_super+0x60/0x60 [ 438.000907] sget+0x10c/0x150 [ 438.000926] mount_bdev+0xff/0x3c0 [ 438.000944] ? finish_unfinished+0x1120/0x1120 [ 438.000962] get_super_block+0x35/0x40 [ 438.000978] mount_fs+0xae/0x331 [ 438.001001] vfs_kern_mount.part.0+0x6f/0x410 [ 438.008504] do_mount+0x53e/0x2bc0 [ 438.032033] ? copy_mount_string+0x40/0x40 [ 438.036316] ? _copy_from_user+0xdd/0x150 [ 438.040518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.046104] ? copy_mount_options+0x280/0x3a0 [ 438.050678] ksys_mount+0xdb/0x150 [ 438.054274] __x64_sys_mount+0xbe/0x150 12:05:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x500000000000000}}, 0x32) [ 438.058304] do_syscall_64+0x103/0x610 [ 438.062265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.067612] RIP: 0033:0x45b69a [ 438.070846] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 438.089801] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 438.089819] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a 12:05:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 438.089826] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 438.089834] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 438.089842] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 438.089851] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:25 executing program 3 (fault-call:0 fault-nth:85): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:25 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x40, 0x400) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000180)=0x4) rt_sigprocmask(0x800000000000000, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r1 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000), 0x4) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x800000000000000}}, 0x32) 12:05:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0x900000000000000}}, 0x32) 12:05:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 438.446240] FAULT_INJECTION: forcing a failure. [ 438.446240] name failslab, interval 1, probability 0, space 0, times 0 [ 438.502524] CPU: 1 PID: 20929 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 438.509549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.519020] Call Trace: [ 438.521662] dump_stack+0x172/0x1f0 [ 438.525347] should_fail.cold+0xa/0x1b [ 438.529386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 438.534552] ? lock_downgrade+0x810/0x810 [ 438.538752] ? ___might_sleep+0x163/0x280 [ 438.542962] __should_failslab+0x121/0x190 [ 438.547248] should_failslab+0x9/0x14 [ 438.551106] kmem_cache_alloc_trace+0x2cf/0x760 [ 438.555834] ? kasan_unpoison_shadow+0x35/0x50 [ 438.560487] ? kasan_kmalloc+0xce/0xf0 [ 438.564435] __memcg_init_list_lru_node+0x8a/0x1e0 [ 438.569426] __list_lru_init+0x3d3/0x6e0 [ 438.573544] sget_userns+0x84d/0xd30 [ 438.577311] ? kill_litter_super+0x60/0x60 [ 438.581602] ? ns_test_super+0x50/0x50 [ 438.585543] ? ns_test_super+0x50/0x50 [ 438.589472] ? kill_litter_super+0x60/0x60 [ 438.593753] sget+0x10c/0x150 [ 438.596925] mount_bdev+0xff/0x3c0 12:05:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 438.600509] ? finish_unfinished+0x1120/0x1120 [ 438.605150] get_super_block+0x35/0x40 [ 438.609089] mount_fs+0xae/0x331 [ 438.612504] vfs_kern_mount.part.0+0x6f/0x410 [ 438.617056] do_mount+0x53e/0x2bc0 [ 438.620667] ? copy_mount_string+0x40/0x40 [ 438.624957] ? _copy_from_user+0xdd/0x150 [ 438.629160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.634750] ? copy_mount_options+0x280/0x3a0 [ 438.639303] ksys_mount+0xdb/0x150 [ 438.642921] __x64_sys_mount+0xbe/0x150 [ 438.646953] do_syscall_64+0x103/0x610 [ 438.650913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.656151] RIP: 0033:0x45b69a [ 438.659381] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 438.678318] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 438.686074] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 438.693380] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:26 executing program 1: rt_sigprocmask(0x2, &(0x7f0000000240)={0x9e90}, 0x0, 0x8) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x8000, 0x0) faccessat(r0, &(0x7f0000000380)='./file0\x00', 0xf8b8f105e294f089, 0x1500) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x8, 0x1204) write$binfmt_elf64(r2, &(0x7f00000003c0)=ANY=[], 0x1fd) pread64(r0, &(0x7f0000000440)=""/4096, 0x1000, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000003c0)=0x0) syz_open_procfs$namespace(r3, &(0x7f0000000400)='ns/uts\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpeername$packet(r2, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001500)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001540)={0x0, @initdev, @local}, &(0x7f0000001580)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000015c0)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000016c0)=0xe8) sendmsg$nl_route(r1, &(0x7f00000017c0)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x40c20000}, 0xc, &(0x7f0000001780)={&(0x7f0000001700)=@ipv4_getnetconf={0x44, 0x52, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r4}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x81}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x5}, @NETCONFA_IFINDEX={0x8, 0x1, r6}]}, 0x44}}, 0x8000) userfaultfd(0x80000) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000001440)=0x4) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2010000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x54, r7, 0x204, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 12:05:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xd00000000000000}}, 0x32) 12:05:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 438.700687] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 438.707988] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 438.715291] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:26 executing program 3 (fault-call:0 fault-nth:86): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xbfffffff00000000}}, 0x32) 12:05:26 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x393) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x7, @mcast1, 0x800}}, [0xb931, 0xaf3, 0x8, 0xb58d, 0x100, 0x1, 0x8, 0x7ff, 0x2, 0x6, 0x3, 0x0, 0x42, 0x4a, 0x6]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x7, 0x30}, 0xc) 12:05:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:26 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r0 = socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/51, 0x33}, {&(0x7f0000000140)=""/201, 0xc9}, {&(0x7f0000000240)=""/41, 0x29}, {&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/136, 0x88}, {&(0x7f0000000440)=""/35, 0x23}, {&(0x7f0000000480)=""/54, 0x36}], 0x7, &(0x7f0000000c00)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000000540)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000700)=[{&(0x7f00000005c0)=""/83, 0x53}, {&(0x7f0000000640)=""/126, 0x7e}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x3, &(0x7f0000000740)=""/147, 0x93}, 0x1000}, {{&(0x7f0000000800)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000000880)=""/127, 0x7f}, {&(0x7f0000000900)=""/18, 0x12}, {&(0x7f0000000940)=""/100, 0x64}], 0x4, &(0x7f0000000a00)=""/53, 0x35}, 0x7}, {{&(0x7f0000000a40)=@ethernet, 0x80, &(0x7f0000003100)=[{&(0x7f0000000ac0)=""/83, 0x53}, {&(0x7f0000002c00)=""/202, 0xca}, {&(0x7f0000000b40)=""/95, 0x5f}, {&(0x7f0000002d00)=""/247, 0xf7}, {&(0x7f0000002e00)=""/171, 0xab}, {&(0x7f0000002ec0)=""/255, 0xff}, {&(0x7f0000002fc0)=""/49, 0x31}, {&(0x7f0000003000)=""/206, 0xce}], 0x8}, 0x8}, {{0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000003180)=""/142, 0x8e}, {&(0x7f0000003240)=""/90, 0x5a}, {&(0x7f00000032c0)=""/28, 0x1c}, {&(0x7f0000003300)=""/51, 0x33}], 0x4, &(0x7f0000003380)=""/229, 0xe5}, 0x1}], 0x5, 0x2000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000035c0)='/dev/zero\x00', 0x1012c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xc600000000000000}}, 0x32) 12:05:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) [ 439.246761] FAULT_INJECTION: forcing a failure. [ 439.246761] name failslab, interval 1, probability 0, space 0, times 0 [ 439.299181] CPU: 0 PID: 20968 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 439.306247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.315646] Call Trace: [ 439.318280] dump_stack+0x172/0x1f0 [ 439.318311] should_fail.cold+0xa/0x1b [ 439.318336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 439.331057] ? lock_downgrade+0x810/0x810 [ 439.335258] ? ___might_sleep+0x163/0x280 [ 439.335284] __should_failslab+0x121/0x190 [ 439.335304] should_failslab+0x9/0x14 [ 439.335318] kmem_cache_alloc_trace+0x2cf/0x760 [ 439.335340] ? kasan_unpoison_shadow+0x35/0x50 [ 439.357116] ? kasan_kmalloc+0xce/0xf0 [ 439.361067] __memcg_init_list_lru_node+0x8a/0x1e0 [ 439.366061] __list_lru_init+0x3d3/0x6e0 [ 439.370185] sget_userns+0x84d/0xd30 [ 439.373964] ? kill_litter_super+0x60/0x60 [ 439.378273] ? ns_test_super+0x50/0x50 [ 439.382223] ? ns_test_super+0x50/0x50 [ 439.386170] ? kill_litter_super+0x60/0x60 [ 439.390459] sget+0x10c/0x150 [ 439.393609] mount_bdev+0xff/0x3c0 [ 439.397192] ? finish_unfinished+0x1120/0x1120 [ 439.401821] get_super_block+0x35/0x40 [ 439.405749] mount_fs+0xae/0x331 [ 439.409164] vfs_kern_mount.part.0+0x6f/0x410 [ 439.413715] do_mount+0x53e/0x2bc0 [ 439.417308] ? copy_mount_string+0x40/0x40 [ 439.421598] ? _copy_from_user+0xdd/0x150 [ 439.425795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.431383] ? copy_mount_options+0x280/0x3a0 [ 439.435927] ksys_mount+0xdb/0x150 [ 439.439504] __x64_sys_mount+0xbe/0x150 [ 439.439529] do_syscall_64+0x103/0x610 [ 439.439551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.439562] RIP: 0033:0x45b69a [ 439.439577] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 439.439592] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 439.483433] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 439.490736] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 439.498039] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 439.505343] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 439.512658] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00', 0xfbffffff00000000}}, 0x32) 12:05:27 executing program 3 (fault-call:0 fault-nth:87): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:27 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x10002) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0x3}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="b871503abfa2cb7784f3792855e4ea046351559d367f"], 0x1) 12:05:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x23) 12:05:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 439.837260] FAULT_INJECTION: forcing a failure. [ 439.837260] name failslab, interval 1, probability 0, space 0, times 0 12:05:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x29) 12:05:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 439.887388] CPU: 1 PID: 21003 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 439.894392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.903765] Call Trace: [ 439.903794] dump_stack+0x172/0x1f0 [ 439.903828] should_fail.cold+0xa/0x1b [ 439.913945] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 439.913968] ? lock_downgrade+0x810/0x810 [ 439.913986] ? ___might_sleep+0x163/0x280 [ 439.914009] __should_failslab+0x121/0x190 [ 439.931657] should_failslab+0x9/0x14 [ 439.935570] kmem_cache_alloc_trace+0x2cf/0x760 [ 439.940281] __memcg_init_list_lru_node+0x8a/0x1e0 [ 439.940304] __list_lru_init+0x3d3/0x6e0 [ 439.940327] sget_userns+0x84d/0xd30 [ 439.949329] ? kill_litter_super+0x60/0x60 [ 439.949348] ? ns_test_super+0x50/0x50 [ 439.949362] ? ns_test_super+0x50/0x50 [ 439.949374] ? kill_litter_super+0x60/0x60 [ 439.949389] sget+0x10c/0x150 [ 439.949408] mount_bdev+0xff/0x3c0 [ 439.949425] ? finish_unfinished+0x1120/0x1120 [ 439.949443] get_super_block+0x35/0x40 [ 439.984513] mount_fs+0xae/0x331 12:05:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 439.987918] vfs_kern_mount.part.0+0x6f/0x410 [ 439.992542] do_mount+0x53e/0x2bc0 [ 439.996133] ? copy_mount_string+0x40/0x40 [ 440.000422] ? _copy_from_user+0xdd/0x150 [ 440.004630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.010227] ? copy_mount_options+0x280/0x3a0 [ 440.010246] ksys_mount+0xdb/0x150 [ 440.010266] __x64_sys_mount+0xbe/0x150 [ 440.010289] do_syscall_64+0x103/0x610 [ 440.010310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.010322] RIP: 0033:0x45b69a [ 440.010337] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 440.010345] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 440.010360] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 440.010369] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 440.010378] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x200000b2) [ 440.010393] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 440.022507] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:27 executing program 3 (fault-call:0 fault-nth:88): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:27 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x1ec) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x0) 12:05:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b00560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000000)) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x5) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000340)={'irlan0\x00', 0x0, 0x4}) 12:05:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 440.333643] FAULT_INJECTION: forcing a failure. [ 440.333643] name failslab, interval 1, probability 0, space 0, times 0 12:05:27 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 440.464546] CPU: 1 PID: 21036 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 440.471607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.481007] Call Trace: [ 440.483658] dump_stack+0x172/0x1f0 [ 440.487351] should_fail.cold+0xa/0x1b [ 440.491306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 440.496484] ? lock_downgrade+0x810/0x810 [ 440.500690] ? ___might_sleep+0x163/0x280 [ 440.504907] __should_failslab+0x121/0x190 [ 440.509202] should_failslab+0x9/0x14 [ 440.513055] kmem_cache_alloc_trace+0x2cf/0x760 [ 440.517783] ? kasan_unpoison_shadow+0x35/0x50 [ 440.522421] ? kasan_kmalloc+0xce/0xf0 [ 440.526371] __memcg_init_list_lru_node+0x8a/0x1e0 [ 440.531381] __list_lru_init+0x3d3/0x6e0 [ 440.535552] sget_userns+0x84d/0xd30 [ 440.539331] ? kill_litter_super+0x60/0x60 [ 440.543624] ? ns_test_super+0x50/0x50 [ 440.547560] ? ns_test_super+0x50/0x50 [ 440.551512] ? kill_litter_super+0x60/0x60 [ 440.555814] sget+0x10c/0x150 [ 440.558984] mount_bdev+0xff/0x3c0 [ 440.562586] ? finish_unfinished+0x1120/0x1120 [ 440.567242] get_super_block+0x35/0x40 [ 440.571190] mount_fs+0xae/0x331 [ 440.574616] vfs_kern_mount.part.0+0x6f/0x410 [ 440.579162] do_mount+0x53e/0x2bc0 [ 440.582774] ? copy_mount_string+0x40/0x40 [ 440.587068] ? _copy_from_user+0xdd/0x150 [ 440.591269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.596856] ? copy_mount_options+0x280/0x3a0 [ 440.601428] ksys_mount+0xdb/0x150 [ 440.605029] __x64_sys_mount+0xbe/0x150 [ 440.609081] do_syscall_64+0x103/0x610 [ 440.613029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.618274] RIP: 0033:0x45b69a [ 440.621519] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 440.640980] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 440.648732] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 440.656125] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) [ 440.663437] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 440.670751] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 440.670761] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300002344a6aeabec2e15fc1771f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b90180000000000000cf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="3200000006000000000b0000e194e272293c21193f9fb443f42df700000000000000000000000000000000000000000900009f55a6bdca95425fe1b62256056a2e165bbcd4ab8032f714d92d387aa9cfdbaa206370039397b4f58f55dd5b2313f8d956d643801d79457353593fcb2156db19e109f4330b9eca3de2bdc0b899996cbb8554e8d30ef0bedbcf205b5b57ae7af2a72bd54cafd2fa4bdced6e6378ebf4e8288d853b9e6529bd3b3af08b80dab7512ac8bd5d665c8434e89dbe97606af8adbad7409d0fc94261256387a36e1c"], 0x32) getsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:05:28 executing program 3 (fault-call:0 fault-nth:89): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r1, 0xf1663fed4948c695, 0x1}, 0x10) accept4$unix(r1, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x80800) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) socket(0x2, 0x5, 0x7f29423) write$binfmt_misc(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="5300000044a6aeabec2eeea8582d15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffc3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r3 = dup(r2) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="320000000600000000000000000000000000000000000000000000000000000009000000000000002f6465762f73672300007177ca00000000be9382c95b309d1ca4f1b153ee29d77e392fac4060791bb95d25abadb71cd9f3d0b8a4b295b313eb5f574bac6a8291bfd03f93a6457f95d12559ca402e99dbc93c3e9b79917bee254bff723857f4b05385817e8357cf2ee3ed24a9d03f91a55dd636f3af61ba1fbaf17467ee5512e0b42436935fc2559854054cc351b7238bf0c1918b50974526"], 0x32) 12:05:28 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 441.042726] FAULT_INJECTION: forcing a failure. [ 441.042726] name failslab, interval 1, probability 0, space 0, times 0 [ 441.089229] CPU: 0 PID: 21076 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 441.096259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.105667] Call Trace: [ 441.105713] dump_stack+0x172/0x1f0 [ 441.112028] should_fail.cold+0xa/0x1b [ 441.112047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 441.112064] ? lock_downgrade+0x810/0x810 [ 441.112080] ? ___might_sleep+0x163/0x280 [ 441.112100] __should_failslab+0x121/0x190 [ 441.112123] should_failslab+0x9/0x14 [ 441.137591] kmem_cache_alloc_trace+0x2cf/0x760 [ 441.142316] ? kasan_unpoison_shadow+0x35/0x50 [ 441.142331] ? kasan_kmalloc+0xce/0xf0 [ 441.142354] __memcg_init_list_lru_node+0x8a/0x1e0 [ 441.142382] __list_lru_init+0x3d3/0x6e0 [ 441.142412] sget_userns+0x84d/0xd30 [ 441.155928] ? kill_litter_super+0x60/0x60 [ 441.155946] ? ns_test_super+0x50/0x50 [ 441.155961] ? ns_test_super+0x50/0x50 [ 441.155973] ? kill_litter_super+0x60/0x60 [ 441.155995] sget+0x10c/0x150 [ 441.183281] mount_bdev+0xff/0x3c0 [ 441.186856] ? finish_unfinished+0x1120/0x1120 [ 441.186878] get_super_block+0x35/0x40 [ 441.186907] mount_fs+0xae/0x331 [ 441.186929] vfs_kern_mount.part.0+0x6f/0x410 [ 441.203568] do_mount+0x53e/0x2bc0 [ 441.203589] ? copy_mount_string+0x40/0x40 [ 441.203609] ? _copy_from_user+0xdd/0x150 [ 441.203632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.203646] ? copy_mount_options+0x280/0x3a0 [ 441.203666] ksys_mount+0xdb/0x150 [ 441.229321] __x64_sys_mount+0xbe/0x150 [ 441.233356] do_syscall_64+0x103/0x610 12:05:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="32000000060000000000000000000000000000000000000000000000000000000900000000000000196465762f7367230000"], 0x32) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r3, 0x8, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) 12:05:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 441.237310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.242986] RIP: 0033:0x45b69a [ 441.246224] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 441.265159] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 441.272912] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 441.272922] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 441.272930] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 441.272937] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 441.272945] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:28 executing program 3 (fault-call:0 fault-nth:90): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:28 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'L-', 0x8}, 0x28, 0x2) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRES16=r1, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYPTR64, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESOCT=r1, @ANYRES16=r1, @ANYRES64=r1, @ANYRESDEC=r1, @ANYPTR64, @ANYRES64=0x0, @ANYPTR64]], @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYBLOB="73891fc4b27bb3bbc876018d26b571480dd664f643e14cb5c253decc4aa5cc06279803696855c65ad45ca1e691f17ad3544a7b4d8618ecdffbd15d6c8d9082a101486de548ca6f01f2b59168998398de24bbf0c3b435a439f42d9a4e790a0a667eff94f2cfb9be2505000000c4b92db40c361f3a42173b17402cf7e12dca6cc29d1fcd0439cc50e6d0c44498a9e6862a86c18c645f1d7992e33aaa4a639e860c4d0fb101803f1cdec3bcba302990d640d5cea49ed66b3f7f705c4326e4ae6e11f3000000000000903fb121cc13cbe43ce033590300435526f400c026f3c55ffef4d714", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX=r1, @ANYRES32=r1, @ANYRESDEC=r1, @ANYRES64=r1], @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r1]], @ANYRESHEX=r1, @ANYRES16=r1], 0x2a) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000002c0)={0x8, 0x1, 0x0, 0x1dc00000, 0x19, 0x4, 0x1, 0x9, 0x3, 0xffff}) 12:05:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x1) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000540)=""/209) r3 = dup(r1) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040), 0x4) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) r3 = getuid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000000c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)) r6 = getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000840)=0xe8) r14 = getegid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000000880)={0x408, 0x0, 0x5, [{{0x0, 0x3, 0x6, 0x7, 0x8, 0x401, {0x3, 0x2851, 0x0, 0x952, 0xc0, 0x3, 0x3, 0x42, 0x9, 0x8, 0xffff, r3, r4, 0x0, 0x81}}, {0x6, 0x1, 0x9, 0x7, '/dev/sg#\x00'}}, {{0x6, 0x2, 0x7, 0x400000000000000, 0x8, 0xa, {0x6, 0x9, 0x3ff, 0xff, 0x72, 0x4, 0x6, 0x7, 0x49e0, 0x2880, 0x7, r5, r6, 0x3, 0xfffffffffffffffb}}, {0x6, 0x2, 0x10, 0x27, '/dev/cachefiles\x00'}}, {{0x5, 0x0, 0x9, 0xe0f, 0x3, 0x8, {0x0, 0x7ff, 0x8000, 0xffffffff, 0x8, 0x7fffffff, 0x6, 0x10000, 0x4, 0x80000000, 0xfffffffffffff001, r7, r8, 0x4, 0x8000}}, {0x3, 0x1ff, 0x9, 0xfffffffffffff1f1, '/dev/sg#\x00'}}, {{0x2, 0x0, 0x20, 0x4, 0x48d42b59, 0x5, {0x0, 0x6, 0x7, 0x9, 0xd003, 0x4, 0x1, 0xfffffffffffffffe, 0x5, 0x0, 0x200, r9, r10, 0x1, 0x9}}, {0x5, 0x80000000, 0x9, 0x6c0, '/dev/sg#\x00'}}, {{0x6, 0x2, 0xffffffffffffffff, 0x8, 0x81, 0x7, {0x3, 0x5, 0x80d, 0x400, 0x10000, 0x4, 0x80000001, 0x3ff, 0x6000000000, 0x9, 0x1000, r11, r12, 0x200, 0x1}}, {0x4, 0x80000000, 0x12, 0x7fff, '#[wlan0-em1)cgroup'}}, {{0x4, 0x0, 0x40, 0x8, 0x6a31, 0x1f, {0x2, 0xae4, 0x5, 0xfffffffffffffff9, 0x800, 0x6, 0x7fffffff, 0x4, 0x6d, 0x81, 0x8, r13, r14, 0x5, 0x3}}, {0x0, 0x80000001, 0xa, 0x4, 'md5sumeth1'}}]}, 0x408) r15 = dup(r1) write$FUSE_NOTIFY_DELETE(r15, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) [ 441.565901] FAULT_INJECTION: forcing a failure. [ 441.565901] name failslab, interval 1, probability 0, space 0, times 0 [ 441.609547] CPU: 1 PID: 21109 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 441.616574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.625969] Call Trace: [ 441.628610] dump_stack+0x172/0x1f0 [ 441.632304] should_fail.cold+0xa/0x1b [ 441.636271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 441.641447] ? lock_downgrade+0x810/0x810 [ 441.645660] ? ___might_sleep+0x163/0x280 [ 441.649914] __should_failslab+0x121/0x190 [ 441.654230] should_failslab+0x9/0x14 12:05:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 441.658087] kmem_cache_alloc_trace+0x2cf/0x760 [ 441.662823] ? kasan_unpoison_shadow+0x35/0x50 [ 441.667455] ? kasan_kmalloc+0xce/0xf0 [ 441.671415] __memcg_init_list_lru_node+0x8a/0x1e0 [ 441.676408] __list_lru_init+0x3d3/0x6e0 [ 441.680531] sget_userns+0x84d/0xd30 [ 441.684299] ? kill_litter_super+0x60/0x60 [ 441.688590] ? ns_test_super+0x50/0x50 [ 441.692531] ? ns_test_super+0x50/0x50 [ 441.696472] ? kill_litter_super+0x60/0x60 [ 441.700764] sget+0x10c/0x150 [ 441.703939] mount_bdev+0xff/0x3c0 [ 441.707537] ? finish_unfinished+0x1120/0x1120 [ 441.712179] get_super_block+0x35/0x40 [ 441.716118] mount_fs+0xae/0x331 [ 441.719547] vfs_kern_mount.part.0+0x6f/0x410 [ 441.724095] do_mount+0x53e/0x2bc0 [ 441.727696] ? copy_mount_string+0x40/0x40 [ 441.731990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.737587] ? copy_mount_options+0x280/0x3a0 [ 441.742146] ksys_mount+0xdb/0x150 [ 441.745743] __x64_sys_mount+0xbe/0x150 [ 441.749774] do_syscall_64+0x103/0x610 [ 441.753717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.758951] RIP: 0033:0x45b69a [ 441.762186] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 441.781118] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 441.788864] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 441.796251] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:29 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x200000) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080)=0x101, 0x4) 12:05:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) [ 441.803559] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 441.810865] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 441.818188] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:29 executing program 3 (fault-call:0 fault-nth:91): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000180)="0adc6a802dc7785be665b533") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x8000, 0x0) write$P9_RAUTH(r2, &(0x7f00000001c0)={0x14, 0x67, 0x2, {0x88, 0x3, 0x8}}, 0x14) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b000000000000007f00080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r3 = dup(r1) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x1000, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000280)={&(0x7f0000000200)=[0x1], 0x1, 0x6, 0x91, 0x8001, 0x1, 0x48000000000, {0x1, 0x4, 0x1ff, 0xffff, 0x6, 0x3, 0x7ff, 0x7ff, 0x2, 0x0, 0x6, 0x0, 0x5, 0x80000001, "6843dca51895c9ce8843669b85a5fe2c1857771784f9c198998a5574e4419e2c"}}) 12:05:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000080)=""/164, &(0x7f0000000140)=0xa4) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r1 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB='\b'], 0x1) 12:05:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000040)={0xfff, 0x6, 0x41}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000000)={0x8001005, 0x0, 0x2}) 12:05:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 442.232361] FAULT_INJECTION: forcing a failure. [ 442.232361] name failslab, interval 1, probability 0, space 0, times 0 [ 442.282597] CPU: 0 PID: 21146 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 442.289600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.298985] Call Trace: [ 442.299020] dump_stack+0x172/0x1f0 [ 442.299047] should_fail.cold+0xa/0x1b [ 442.299067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 442.299089] ? lock_downgrade+0x810/0x810 [ 442.299110] ? ___might_sleep+0x163/0x280 [ 442.318551] __should_failslab+0x121/0x190 [ 442.318573] should_failslab+0x9/0x14 [ 442.318595] kmem_cache_alloc_trace+0x2cf/0x760 [ 442.335502] ? kasan_unpoison_shadow+0x35/0x50 [ 442.340216] ? kasan_kmalloc+0xce/0xf0 [ 442.340241] __memcg_init_list_lru_node+0x8a/0x1e0 [ 442.340262] __list_lru_init+0x3d3/0x6e0 [ 442.340283] sget_userns+0x84d/0xd30 [ 442.340304] ? kill_litter_super+0x60/0x60 [ 442.358487] ? ns_test_super+0x50/0x50 [ 442.358503] ? ns_test_super+0x50/0x50 [ 442.358516] ? kill_litter_super+0x60/0x60 [ 442.358536] sget+0x10c/0x150 [ 442.377980] mount_bdev+0xff/0x3c0 [ 442.381563] ? finish_unfinished+0x1120/0x1120 [ 442.386196] get_super_block+0x35/0x40 [ 442.390126] mount_fs+0xae/0x331 [ 442.393546] vfs_kern_mount.part.0+0x6f/0x410 [ 442.398098] do_mount+0x53e/0x2bc0 [ 442.401698] ? copy_mount_string+0x40/0x40 [ 442.406155] ? copy_mount_options+0x1ea/0x3a0 [ 442.410708] ? copy_mount_options+0x1f0/0x3a0 [ 442.416474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.423274] ? copy_mount_options+0x280/0x3a0 [ 442.427828] ksys_mount+0xdb/0x150 12:05:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) 12:05:29 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB='h'], 0x1) [ 442.431424] __x64_sys_mount+0xbe/0x150 [ 442.435443] do_syscall_64+0x103/0x610 [ 442.439383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.444607] RIP: 0033:0x45b69a [ 442.447829] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 442.466760] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 442.466778] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a 12:05:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 442.466786] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 442.466794] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 442.466801] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 442.466809] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:29 executing program 3 (fault-call:0 fault-nth:92): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="5300003ad8d72aabec2e15fc1772f14a301b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c007e9ce5cccf7942003606004079025f759e9f5d54076bb47f9681d3c7f10cc876576f501eb9fb255c0200800537fc2d895f685045e7665a64fcfbc864045821e304e7fc4295dedcc53258a68686b9215b645c79c62c770a4448402d3ebc1be6880c54d682f14166e718bdd4e5"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:30 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x2e4, r1, 0x501, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x40, @remote, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1800000000000000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x15a}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x41}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4b8e81eb}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc84}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfcb}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0x110, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd692}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x46f03b4a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ce9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xeba}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x8080}, 0x40) r2 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="5c5dac8fb6e24c"], 0x1) 12:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 442.661986] FAULT_INJECTION: forcing a failure. [ 442.661986] name failslab, interval 1, probability 0, space 0, times 0 [ 442.729643] CPU: 0 PID: 21173 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 442.736626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.745984] Call Trace: [ 442.748585] dump_stack+0x172/0x1f0 [ 442.752238] should_fail.cold+0xa/0x1b [ 442.756143] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 442.761285] ? lock_downgrade+0x810/0x810 [ 442.765470] ? ___might_sleep+0x163/0x280 [ 442.769657] __should_failslab+0x121/0x190 [ 442.773957] should_failslab+0x9/0x14 [ 442.777818] kmem_cache_alloc_trace+0x2cf/0x760 [ 442.782549] __memcg_init_list_lru_node+0x8a/0x1e0 [ 442.787532] __list_lru_init+0x3d3/0x6e0 [ 442.791639] sget_userns+0x84d/0xd30 [ 442.795447] ? kill_litter_super+0x60/0x60 [ 442.799725] ? ns_test_super+0x50/0x50 [ 442.803672] ? ns_test_super+0x50/0x50 [ 442.803687] ? kill_litter_super+0x60/0x60 [ 442.803700] sget+0x10c/0x150 [ 442.803723] mount_bdev+0xff/0x3c0 [ 442.803739] ? finish_unfinished+0x1120/0x1120 [ 442.803760] get_super_block+0x35/0x40 [ 442.811947] mount_fs+0xae/0x331 [ 442.830489] vfs_kern_mount.part.0+0x6f/0x410 [ 442.835031] do_mount+0x53e/0x2bc0 [ 442.838627] ? copy_mount_string+0x40/0x40 [ 442.842928] ? _copy_from_user+0xdd/0x150 [ 442.847844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.853446] ? copy_mount_options+0x280/0x3a0 [ 442.857993] ksys_mount+0xdb/0x150 [ 442.861582] __x64_sys_mount+0xbe/0x150 [ 442.865595] do_syscall_64+0x103/0x610 [ 442.869527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.874750] RIP: 0033:0x45b69a 12:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 442.877967] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 442.896909] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 442.896927] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 442.896934] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 442.896941] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) [ 442.896949] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 442.896956] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x400000) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r3 = dup(r2) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:30 executing program 3 (fault-call:0 fault-nth:93): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:30 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32=r0], 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x10100) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x0, 0x84, 0x2}) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000140)={"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"}) 12:05:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b43706db4702d59451aa46ddb69466c87c358f25a94c55af8aacc050009ad7fa0ab6f6d99013328d3be7a05b0c09f8673e0b421c6c8626fcaeccaccffcaab9d522c96a33db03dde6e1393b2a74d7818992364ab43a9c5be090ddc8a6a54ff13832e1d047024b9a130bd005dc1cced6b21b5d315df427c24") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 443.190095] FAULT_INJECTION: forcing a failure. [ 443.190095] name failslab, interval 1, probability 0, space 0, times 0 [ 443.229032] CPU: 1 PID: 21208 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 443.236048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.245436] Call Trace: [ 443.248076] dump_stack+0x172/0x1f0 [ 443.251760] should_fail.cold+0xa/0x1b [ 443.255704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 443.260857] ? lock_downgrade+0x810/0x810 [ 443.265068] ? ___might_sleep+0x163/0x280 [ 443.269269] __should_failslab+0x121/0x190 [ 443.273558] should_failslab+0x9/0x14 [ 443.277406] kmem_cache_alloc_trace+0x2cf/0x760 [ 443.282125] ? kasan_unpoison_shadow+0x35/0x50 [ 443.286760] ? kasan_kmalloc+0xce/0xf0 12:05:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 443.290699] __memcg_init_list_lru_node+0x8a/0x1e0 [ 443.295683] __list_lru_init+0x3d3/0x6e0 [ 443.299805] sget_userns+0x84d/0xd30 [ 443.303574] ? kill_litter_super+0x60/0x60 [ 443.307845] ? ns_test_super+0x50/0x50 [ 443.311778] ? ns_test_super+0x50/0x50 [ 443.311794] ? kill_litter_super+0x60/0x60 [ 443.311807] sget+0x10c/0x150 [ 443.311825] mount_bdev+0xff/0x3c0 [ 443.311840] ? finish_unfinished+0x1120/0x1120 [ 443.311856] get_super_block+0x35/0x40 [ 443.311880] mount_fs+0xae/0x331 [ 443.311902] vfs_kern_mount.part.0+0x6f/0x410 [ 443.311922] do_mount+0x53e/0x2bc0 [ 443.311939] ? retint_kernel+0x2d/0x2d [ 443.311959] ? copy_mount_string+0x40/0x40 [ 443.311971] ? copy_mount_options+0x208/0x3a0 [ 443.311995] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 443.364297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.369892] ? copy_mount_options+0x280/0x3a0 [ 443.374448] ksys_mount+0xdb/0x150 [ 443.378040] __x64_sys_mount+0xbe/0x150 [ 443.382067] do_syscall_64+0x103/0x610 [ 443.386010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.391237] RIP: 0033:0x45b69a [ 443.394477] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 443.413463] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 443.413484] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 443.413491] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 12:05:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 443.413499] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 443.413507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 443.413514] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") capget(&(0x7f0000000140), 0x0) r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) read$FUSE(r0, &(0x7f0000000340), 0x1000) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r3 = dup(r2) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x1}) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000280)={r4, &(0x7f00000001c0)=""/67}) 12:05:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:31 executing program 3 (fault-call:0 fault-nth:94): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:31 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x5) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffffffffffffffb0) r1 = dup(r0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000040)={'veth0_to_team\x00'}) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="320000000600000000000000000000000000000000000000001100000000000009000000000000002f994992c4d211646576"], 0x32) 12:05:31 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f032139400318e0112d8d6d4ed21acdf897ca6e7f61905ee414c0808de20c403b98eaca582ff9da6eb877bfa77ec9bc2046f40e12ebfc896d7f7a7db753d2c61c9e5deb673b6658d2804f63327e3f0382cdba7bb8588af369a0bc855fe068439254160afde266aa65f0773d1d8d676deb6b6e61f81446887b6cb89d98919a9c7d85a92b68a7e98e879ef1e301c8e0a04c14871318feb2752a63e1c8d35b661e564321da7d2a72386da6ee3a1bae6104ec4bbeec"], 0x1) 12:05:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 12:05:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x10000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000180)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) r4 = dup(r1) r5 = getuid() ioctl$SIOCAX25GETUID(r4, 0x89e0, &(0x7f0000000000)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 443.921233] FAULT_INJECTION: forcing a failure. [ 443.921233] name failslab, interval 1, probability 0, space 0, times 0 12:05:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) [ 443.999084] CPU: 0 PID: 21257 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 444.006142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.015540] Call Trace: [ 444.018193] dump_stack+0x172/0x1f0 [ 444.021904] should_fail.cold+0xa/0x1b [ 444.025874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 444.031050] ? lock_downgrade+0x810/0x810 [ 444.035249] ? ___might_sleep+0x163/0x280 [ 444.039457] __should_failslab+0x121/0x190 [ 444.043734] should_failslab+0x9/0x14 [ 444.047554] kmem_cache_alloc_node_trace+0x277/0x720 [ 444.052679] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 444.057632] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 444.062785] alloc_worker+0x47/0x1c0 [ 444.066549] init_rescuer.part.0+0x1f/0x190 [ 444.070928] __alloc_workqueue_key+0xb8e/0xee0 [ 444.075574] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 444.080740] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 444.085809] ? __lockdep_init_map+0x10c/0x5b0 [ 444.090357] ? __lockdep_init_map+0x10c/0x5b0 [ 444.094915] ? debug_mutex_init+0x2d/0x60 [ 444.099123] reiserfs_fill_super+0x377/0x2eb0 [ 444.103683] ? finish_unfinished+0x1120/0x1120 [ 444.108325] ? up_write+0x1c/0x150 [ 444.111918] ? snprintf+0xbb/0xf0 [ 444.115441] ? vsprintf+0x40/0x40 [ 444.118952] ? wait_for_completion+0x440/0x440 [ 444.123579] ? ns_test_super+0x50/0x50 [ 444.123597] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 444.123619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.123638] mount_bdev+0x307/0x3c0 [ 444.123656] ? finish_unfinished+0x1120/0x1120 12:05:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) [ 444.123679] get_super_block+0x35/0x40 [ 444.138237] mount_fs+0xae/0x331 [ 444.138260] vfs_kern_mount.part.0+0x6f/0x410 [ 444.138280] do_mount+0x53e/0x2bc0 [ 444.138301] ? copy_mount_string+0x40/0x40 [ 444.146611] ? _copy_from_user+0xdd/0x150 [ 444.146634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.146649] ? copy_mount_options+0x280/0x3a0 [ 444.146668] ksys_mount+0xdb/0x150 [ 444.146687] __x64_sys_mount+0xbe/0x150 [ 444.146714] do_syscall_64+0x103/0x610 [ 444.154053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.154067] RIP: 0033:0x45b69a [ 444.154084] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 444.154092] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 444.154114] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 444.162202] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 444.162213] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 444.162220] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 444.162228] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 444.229916] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 12:05:31 executing program 3 (fault-call:0 fault-nth:95): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:31 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) eventfd(0x7) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) 12:05:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) 12:05:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) write$binfmt_elf64(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0xbd93, 0x5, 0x9, 0x2, 0x3, 0x3e, 0xfffffffffffffff9, 0x27f, 0x40, 0x370, 0x5, 0x100000000, 0x38, 0x2, 0x0, 0x7, 0x1000}, [{0x0, 0x3, 0x0, 0x0, 0x4, 0x400, 0x7ff, 0x7}, {0x7, 0x4, 0x3ff, 0x8, 0x5, 0x0, 0x100000001, 0x9}], "524b7625c5e9099cfc0608e571531be2350be6f68ac2c21c23ba2b96c940145084ba1641aed63f3f62deff484cade36dcc752d3781ac2c9d8d2a9396afb4f9ebfa8770c1d42f2a20f05740d5b8edd13b5a063cd73827168981d73daf0179a5448960a98e0dddbabb6201b63cfbcc18c1f890cbdb882b11b22a2103db664ebd2c2b884bb93974eaabebb9e01c69bed82aa347c91ff265229f3fb668bfa02854a760b6b00ea0293dcb8de676ce4191f6515384c62117cf7a78b4d44775dda0a3cf0f28fa1cb8255247fa2c6905e2a12da98ef791e4fc845b518fcdcb47035a334f640414777b174e"}, 0x197) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) fcntl$setsig(r1, 0xa, 0x1d) 12:05:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 444.489607] sg_write: data in/out 151360283/365 bytes for SCSI command 0x0-- guessing data in; [ 444.489607] program syz-executor.4 not setting count and/or reply_len properly 12:05:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 444.578485] FAULT_INJECTION: forcing a failure. [ 444.578485] name failslab, interval 1, probability 0, space 0, times 0 [ 444.599707] sg_write: data in/out 151360283/365 bytes for SCSI command 0x0-- guessing data in; [ 444.599707] program syz-executor.4 not setting count and/or reply_len properly [ 444.629093] CPU: 0 PID: 21292 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 444.636140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.645615] Call Trace: [ 444.648255] dump_stack+0x172/0x1f0 [ 444.651952] should_fail.cold+0xa/0x1b [ 444.655910] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 444.661073] ? lock_downgrade+0x810/0x810 [ 444.665273] ? ___might_sleep+0x163/0x280 [ 444.669478] __should_failslab+0x121/0x190 [ 444.673767] should_failslab+0x9/0x14 [ 444.677619] kmem_cache_alloc_trace+0x2cf/0x760 [ 444.682339] ? __lockdep_init_map+0x10c/0x5b0 [ 444.686908] ? cancel_delayed_work+0x2d0/0x2d0 [ 444.691545] __kthread_create_on_node+0xf2/0x460 [ 444.696351] ? kthread_parkme+0xb0/0xb0 [ 444.700405] ? __lock_is_held+0xb6/0x140 [ 444.704520] ? cancel_delayed_work+0x2d0/0x2d0 [ 444.709156] kthread_create_on_node+0xbb/0xf0 [ 444.713703] ? __kthread_create_on_node+0x460/0x460 [ 444.718768] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 444.724095] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 444.728996] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 444.734164] init_rescuer.part.0+0x7d/0x190 [ 444.738540] __alloc_workqueue_key+0xb8e/0xee0 [ 444.743166] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 444.748332] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 444.753417] ? __lockdep_init_map+0x10c/0x5b0 [ 444.753432] ? __lockdep_init_map+0x10c/0x5b0 [ 444.753450] ? debug_mutex_init+0x2d/0x60 [ 444.753473] reiserfs_fill_super+0x377/0x2eb0 [ 444.753504] ? finish_unfinished+0x1120/0x1120 [ 444.771246] ? up_write+0x1c/0x150 [ 444.771267] ? snprintf+0xbb/0xf0 [ 444.771280] ? vsprintf+0x40/0x40 [ 444.771298] ? wait_for_completion+0x440/0x440 [ 444.771312] ? ns_test_super+0x50/0x50 [ 444.771329] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 444.771351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.805634] mount_bdev+0x307/0x3c0 [ 444.809307] ? finish_unfinished+0x1120/0x1120 [ 444.813950] get_super_block+0x35/0x40 [ 444.817925] mount_fs+0xae/0x331 [ 444.821347] vfs_kern_mount.part.0+0x6f/0x410 [ 444.825917] do_mount+0x53e/0x2bc0 [ 444.829522] ? copy_mount_string+0x40/0x40 [ 444.833985] ? _copy_from_user+0xdd/0x150 [ 444.838189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.843793] ? copy_mount_options+0x280/0x3a0 [ 444.848364] ksys_mount+0xdb/0x150 [ 444.851973] __x64_sys_mount+0xbe/0x150 [ 444.856007] do_syscall_64+0x103/0x610 [ 444.859960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.865195] RIP: 0033:0x45b69a 12:05:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) [ 444.868436] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 444.887380] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 444.895127] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 444.895137] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 444.895145] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 444.895153] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:05:32 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x3, 0x0, 0x10001, 0xee4a}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000100)={0x9, r1, 0x2, 0x2}) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r2 = socket$caif_stream(0x25, 0x1, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0xc100, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="e66e139d2bf9ff49f4f700a41369a53195cbc27cbebe5b0f52483800e3d25b4adc42e3fbaa983071fe0ac8b959f056f71a90a95483e9f71a6af29566ee12a667b40ea03896a3141b02287731b75a01a636e6e75ef5059c1532bfc9"], 0x1) 12:05:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 444.895161] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 444.931379] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 12:05:32 executing program 3 (fault-call:0 fault-nth:96): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xe5, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:32 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x400000, 0x2) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x810, r0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7fd8723b7bf72647509bdf05443e7c1c2938f50f1972fdbdcaba54d7436b3f4004934b6c5efb6268277c8c73a5a2c4a44c63208917c5550d1fa52490cb32ea7605cd6c3b64be1ec7ec12a447e0733b8d1882eb60a78ceb11f68805662665459edae62ae4e49a3bea3627ee3643"], 0x1) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x20, 0x0) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f00000000c0)={0xa92, 0x7, 0x8, 0x2, 0x800, 0x7, 0x0, 0xd0, 0x9, 0x3f, 0x8a30, 0x3, 0x4, 0x1, &(0x7f0000000080)=""/57, 0x7, 0x794c79dd, 0x2}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000540)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdcd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d807177135100"}, 0xd8) bind$inet6(r5, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r6, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x6a2040}, 0xc, &(0x7f0000000600)={&(0x7f0000000280)={0x354, r3, 0xc, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb97}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81e7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x37}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1b6f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xafe}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3f, @dev={0xfe, 0x80, [], 0x19}}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc9c3}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}]}]}, 0x354}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 12:05:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 12:05:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 445.140306] audit: type=1400 audit(1555848332.515:112): avc: denied { map } for pid=21314 comm="syz-executor.1" path="socket:[65227]" dev="sockfs" ino=65227 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 [ 445.242506] FAULT_INJECTION: forcing a failure. [ 445.242506] name failslab, interval 1, probability 0, space 0, times 0 [ 445.299881] CPU: 1 PID: 21327 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 445.306903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.316291] Call Trace: [ 445.318937] dump_stack+0x172/0x1f0 [ 445.322631] should_fail.cold+0xa/0x1b [ 445.326674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 445.331835] ? lock_downgrade+0x810/0x810 [ 445.336057] ? ___might_sleep+0x163/0x280 [ 445.340266] __should_failslab+0x121/0x190 [ 445.344561] should_failslab+0x9/0x14 12:05:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) 12:05:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) flistxattr(r2, &(0x7f0000000180)=""/152, 0x98) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:32 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) socket$bt_rfcomm(0x1f, 0x1, 0x3) [ 445.348396] kmem_cache_alloc_trace+0x2cf/0x760 [ 445.348422] ? reacquire_held_locks+0xb7/0x3e0 [ 445.357722] ? sget_userns+0x208/0xd30 [ 445.357747] reiserfs_fill_super+0xfe/0x2eb0 [ 445.357769] ? finish_unfinished+0x1120/0x1120 [ 445.370958] ? up_write+0x1c/0x150 [ 445.374557] ? snprintf+0xbb/0xf0 [ 445.378060] ? vsprintf+0x40/0x40 [ 445.381573] ? wait_for_completion+0x440/0x440 [ 445.386194] ? ns_test_super+0x50/0x50 [ 445.390123] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 445.395201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.400801] mount_bdev+0x307/0x3c0 [ 445.404479] ? finish_unfinished+0x1120/0x1120 [ 445.409123] get_super_block+0x35/0x40 [ 445.413054] mount_fs+0xae/0x331 [ 445.413078] vfs_kern_mount.part.0+0x6f/0x410 [ 445.413098] do_mount+0x53e/0x2bc0 [ 445.413119] ? copy_mount_string+0x40/0x40 [ 445.428931] ? _copy_from_user+0xdd/0x150 [ 445.428957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.428974] ? copy_mount_options+0x280/0x3a0 [ 445.428991] ksys_mount+0xdb/0x150 [ 445.429009] __x64_sys_mount+0xbe/0x150 [ 445.429031] do_syscall_64+0x103/0x610 [ 445.429051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.429063] RIP: 0033:0x45b69a [ 445.429078] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 445.429086] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 445.429099] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a 12:05:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="320000000600000000000000000000000000000000000000000000000000000009000000000000002f6465762f7367230000740824f44185af914435f798b48162ec31981fd29f5e25d38b1cc49c7848da1080f4d0e296f64d368ad49f5ac9c105581708000000000000003a439608a960ef4ada24e0018167d63b3319e8d0e4da9b30a6b34024c7e41350de7b4fc26835ad7a4a950503e7950baa1068fdf381b53d04bf033500001b4fbb9bb909e1868ec1"], 0x32) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='openpromfs\x00', 0x8000, &(0x7f00000000c0)='/dev/sg#\x00') 12:05:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 445.429108] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 445.429124] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 445.483778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 445.483789] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:33 executing program 3 (fault-call:0 fault-nth:97): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) 12:05:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) 12:05:33 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x2) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB], 0x1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x0, @empty}}, 0x1e) socket$caif_stream(0x25, 0x1, 0x2) 12:05:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) r2 = dup(r1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) [ 445.798592] FAULT_INJECTION: forcing a failure. [ 445.798592] name failslab, interval 1, probability 0, space 0, times 0 12:05:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00kkk\x00'}}) [ 445.871538] CPU: 1 PID: 21361 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 445.878551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.887940] Call Trace: [ 445.890580] dump_stack+0x172/0x1f0 [ 445.894288] should_fail.cold+0xa/0x1b [ 445.898231] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 445.903388] ? lock_downgrade+0x810/0x810 [ 445.907623] ? ___might_sleep+0x163/0x280 [ 445.907648] __should_failslab+0x121/0x190 [ 445.907667] should_failslab+0x9/0x14 [ 445.907689] kmem_cache_alloc_trace+0x2cf/0x760 [ 445.919962] ? trace_hardirqs_on+0x67/0x230 [ 445.919979] ? kasan_check_read+0x11/0x20 [ 445.920003] __alloc_workqueue_key+0x81c/0xee0 [ 445.920020] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 445.920043] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 445.920063] ? __lockdep_init_map+0x10c/0x5b0 [ 445.920076] ? __lockdep_init_map+0x10c/0x5b0 [ 445.920096] ? debug_mutex_init+0x2d/0x60 [ 445.920119] reiserfs_fill_super+0x377/0x2eb0 [ 445.920141] ? finish_unfinished+0x1120/0x1120 [ 445.970423] ? up_write+0x1c/0x150 [ 445.974015] ? snprintf+0xbb/0xf0 [ 445.977516] ? vsprintf+0x40/0x40 [ 445.981029] ? wait_for_completion+0x440/0x440 [ 445.985660] ? ns_test_super+0x50/0x50 [ 445.989597] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 445.994667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.000274] mount_bdev+0x307/0x3c0 [ 446.003958] ? finish_unfinished+0x1120/0x1120 [ 446.008594] get_super_block+0x35/0x40 [ 446.012539] mount_fs+0xae/0x331 [ 446.015993] vfs_kern_mount.part.0+0x6f/0x410 [ 446.020544] do_mount+0x53e/0x2bc0 [ 446.024131] ? retint_kernel+0x2d/0x2d [ 446.028071] ? copy_mount_string+0x40/0x40 [ 446.032365] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 446.037882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.043484] ? copy_mount_options+0x280/0x3a0 [ 446.048037] ksys_mount+0xdb/0x150 [ 446.051636] __x64_sys_mount+0xbe/0x150 [ 446.055666] do_syscall_64+0x103/0x610 [ 446.059606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.064837] RIP: 0033:0x45b69a [ 446.068089] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 446.087047] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 446.094823] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 446.102132] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 446.109525] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 12:05:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) [ 446.116829] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 446.124140] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 12:05:33 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@my=0x1}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000000c0)={{0x0, 0x1, 0x100, 0x4, 0x552, 0xf0b0000000}, 0x4, 0x3, 0x9, 0x8, 0x0, "a08838db9109617087a585418ecfb90e0e48dbba984a2d28d3dcb43f546fc2f310cb9a8b87e3549321c8a1987eab8a1ce6389779b18ce7e17019cf44de0d36791880db52af7ca39f097c593307305991a3ea8be700988c2877ab8cfea8148837ef4fad2b34cad58c792824f76f0d8cd7ce4df5c8dddb5d07dd14a07ca6e7acd4"}) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f"], 0x1) [ 446.378976] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 12:05:33 executing program 3 (fault-call:0 fault-nth:98): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,tails=off,usrquota,block-allocator=noborder,resize=0']) 12:05:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000040)={0x1, 0x3, [@broadcast, @local, @local]}) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r4 = dup(r2) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) 12:05:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) 12:05:33 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB='\x00'], 0x1) 12:05:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) 12:05:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 12:05:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x58) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x32, 0x6, 0x0, {0x0, 0x0, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) 12:05:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:05:34 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000000)=ANY=[]]], 0x84806c4369764ccb) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 12:05:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crct10dif-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 446.745518] FAULT_INJECTION: forcing a failure. [ 446.745518] name failslab, interval 1, probability 0, space 0, times 0 [ 446.837910] CPU: 0 PID: 21413 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 446.844934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.854318] Call Trace: [ 446.856966] dump_stack+0x172/0x1f0 [ 446.860654] should_fail.cold+0xa/0x1b [ 446.864598] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 446.869754] ? lock_downgrade+0x810/0x810 [ 446.873950] ? ___might_sleep+0x163/0x280 [ 446.878161] __should_failslab+0x121/0x190 [ 446.882447] should_failslab+0x9/0x14 [ 446.886294] __kmalloc_track_caller+0x2e1/0x750 [ 446.891106] ? __lockdep_init_map+0x10c/0x5b0 [ 446.895651] ? __lockdep_init_map+0x10c/0x5b0 [ 446.900199] ? reiserfs_fill_super+0xb2b/0x2eb0 [ 446.904960] kstrdup+0x3a/0x70 [ 446.908200] reiserfs_fill_super+0xb2b/0x2eb0 [ 446.912758] ? finish_unfinished+0x1120/0x1120 [ 446.917404] ? up_write+0x1c/0x150 [ 446.920997] ? snprintf+0xbb/0xf0 [ 446.924493] ? vsprintf+0x40/0x40 [ 446.927992] ? wait_for_completion+0x440/0x440 [ 446.932619] ? ns_test_super+0x50/0x50 [ 446.936559] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 446.941629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.947215] mount_bdev+0x307/0x3c0 [ 446.950889] ? finish_unfinished+0x1120/0x1120 [ 446.955523] get_super_block+0x35/0x40 [ 446.959497] mount_fs+0xae/0x331 [ 446.962916] vfs_kern_mount.part.0+0x6f/0x410 [ 446.967471] do_mount+0x53e/0x2bc0 [ 446.971071] ? copy_mount_string+0x40/0x40 [ 446.975357] ? _copy_from_user+0xdd/0x150 [ 446.979565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.985158] ? copy_mount_options+0x280/0x3a0 [ 446.989714] ksys_mount+0xdb/0x150 [ 446.993312] __x64_sys_mount+0xbe/0x150 [ 446.997442] do_syscall_64+0x103/0x610 [ 447.001479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.006707] RIP: 0033:0x45b69a [ 447.009939] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 447.029133] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 447.036885] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 447.044188] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 447.051490] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 447.058788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 447.066091] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 447.086440] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate memory for journal device name [ 447.109726] ------------[ cut here ]------------ [ 447.114565] kernel BUG at fs/reiserfs/lock.c:44! [ 447.124722] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 447.130174] CPU: 1 PID: 21413 Comm: syz-executor.3 Not tainted 4.19.36 #4 [ 447.137121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.146530] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 447.151844] Code: 5d c3 e8 28 d7 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 64 6f 0c 05 e8 0f d7 89 ff 5b 41 5c 5d c3 e8 05 d7 89 ff <0f> 0b e8 4e 38 c0 ff eb a1 e8 67 38 c0 ff e9 33 ff ff ff e8 5d 38 [ 447.170794] RSP: 0018:ffff888054da7a88 EFLAGS: 00010246 [ 447.176191] RAX: 0000000000040000 RBX: ffff8880a564d200 RCX: ffffc9000c4b2000 [ 447.183488] RDX: 0000000000040000 RSI: ffffffff81e16e0b RDI: ffff8880a564d2a8 [ 447.190784] RBP: ffff888054da7a98 R08: 0000000000000065 R09: ffffed1015d24fe9 [ 447.198078] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: 00000000ffffffea [ 447.205375] R13: ffff88805457a480 R14: ffff888054da7c38 R15: ffff8880a564d200 [ 447.212676] FS: 00007fe38d5a6700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 447.220931] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 447.226838] CR2: 000000000070d158 CR3: 0000000092901000 CR4: 00000000001406e0 [ 447.234145] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 447.241439] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 447.248724] Call Trace: [ 447.251352] reiserfs_fill_super+0x2b51/0x2eb0 [ 447.255982] ? finish_unfinished+0x1120/0x1120 [ 447.260612] ? up_write+0x1c/0x150 [ 447.264193] ? snprintf+0xbb/0xf0 [ 447.267680] ? vsprintf+0x40/0x40 [ 447.271172] ? wait_for_completion+0x440/0x440 [ 447.275793] ? ns_test_super+0x50/0x50 [ 447.279716] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 447.284775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.290351] mount_bdev+0x307/0x3c0 [ 447.294017] ? finish_unfinished+0x1120/0x1120 [ 447.298636] get_super_block+0x35/0x40 [ 447.302563] mount_fs+0xae/0x331 [ 447.305971] vfs_kern_mount.part.0+0x6f/0x410 [ 447.310616] do_mount+0x53e/0x2bc0 [ 447.314209] ? copy_mount_string+0x40/0x40 [ 447.318480] ? _copy_from_user+0xdd/0x150 [ 447.322666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.328240] ? copy_mount_options+0x280/0x3a0 [ 447.332779] ksys_mount+0xdb/0x150 [ 447.336364] __x64_sys_mount+0xbe/0x150 [ 447.340382] do_syscall_64+0x103/0x610 [ 447.344312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.349530] RIP: 0033:0x45b69a [ 447.352750] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 447.371678] RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 447.379424] RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a [ 447.386741] RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00 [ 447.394135] RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0 [ 447.401428] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 447.408722] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 447.418738] Modules linked in: [ 447.428400] ---[ end trace 81ee0397643ce9e9 ]--- [ 447.433770] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 447.441632] Code: 5d c3 e8 28 d7 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 64 6f 0c 05 e8 0f d7 89 ff 5b 41 5c 5d c3 e8 05 d7 89 ff <0f> 0b e8 4e 38 c0 ff eb a1 e8 67 38 c0 ff e9 33 ff ff ff e8 5d 38 [ 447.465106] RSP: 0018:ffff888054da7a88 EFLAGS: 00010246 [ 447.470712] RAX: 0000000000040000 RBX: ffff8880a564d200 RCX: ffffc9000c4b2000 [ 447.478176] RDX: 0000000000040000 RSI: ffffffff81e16e0b RDI: ffff8880a564d2a8 [ 447.488133] RBP: ffff888054da7a98 R08: 0000000000000065 R09: ffffed1015d24fe9 [ 447.495658] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: 00000000ffffffea [ 447.505620] R13: ffff88805457a480 R14: ffff888054da7c38 R15: ffff8880a564d200 [ 447.515713] FS: 00007fe38d5a6700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 447.515788] kobject: 'loop3' (000000000e133252): kobject_uevent_env [ 447.526449] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 447.531101] kobject: 'loop3' (000000000e133252): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 447.536592] CR2: 0000000000738000 CR3: 0000000092901000 CR4: 00000000001406e0 [ 447.556443] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 447.563960] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 447.573878] Kernel panic - not syncing: Fatal exception [ 447.580180] Kernel Offset: disabled [ 447.583827] Rebooting in 86400 seconds..