0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/201}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0xe4, @loopback}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in6={0xa, 0x4e24, 0x8, @local, 0xd3}, @in6={0xa, 0x4e22, 0xfffffc01, @local, 0x7}], 0x98) write$P9_RWALK(r3, &(0x7f0000000040)={0x3d, 0x6f, 0x2, {0x4, [{0x8b, 0x0, 0x5}, {0x20, 0x4}, {0x40, 0x3, 0x2}, {0x1, 0x3, 0x8}]}}, 0x3d) 15:43:10 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001180)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xfffffffffffffef6) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xc0000000, 0x0, r3, 0x0, [], r1, r2}, 0x3c) dup2(r4, r0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="090700000000000000001fffffff0c009900ffffffff030000400c00990400800200030000000c009900ff030000000000000c00990004000000000800010002000000"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f00000000c0), 0xc, &(0x7f0000001280)={&(0x7f0000001140)={0x1c, r6, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40800) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0x1, &(0x7f0000000140)="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"}, 0x20) 15:43:10 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8500) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) write$vhci(r1, &(0x7f0000000080)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x428c02, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f00000000c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) getsockopt$inet6_buf(r2, 0x29, 0x15, &(0x7f0000000200)=""/99, &(0x7f0000000000)=0x63) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f0000000140)={{0x3f}, 'port1\x00', 0x2, 0x0, 0xffffffe1, 0x400, 0x0, 0x9, 0xffffffff, 0x0, 0xd, 0xd7}) dup2(r3, r0) 15:43:10 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)) dup2(r1, r2) 15:43:10 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) fsetxattr$security_capability(r1, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x8, 0x8}]}, 0xc, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)="ab519bd1c4617a24cf55268fda7d53fb1cb135b818ed4b202b360fc15a7fcbd3e8784a6a3b147fa4cd1a76d7eeaa184768b643ba194481aff0a9313d8ce3b3013026637ca1deac5891b99fde4d801a65a20db6d395157d2926fc3e96cac753680e7f399caf7ba24b012e2099cd276c7330b4afc1d795b7ee5751455543382c46af2b1c33fd75e05a985926c61a48cb8433d3baf357b7eced44d72a48552acea5e9b2f506b8", 0xa5, r0}, 0x68) dup2(r2, r0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x3cb}, 0x16, 0x3) pipe2(&(0x7f0000000300), 0x4000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000240)={{0x0, 0x0, @descriptor="f883476e56e301e6"}}) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000340)=0x9, &(0x7f0000000380)=0x4) 15:43:10 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) socket$inet6(0xa, 0x80000, 0xde) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x1ff, 0x4) dup2(r1, r0) 15:43:10 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x6603, 0x9}, 0x3c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000040)={0x400, 0x7, 0x4, 0x2000, 0x4, {}, {0x4, 0xc, 0x69, 0xb4, 0x4, 0x40, "d81a5f45"}, 0x9, 0x4, @offset=0x2, 0x2, 0x0, r3}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f00000000c0)=0xffffffff, 0x4) dup2(r1, r0) 15:43:10 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x7, 0x9, 0x10}, 0x147) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r3 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r3, 0x5, 0x3ff, 0x0, 0x0) dup2(r1, r3) 15:43:10 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000040)={0x8, 0x6, 0x7, 0x20, 0xec7c3f7d2ca49a67, 0x1}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r1) 15:43:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0xbe435bc6ac5e94b, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x1b672d7fd5f260a}, 0x0) dup2(r1, r0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0)=0x200, &(0x7f0000000140)=0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f0000000200)) ioctl$SIOCAX25CTLCON(r5, 0x89e8, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, 0x0, 0x1000000020, 0x5, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast]}) bind$bt_hci(r4, &(0x7f0000000180)={0x1f, 0x0, 0x1}, 0x6) 15:43:11 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000040)={0x2, 'vlan1\x00', {0x2}, 0x4}) 15:43:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0300000000000400280012000c000100766574680000810018000200fd00010000000000234a006554362dddcb892ef8051404bde5bf296e3c566a03d724fdbe08b8c5236b93b9797b4409ff07000000000000d1513e2effffff7fe6d4bd0577298100d205bf582df36589201124f9b673cb9fbc85f3536b28d55a39919cd2ab4fd7d8dc0b43e61969a8795100e09fb5b7626a0d68411eb796e9de66062f6d244d7edf3bd9e4837299a8cb6d924f3227ad47659b170207d4cd48359a6be094c576e6248e4d24f70acaeab51021c9a1c636fa081276f21584997a45197f6b5b43043bfb33670ede36d2e24dd8c3b0d1bb525e796c985489916c13d143f8d7fd04fb2566cbef2b07f31cedc879b6cb18b8881516257f19f45b2111538a4384b4d46c547a0556add1edfec47e02cae29d7d696abb05c60d5fae84fb2f2b33a951aeb09d1ec578ecccc3a90b77c780da5007603c5fc5ce3bd83a0ddaf509db26f8e619", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r7}, 0x3c) dup2(r8, r0) 15:43:11 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @loopback}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r3, 0xa435) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r4, 0xa435) r5 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)="53d7d46cb4f7dff4f72e2bd82acbe29607ffe5bc23b264623e6de13972c594b011e9d69763f5b9b4cd5e1c423c59d6bd99fdda34b454adc78385e0879eacf5a43d38bae66fde3b48006deb4d64280ea3c6ec525df438b6126d5952d10077c32c6299227daa35d86d76963adabf4c4547b674237a1ad0cc9763829d006c63d5561465640a7960d74bfda4b0571202b58eac34041ca7ca9ee3b757", 0x9a, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000200)={r3, r4, r5}, &(0x7f0000000240)=""/115, 0x73, 0x0) [ 436.293288] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 436.349055] IPv6: ADDRCONF(NETDEV_UP): veth171: link is not ready [ 436.365572] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:43:11 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) write$vhci(r1, &(0x7f0000000140)=@HCI_EVENT_PKT={0x4, "8b831948f79d2d5ab6002308e17275d6aa30c121255a858afbecfd61cce39d7c97e66344e7265592f881943308ab0ad2a890377530fee9a81c073db3b50f70307e9142e42181bc08672602c62ae27ca81d21b5205c6ad20abb9a1f935bf63d4b0144ce50614644b74816db3e"}, 0x6d) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) [ 436.426614] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 436.464972] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:43:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsu\x00', 0x101000, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) r4 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x7fff, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000080)={0xf000000, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980914, 0x0, [], @ptr}}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x3, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r5, 0x3}, &(0x7f00000001c0)=0x8) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r6, 0x0, 0x200) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r7, 0x0, 0x200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r7, 0xc00c642d, &(0x7f0000000040)={0x0, 0x100000}) r9 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r9, &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'U+', 0x4}, 0x16, 0x2) ioctl$DRM_IOCTL_GEM_CLOSE(r6, 0x40086409, &(0x7f0000000080)={r8}) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r6, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc8, r10, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x71d73e4b}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 15:43:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000003000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040)="d11ad89d2504d6df3453fe647ebf89f0604194e48c9c50f50a626101b64eaba5a4de96041959f15edd4b60a540287c44e55720025e17feabcda7a3cc5db575264ee587318cbd70502f2ead705c", 0x4d}, 0x68) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) dup2(r1, r0) 15:43:11 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9f000060000000030000000d00000000000002010000000000000000000003000000000200000003000000a70000000700000000000002000000000e000000030000060400000006000000060000000b000000020000000dc1facf89fb37971d0000000000000800000000001000"], &(0x7f0000000140)=""/223, 0x7b, 0xdf}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) r3 = dup(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x14, 0x10000, 0x7, 0x9, 0x0, r3, 0x80200000, [], 0x0, r1, 0x4}, 0x1b6) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r5, 0x0, 0x200) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000000240)={&(0x7f0000000000)=[0xb2, 0xbb7], 0x2, 0x2, 0x4, 0x2, 0x9, 0x8, 0x8001, {0x0, 0x9, 0xfbff, 0x3, 0xf813, 0x0, 0x6, 0xea30, 0x5, 0x7, 0x7, 0x3, 0x7ff, 0x10001, "9e48f4b32e8ae8369b23bd96c684577ac8e4fcb4799c16821b7a71da09ce6cf0"}}) dup2(r4, r0) 15:43:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000200)={0x41}, 0x1) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000180)={0x40}) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) ioctl$SNDRV_PCM_IOCTL_PREPARE(r2, 0x4140, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r5 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3ce, 0x6c701) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000640)={0x34, 0x0, &(0x7f0000000600)}) ioctl$PPPIOCGIDLE(r6, 0x8010743f, &(0x7f0000000200)) ioctl$VIDIOC_S_STD(r6, 0x40085618, &(0x7f00000005c0)=0xe0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x74ac}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000004c0)={r7, 0x96, "ca81044b4522ac6bb48c769a77697369efd0b694137c379556bb121a2fb9cc0901383396835058131aced7e1d327e2b8da1a25e59ff2e5835acab70de9cd620089a186d2f90f663de633b7b6004e49294ab060b2394757bcbd7ca72fea7c01cb6d67a5e19955b4f61c74a187abac54d68478018f8a07b9681926a0681a91bb49c65f73bc95558d3b568661e3135e23f93d308e11d33e"}, &(0x7f0000000580)=0x9e) ioctl$SNDCTL_DSP_GETCAPS(r2, 0x8004500f, &(0x7f0000000240)) sendto$llc(r5, &(0x7f0000000080)="12b487ef72f2335d005e68c273713fbe7f563ec4b24925201bbe6f8d7499bf4698f516f5ce1f1375d215f96403590e6612979e39d7bfae3274c9e146e3bbc955dc5cc487867e6d5aa2fbcc112bf82476794ddc46895c6751c32050193514f88ebf5b88e9a00b8e95e1c3a490", 0x6c, 0x40004, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x7, 0x1d, 0xaf, @local}, 0x10) r8 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, 0x0, 0xffffff5c) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2643575487351a80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x1, 0x4, 0x100, 0x70bd26, 0x25dfdbff, {0x3c08973f322f7365, 0x0, 0x5}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x9}, @NFULA_CFG_CMD={0x5, 0x1, 0x3}, @NFULA_CFG_MODE={0xa, 0x2, {0xfff}}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xa0a9}]}, 0x40}, 0x1, 0x0, 0x0, 0x4010}, 0x40) dup2(r4, r0) 15:43:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0xc0}, 0x162) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:12 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000040)=0xffffffff) 15:43:12 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) r3 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r3, 0x5, 0x3ff, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x794db5e27f427b92}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r5, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x6}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x8001}, @NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = timerfd_create(0x4, 0x800) r7 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0xffffff5c) bind$isdn_base(r4, &(0x7f0000000380)={0x22, 0x64, 0x20, 0x2, 0x9}, 0x6) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = socket(0x400000000000010, 0x802, 0x0) write(r9, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ioctl$EXT4_IOC_GROUP_ADD(r9, 0x40286608, &(0x7f00000003c0)={0x10000, 0x1000, 0x5, 0x5, 0xf, 0x8e00}) r10 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000140)={0x8000, 0x1000, 0xa, 0x0, 0x0, [{{r0}, 0x80000000}, {{r0}, 0x5}, {{r3}, 0x3}, {{}, 0x21}, {{r6}, 0x1}, {{r7}}, {{r8}, 0x1}, {{r0}, 0x1f}, {{r10}, 0x80}, {{r2}, 0x8000}]}) 15:43:12 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r1, 0x7fff) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x20, 0x7, 0x9, 0x1, 0xffffffffffffffff, 0x3}, 0x3c) dup2(r2, r0) 15:43:12 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x800, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write$FUSE_ENTRY(r1, &(0x7f0000000140)={0x90, 0x0, 0x5, {0x5, 0x0, 0x6, 0x2cd, 0x1000, 0x9, {0x6, 0x81, 0x80, 0x80000000, 0x2d626ced, 0x6, 0xfffffffa, 0x6, 0x3, 0x6, 0xfffffffb, r3, r5, 0x8, 0x27f1}}}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r6, r0) 15:43:12 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) r3 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x7, 0x5, 0x40, 0x1, 0x0, 0x3, 0x80, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0xa0b9c8b97007e320, @perf_bp={&(0x7f0000000040), 0xe049c92af1014387}, 0x1, 0x101, 0x2, 0x0, 0x646c, 0x4, 0x472b}, 0x0, 0x3, r2, 0x1) setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000140), 0x4) fcntl$notify(r3, 0x402, 0x4) 15:43:21 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @loopback}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r3, 0xa435) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r4, 0xa435) r5 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)="53d7d46cb4f7dff4f72e2bd82acbe29607ffe5bc23b264623e6de13972c594b011e9d69763f5b9b4cd5e1c423c59d6bd99fdda34b454adc78385e0879eacf5a43d38bae66fde3b48006deb4d64280ea3c6ec525df438b6126d5952d10077c32c6299227daa35d86d76963adabf4c4547b674237a1ad0cc9763829d006c63d5561465640a7960d74bfda4b0571202b58eac34041ca7ca9ee3b757", 0x9a, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000200)={r3, r4, r5}, &(0x7f0000000240)=""/115, 0x73, 0x0) 15:43:21 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) write$vhci(r2, &(0x7f0000000140)=@HCI_ACLDATA_PKT={0x2, "0ce4dbff5598d784d0c69c40ea72082d7fb5a3b16092d57fa6aed3f7558856c6c55df04716dfbeab7cb478ceab45a241c6b7e4adab78f2e8f7ce51031832eda5364e2fa507e76a8a78cc91c4981a8c274a3a083e6cd721b3daefce57347d49f1020fc2ccf06879f13c610fba6507bcb6e5c34de1b333875765e39b836c0a430c74679ee5fc3dfbaf5135a5"}, 0xfdc4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r3, r0) 15:43:21 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="01000700f8ff00000000"], 0xe) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:21 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0xffffff5c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x100, 0x0, 0x1, 0x65e7}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000000c0)={0x1f, r1}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x1ff, 0x2, 0x4, 0x653864515e6a98e5, 0x5, {0x0, 0x7530}, {0xfee8b56c51cb4e25, 0x0, 0x7f, 0x9, 0xaa, 0x3f, "7af179c2"}, 0x3, 0x2, @offset=0x7ff, 0x0, 0x0, r3}) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f00000001c0)={0xdcec, 0x7, 0xfffffffffffffffe}) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(0xffffffffffffffff, 0xffffffffffffffff) 15:43:21 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x222240) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x484080, 0x0) unlinkat(r2, 0x0, 0x200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0xd}, 0x10) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000140)=""/229) r3 = dup2(r1, r0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f00000003c0)={0x4, @multicast1, 0x4e24, 0x1, 'ovf\x00', 0x2, 0x5, 0x5}, 0x2c) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r5, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000008}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r6, 0x608, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x22c65f0be3ef52c4}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x40) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r7, 0x0, 0x200) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nvme-fabrics\x00', 0x8000, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r7, 0x0, 0x1, &(0x7f0000000400)=0x20400000, 0x4) unlinkat(r4, 0x0, 0x200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000080)=0x3) 15:43:21 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x2, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000000c0)={0x449, r1, 0x0, 0x4}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000140)={0x8, {"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", 0x1000}}, 0x1006) lsetxattr$security_evm(&(0x7f0000002200)='./file0\x00', &(0x7f0000002240)='security.evm\x00', &(0x7f0000002280)=@md5={0x1, "618b0e11615efa9d64d051b5befafaf3"}, 0x11, 0x1) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000001180)={{0x0, 0x0, @identifier="a8c90affc1cc7af9173bcfdd4c9c577a"}, 0x1000, [], "3849ec37b968f3647f8e12c529e323528afd6035f3e7f5d36d59e3971bc0bab8668d477be2e750dc50e015a70802db4c63de0e369b6950dc739cdd534e5e70d9b6f053fb426c74a8e943043b253f23fa315b32746ae139ff31df8ff22c3b2de7f8462fec7f7d9cba829bf0d1a983f86023efb83571d504a8c27691b24a345e284fbb7831c5f943fbd95e51854f9341008fb32f070afc3840aade3a13108f5a73f135a24ded77f3f1b7bb3dbdb6f2b7aa854bbbe892918cbc8ea3e30661603afef3b0620c8241f8c2645b7c114c52f49737fb34f7a67ec013759a24c4bc82146609b93105d5f7e04ae87619bcc93c18cd393560a894efeffbddebeda7a59999a0de308088d70bb2adfa8410a25ff4ab0fbd3f0573649a552c19adc2fa8256d3597430c40307016b0eea48e70d6aed47f397857d44b613b1b1a31780ac9cc5866d44dd94c2f235e79c9d8b7e3cd6d65428bd0eeea4ab1b4f121963c9bf20d64b043d49f7a38283622436c8cc8b722984a9ab81aea2d2301ef22359fab2db713907d02e746740530e6f6f9a61fc0752cb42ea1c341d5df917aac845c0524b6b948fd30e19b300b2d9f35591994a78a6ee8bbcd6906b2f422f50c1569994bee04bfa4189e2b14d4089e25fa8d0c4bc51904a7c604e2d4987b2d90dd662f05fec74844939abf8c7addd9ff41540afc5fa109c01162ebf38128b53f5d91f9ba5436d14b7e8c41b945a5e2ed3ac1a1e2030e59be94413c9695f1390ff5a379f7275a83b4f51734601dbba28513c645df38c0870bcaf68fc6610d9cbf3a63b9b468e5ab99df94025c0829dd9688b571f5566cf852f10588dd92d04c5e93ae3f91e8e5c8c72aa45a80c9e7fcea12c29f2a34328d6029d7feb8b7756d07e1a60e74b2de2eb36f2fd908a230d6fd2380002b5b7be9de6de6510d09130820b4ceeb05a772b81323e18768ad2a101edcd80e5926e65c6eb068384943ab10ad2e584c686a58ee6d2ecc20fe8cbfdb2ecb1274317b6406feaf9be538751e84b58f15a1af91b7adf05f59214278c838b375f5cb284a0ec03387840b6f400ee877e2f28513f206d01d1a4641b372b03430e3396d68e5dedf26073d057ac2117edd1b7b27c7e5b2ed84c4c51960a612178eb7b6c83f2670ddf36834919c4c2ef2fc2750021e007f2112aedb53df4475ac1410c6304d75f5c94eefea2d514b07e7ac45532fdb9ee07adb6af9930998bdbff4afadc43edca9d19cb771daa4262ca997c6426ab49779d9c07c6a087edf68641186527cbd593217971b437b3a33bd4b08753e49dc73b24027a7aa15745b82dcd0e8a88c587afa0e99020e2c392d9e4ba64b68ca1bbdd73a20fe2a90507f75ee7d39e70f7ef0a4f3a68808f944007bd200be66403b551bd119e5f60ffa795c158e6baed616cc45d64fc3a12f00d3f364bd0f8b2a71d182fc012512b4168cef344191779a1f82dab2ad86110935d677cc499a8c855b6d9582f7b42251d9735047795a17b6ecd0ea5ab389b7a9a1dbc3b2f4e4d6ccb6f66ec5618e27c10c7a261e3440325c61cf0a4f42859acee4f7f9b509a61a809484473137cb319362f73de5127df73532d9e89f1f2ca78028fac1cda5a819a4fb89605ed6b3fbd1f85fc8a1cd5e1c11a3851e7594c6fc20797c6c179e853016e59304cbe73b1d9f73641143d3cde73390497c15312d3087b854a7d1707f184a753e33b1293d5c8ef6212a886e68da82fe5e4b4753f8ece347d5ec7dd013486bc24d2f6852d651019b84e7790580ce81aba73eea3f0036f3190d717cda4d56a48d998468fa314b19dc2ae41241851dd441683de1bc696d6c07b19d9c5299eddff4786147e169a71f95f5a196876c1ece00bf74843283a95ac6f80815c68efbc758a48eeaba0cbafa227a148738eabfff16b5c6a24ce59987010b62ae0136d5564e689f275998d74e31a52c3aa84313736663637d3874c0bc5584760b008d95bf2ae5b76d53e43608264b1240756c6058cb6c6763b71b55882e1742b4d91d602a1222a63124602acb64ef28703854c58d9ceb5c43bbc1587eea7b4bcd9926fdb2c280c447702ac03a1066149c811e3347172f1fd0789b17f0b512dac24ea0d39f1a68281bb3ce016bb2a03a0df4329ff5c4f454b67396419b4558dfffee43ca9b055de76691e915bb5e9bea425572d9af2f77982d6b085d74476a769a6dba5f399228a26eefd6f9cddb7da01ad649a96cd0a96c17dfea62fb2001d7b254fdbc5a131c908e6a289393c4230d867175651293ae7adeae6b3bcbde25eec196b40531d099b1d7d76fa9a003f04fa44f88d0e4d9292b3cad7a920d24b96175c524c87ee10bf65b215ac6aa2fb5cbef652844829005407af71b8de7e3f9fe07355c39175f3a21d8f1dedc6202443587051b69c1e91c61f8c6bf3f1fb36e94322642d55a11d41c941efd54cb7628606e3b806c208cbb1fd37427aae934d223ca44aac33ed0877de694747d00508dc498205ab2871438edbce2afee7ad82ec7c88324498588d9c04bf19135b50f66aca3bdc5776ad471732893c260ce1ff67d5ac17dbd5eed5338b16ac797539561f2e4f3484d5d87dd6ff667dcca3193c7eb703e1eb57bb9f001ceee30fbfe70077add33238f57f14206df8ea12bbc9145afd7d3c829e2ac2807750fe97507e6c2382056b49856aa1e8b6e3134cba161a18c924e2d68c55d4a710ca6449a2802d65ff8e1e3f2d93e658028decab58d9237cb827e50ef9d272ee00a77b205b051f88136f1f55b4fdd25dc7ebe8b65ed7d64e236bdda61b83a8833cb819e0d70b4ef993c7549c64bcd75415508dfa9ba4fec2360ebd14f8716441873b7aa2fd1344722a926a4f38e9b37eb34f1e9fc9b179342adb58084d4a9ca7a122d1d6b536a00af002d58b1d660e51d7c0d4a0010304b2435dabb8839eb98c8f343540c71342482fe78f4c4d47dfd33a15c72c84c6670243185d6d767b5bff913b479388ce1cdc5dfa2de048a600eb685652fcc3157400769110dbe84b5e8a898c8a46c7a487b88055aad77495a3445727d5d6dcc726d5c95eaa5ee2a7f4c8d7b453af2a72f01bc52ebe79a397eb95240e7194fca29da88b4e6ae3e05e5cef3fa51725e89b0afce4d07d373833ba1fd9e65b37de3d640ca17eb07273be98efda3de683b69ddbd0931bf8ebf4ad155c4d14613ab322a26656e614db8b747c3c072bfdf79d9700bcb88893053ef9c66bf1f8f459213db324e67f55fcc42b8cd00dd13ce4c0eef4d1a47b92f527de11bb330c15c2d2ec1fe32d55302a2c3ba8d892c696205764890b96fb636ec14f50b7c3d1afe3d315367fed7993c33956bebd3c825c97318da3b08449c485dfb90a37cdbc3a2f410abb9865903fc539d54205aa8269ad4db97f3f3b53e9868930639013c6b29727c60c5d6497307fc54ac82f5b03a14a1032e65425fee27f37607ef32e5481f6c866f0a81ea619153443980883071d307cfd1a4a7cbd865f63f57ecae82ab7d2effcf5077920521c61fab4316fd77eabb64a60e7110dc735dc14a64ed2ed89a199d0b5a5f476f18541c8542527b25e03bae087a1f57525416f72cd7ecaf4d655d1c114b9e49e978cd8b0e8c6136c194f5f40c5c69305d40afa968953bcf6879abb963d183d8122ad78d0624e744dedeccd21e6b3ab81f294e70490bd2920c132c45626bf1953105cdf2591d8f33e74adf71788601158c9ccacedd4720d5b212649abc1ce8bdd5211cf7b61ac599e92f065e115ab9b3a1b5d2c48271ac67f226bb1526cc29ce70b6d2543bdf3c549077aaa6a0f3c45f4e37ec6a51d0344222f251177352a6d826b58fb935f0f2f76e809c5e5424ea34b8762bc352f005ed504e145f1fd91dc8c996fabc17f085672707f7777b5755d24f8c7b1053f0b5945ae5a72dc1f2a45bc6caaddd0dc7d03259db31389ec7bd3b3ef951d2d5e793498475ba6578912f05f5906a0cb610d23e21abff0dbbdf88961d6cfc092cfc1ad6ea4f78dc34d6645447847c892866391a3793d389767d033366d165b8e2cb062d587a00f6f873d9ac05d7d08634097e826185ecac413df48ac594e55a69182d1e89795eaaa3c6ee067548ef839bee2434a40e2143d7d654a1ed37af0e13794b86f6065dd85c54201cb654898d420bae05d9f7acf3a5d02beff55ccbc76fb80c4742dda8fe1e9fcb5d8b71dd485635a85a0ba61b2b528ba7432074b1206ca2ccb6aa52914817ea8dfe211c037ff3ad982c783529bc43039e4c61323a00f5293cf090a984583d51a0d8ea3bd117a349a0ffa90be8d59314428273ca30a5bc40bd2841c661904310a22edc923d9b535e18152c8c358c0a205d076bfbcfb1f964937dbb50abbe6e33719db7d38ca74c43f982b1a5a41eeaa5f730c79545c6ee158511a44120eee3c5b4625bbaedfb0b35363c1d9428196117cb3c002ccefd5e20b8cbf7ce91fde7df77de03932fe3d6ca4efea38f7d6af71d074b5724f25818d7bd9cae5fc785255bae76ccb4c4a532face2a65c2e86c43970c3f35f4c4c28924adaa28f64d1f6fa7756ce5c35f24d4eeebf392124f21842fb547fa5640aa9f770b5a7c6030c7484b398c744d7c773b223cb5e5b0b0a292d19e2fa3f3d095e190059a53334a40787cc20ef3339665d0217dcd683b50355bf1a0ef00c6a632f7e78bd3f20a235c2839fc694803837696bf481ba8de24b5c53d456a94f865808b693b786330eb456527f9269e66a7e7b27edbba85a2c81715b415b11a32f3d09801d8546868c376119f01cdfb6562539ece57eefcd589cfa69100f35bbd8db3d29e8ebaa1c7f990aa901db0cc6a29850e205eea67f6dc5ddd7075954b0fac5ceff1a1394e2c5ba2415b614ecfd3ae2abe41e1e52081d93df2289f0558226da7703928169466b9e0e01d330217067b08dc07b70f2005928e4d54324af1cb2db83d01fd757ce0bcf2f862263a90d9d9ec88c3bbaf589db4189d9ced16b4134b8fe086b922cc43890cf6b2ee44843d7122918fa5df820026f010a45cc75bcefaf62dec68c09b11296ed5175f3c60ee0f0c68a031977a0d3585d7df8d1cee0923f0196365e26e3a264c90532b7686a878593e2395b3bd8cfd3e58f3645a68c8679d00ff6f6c541a0b0568b68cffecfb4aa72a38f18160513e669a542185883c1b2ea44bf699b55e75dce058bfdd959948e111eaa3ab46e75403c1079789bc8c1c12f991ae0a3b03a53a914f0e3d78c7a6e890e97462dee24b4658389c38e4159a9c40436386365170bd03b69afac0361d68ecb66535bacc802af8bb59432ed603d92984c3aeddc2038a6dc53235de11bf04728bf0a0f4ea5bb4000fbd7d5f8321e2b4365059ff2022d9644c13b9db78c87e7abea11ef5a4bfcca402f2143959000a474f39ced5df1f86978601328aaaf3cfe519d00ae2ea32ad8e8a6f4982b188ae8363fabe07aad47dc1115bf15a5a706f1256195b931eecb91e2e82df6a673e69e933bdf8e707cd65ab1b02678dff3e47ce7ebcd797b44f570719a59db6932e428eb60ce38b93bd669086cd79891ba2a1ddec579f77ea044b0a35c354d5fb19c45a4d6316ec323cc92bba3e25e05463de91c55c33bcf32acafea6f028606c983efa794deccba2685cd559f6979e5679296a9832506bb021174e04b9f6a84df9f0076b71170da45d3acb167c15ad586b1209886f3b95aa2fd0fad35a7d357a6e9ef613c53ecd509c9d1f714e8d40fdade034a62b70ebc85e14f203416bec492048b792c54585af959fe9d705092ab451dc01fe4e69c"}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r3, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x200}, 0x14) dup2(r4, r3) [ 446.843024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13919 comm=syz-executor.5 15:43:21 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400400, 0x0) mmap$fb(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x10, r2, 0xb6000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) dup2(r1, r0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000000c0)=0x4, 0x4) [ 446.886476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13919 comm=syz-executor.5 15:43:21 executing program 4: time(0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000040)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x3c) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f00000000c0)=0x1) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000080)) dup2(r2, r0) 15:43:21 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000240)=""/195, 0xfffffcf8}, &(0x7f0000000080), 0x40}, 0xffffffffffffffd3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8, 0x9}, 0x3c) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = syz_open_procfs(r3, &(0x7f0000000140)='wchan\x00') r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) sendmmsg$nfc_llcp(r5, &(0x7f0000004640)=[{&(0x7f00000001c0)={0x27, 0x1, 0x2, 0x3, 0x6, 0x64, "3cbb0dde54b88296bba5046a3f1cea8bc2e1dda2c1ed12bb2555d6625eb830b26cd06f333bfd5efe5e30f20f4142f51f1e012e5be14e09c0e47b2502144ee4", 0x2}, 0x60, &(0x7f0000001600)=[{&(0x7f00000003c0)="fa67762b38289c282ce2dd9ae899e953506ef79d1f62fea8a128460b3bc62e4c1235dd7f5ce4a18f4c65b055d907a50e7072aec4d8a8631c7416278f26838e7d811a5f6781e206379982c115f78e6cf6acf3127d2d91d7fa60f1215e9588ac8a847d4d3ebe37d69f2be282a61cfab3", 0x6f}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000340)="8c80c2f019f42f15db6379e2015a9dc552462881bfad94", 0x17}, {&(0x7f0000001440)="77bd77cfb235c80b46b61a0996a949f0a83376b86dbfb14ed318addb02753cd16e55081d89ea27f01045ee051eac1f0c54164cac13ac853eeda128b92ac86b761213b00d883def9311e11527189f96e663f15d0701756f8bd1d1e90810a63c5829cd15b8cc9aa611dc93e420ef66417f5d6eb60682d5d7b298714205800911bac5d319659e392e3946f779e127cbc10eff7ea1d5a24004ce1c4a9d98701de4728c77dd6160ef7bb7c468f1f27aa82e92946e9117e28b010f4e419b66231bbed2fe746a5b9efbfa4e444e4d61d928cf69e4bfe695e77db5d39e7c001b36e528687da6eff0b3e155f565141f", 0xeb}, {&(0x7f0000001540)="a9bf342704fd7d4ab1d658cabe161140e7558ed58870b69c8ff00c10ed6bdc5b7cc2c2b8e738100772bb4f2e4cd10979369e2fd4b4bafb77a916693c7e5b69646f7de1c299930f4da0fb41a441db7613984004d9088841fe8c56396f9f1cb0b19a947d4edf6041c7d86e86326b2ce3adc0430d9d5dd2a1931f738b4541fe0f2ee0203dc545baabc897dc89e747ca516da61ab66b394d00baf1c6b045d042183ec2", 0xa1}], 0x5, &(0x7f0000001680)={0xf0, 0x116, 0x4, "e53d637387ca41c66b98acd0a0d9b564bd38696fb6d44ecf390de69af452007aaa6c6dcd710f878216afbbd8723b7ff918f885f938b0ef1410e8638fe08bcbea8d2328f62a8769c771e80b10411f4e55e44651723e91837311304e3ddd7158a81e4226da0cf7ddb11843e1ecdcceb5dd1d9d3b3d825de120e399af38bcef6cca19a3cafd5fe8be65576890c3a0d4388b25e8ed0de3440e695c73b51f26ae1550ab9ccd62eb5b9970f1527612220533a54e9444b4d7f91d3357709c1252f51d929509d31e24a03c01d52c9d68768356ca9253e1f28c392143734c004e7545e2"}, 0xf0, 0x8880}, {&(0x7f0000001780)={0x27, 0x1, 0x2, 0x3, 0x7f, 0x3f, "37ba8ad3d85b5455c9344471d3516da8f0d59db69281ff634945039bf53d367b8d4409aa588250811e053eb414078b286a80ac8ba11e324731ccf0b29117df", 0x24}, 0x60, &(0x7f0000001b00)=[{&(0x7f0000001800)="40c820dae4555b98871f81ae445ffd15db2f83fd1c40c2e2ac6f883a332052741ca85d00ccd716e060462a54d918ec808cd0bfba48b20394f8a3845448cf77697a6004f5", 0x44}, {&(0x7f0000001880)="0d6a8fc5ec6d7bde532203db8f0a0532ea462aab939b5c73262caa72aab0d9a705e8ab76ea41de8450c5c565f98ed4335fca392d2d9a07c5224c7072457a0ccbcc3d2a3e51413c694b2f0a948ba8e3c9e1100ed9f21b44cffa4c635363790fb17ed4398b594b87dc324d07f5afaba61833231ebb9cb01b8d2a4040efb7022ef54457e7a57aef74c9547a866fe27f4dc82e9be2713e4a9640d32c4a6547abdc9643af42f8593c4148cf4a0ff62c464d5315ce0b90d02e2f3bdf782c81ac67356a6d33686147aa8f05790f828e8b729126", 0xd0}, {&(0x7f0000001980)="833fe7adcfb4ea29ffbd0b02dab634ade932a6a0eec484a42a74af88b0891ce03f424c5f1124307ce4cfa3ab42e41fc38d117870c5a1f1e42775dd56", 0x3c}, {&(0x7f00000019c0)="b8e4a933bfed1ce5a576ecc059430f5b9fd3cad5c236801d095b8aee92c583d49d8994877d1b07ada7e54893", 0x2c}, {&(0x7f0000001a00)="4e370447d16405240a0bd6caae0acf6ba076b6633a2f494d8f3d74f0fe5e02f08f265f848fe9a7ba56e5d344b5f022d48408ded9ed8f3bb42c6a3a4d1f48b86a2840b051a68339b1ca7c42c4e49f976bc8aeb238cdd067558d9bc9e22e7f9b3e747db01611033e624b18b0dcb825d7c746c78ff3df351fb0a7490901b0fb22917029f4d3f0d23d10a14c82f05e9feff4400cc3b69c73c34aeae2d3fb346367c3b203be83a230f3d34fe06635399847e3618c2f39b4c5a62c7898acb59c19095d14bdfe72897e2c01d7c193c3a19a0e50658030b8a36ab4066911be0ccb38ee1830ae67290930d4c94c69a3922c823b", 0xef}], 0x5, 0x0, 0x0, 0x20000000}, {&(0x7f0000001b80)={0x27, 0x0, 0x1, 0x1, 0x4, 0x1, "1748ce80840f00214a7e173afb666224df19836c506acd7ff63048491b3bb9fae0020fd365c890831d5df50b7ffaf320b772e001799164c92153a882a4566e", 0x25}, 0x60, &(0x7f0000001cc0)=[{&(0x7f0000001c00)="6cd4960600f474371b9660222671c6f861ab4c4d6fcc5ae0fe8ac59e7b2aec6aa4ac00d120db7abb676db79df9b5a7c82e46b02bc6a4ee7dfc7e519003841f53e347dbe686b22a66c83ed05ac45348fd9202a623410819e3031f1eb5271112cfdcf7265ae56c7afd95f13c6fc4f203ef2ed769a58e2ca1c45da42e596efbf90b0742b8c6c7db47a9e3c488f89d319ef1346054b4ed4ed7d8e5bff24c26ae950739709d681781a8d8ebbbf753efb8b1", 0xaf}], 0x1, &(0x7f0000001d00)={0xd0, 0x2a2, 0x1, "ddeabf64ac84dd78db9044f2e00f95e3cc356811c7578dd83a40a4e8ef068ebc16832ddcc1537f16e2e1c9a9088f7a9ed37a8ea85ed9f7072e43f7baa99d3faf5f90b091f80670c7a01b0d4a4d6a3a23be85abd4d51325cfc8e9f1d1acd1feb5019b547098e3311a0e3e28b4dfaa0e6ab66f93d8f2ea19fe60335686607d6c27282fc6fa9355e724b6bfacf58e1e548391bb56da9a3cf3d2e43b067f5639530b57454e38cf91df37ea9722beb64dc5a19aae3d3a467075ee26819e005d"}, 0xd0, 0x480}, {&(0x7f0000001e00)={0x27, 0x1, 0x2, 0x0, 0x5, 0x9, "9bfdcda2cb474e056353a3098cd2ba70a34d047bcabdeebf6fefb87fdd9fe88de071f8d8886e72e453d123b94f1667f3c0f25a0918c6b89682d1b55a841014", 0x13}, 0x60, &(0x7f0000002140)=[{&(0x7f0000001e80)="b6848908abc89b6b3bee9b7c51fa0a8cd48ed933d5ca45f5b5877edf15bf921a51efdfda1673ad724953a72ad516a2540a561811042c8ba6b101c5d5011c011c018e1019be23a80062804bb7e9253cbc0c6ca6e3d7adf5abd6d8cdae5103bd4f2697918b56b3f582928b9f281c79010b03ec33908854ef2294340ae20bedb3f97d49db9697f3df91c880090865da34fb183e1d6c31cac70268fcfb5d2690f43568207e30db2fd52ea7ca174ac4286aaf3cce27075b0ba61b507382e9caebc66b942f23d411f6e3391cc9dc3f42d218960c7c0191d948dc301d8f1b93edc95db378e8a72b46a739d320", 0xe9}, {&(0x7f0000001f80)="6d4c6e5558414ac74874e0a9e1f1ac7888cef864f08b4a84c828a0449ecaa0af61ff989f9bc912190eb509da2ef986c9a00d360f6612", 0x36}, {&(0x7f0000001fc0)}, {&(0x7f0000002000)="b392723e44c24370922d7f24cdf782425616890f3c9d6d302d4496bdfaf3331963c884f3b1c2708032e470dac2c7b2229e36fbd96048ff34c33baf9d9d804a345b35687d404a0a2e17", 0x49}, {&(0x7f0000002080)="d6a31d30a651104afcf18d26dbcbd524613426eed896d05e52a3d1e5148c88044b779eedfc7ef09de058c54dfa797174f392473329902bc158b9e5db5a1fdf2b26694d2ab239856e245e655e8220092d87b145f927a8b9d122997ca6a27fc64593c743a8dbb777197a88438d8433fda09236c25b2ffc641b839e122a4e61e7ef7ac2249d222c2620dcc93f3fea5df6322b5bac7028ab9de117e25058abcd", 0x9e}], 0x5, &(0x7f00000021c0)={0x18, 0x103, 0x6, '\b%qU:'}, 0x18, 0x30040844}, {&(0x7f0000002200)={0x27, 0x0, 0x1, 0x2, 0x3, 0x27, "bcd9147d3dd3645b1df6a0c911831567844d7be6619e46977cf4ddda51eddad7f09e6cd17b53c0d27424a64727f378006e4736d9c31d15d1b9a05c4921e83e", 0xd}, 0x60, &(0x7f0000002700)=[{&(0x7f0000002280)}, {&(0x7f00000022c0)="1cece0b55161a1e7256a684ab6b0918276d4d92e318ac4bfd692faf07e155e3872590b28e5bfddf4ae845ccca2a02f6a59392b572a5a8bab77d47b4acd92c31f50f1cb673976eb4947797c0e1165513dd177fde3ab9568ccde4de488cea288dc64cfe735672d12d61a9b15a173e713fe42434e62b3b0a6bf170c06fc5679e69176c7ef69095ce3127ebcd3d4d1c169b4f7d0e28db58735dad955e87d8bc6377ee70188ef70059430343746f017d5fbd0ab3861e69704535a0a7b3ae6cb686a7b162c2a912e18593f8043f7889d1b6ec094c66c7d0e5db784cfcf73dc13b2", 0xde}, {&(0x7f00000023c0)="063da075911e93ebd4f3b7e4ff690ed916173769209621c251d90d693ef9ca6c1d9953747480c6ce4420d2258980d9fc4d9331c69c5e93744c46341fdb12c5a865ad70fe90dd6790bba787798261d6d66055891983a035b9fb7ed53d1694c2b28d62bc82ecb24491532e9a2af8b92d6d7aa305eda79b4aaea5fb9d183fec0382cb9ea59c7c", 0x85}, {&(0x7f0000002480)="84f0634e1336501f0cab9eac81a79a1aa820499f137a4ac19e734bc7ce3345d2425a68e446f4a9b613e91c902a39ac52bda631cb03edc46167f98d2b979f172a3100b6f47148cd4953", 0x49}, {&(0x7f0000002500)="7408993859a99c2acd3b0d017fcf7e9f8ebeabe71e2a8986b5a65e4a4ee35008f428c0bb14caf0a9dd3296c230cf7b2a1a3ea87cc10fb54b6af995b8a9d594d3a52db63f12d8afa300a1c742c72751eab6f402f69514767ceea5dc416bd97368f2b1532b2a621773ef9b03ef63d1e1adadfdfdd90cc83b12f92cffa080554bdccf0b3128632fcc2ec0a9554ed7cf9dbff346be4b8bb51e3287377c01d09959fbffb0c84d9dc6194460d7d5194d30f5678e8fc0b517f0b14ea9c163d75cf9cf", 0xbf}, {&(0x7f00000025c0)="8d9444756e79ad4ba8a92b35915e8975561e7674c2e9cf7dd383ecf59ea5527aab194d8c28faa766459a827b22927c738025ceccb7961c40be3c5e4b", 0x3c}, {&(0x7f0000002600)="637d640fb9ce597c4dac9c3088f4a3d14b23354efb1c833dcb7e5050e2832e454ed5b7ee1a81036d471c2539b7edaceb06a67d8fe99cb212922967a4be84025ff517fe643f9b7b82e8e0974198459a67d661ed8602f0849fd04dffa3aebf563d11ff7d307cdfdfe769bc086bfd088cc132329622b3ff32e1b030ca5be1e03e6432cdcc4ce8dcedeac7b106de21caddfb63f705", 0x93}, {&(0x7f00000026c0)="cb97cf836c660f39bd5614081024981f5c2c52", 0x13}], 0x8, &(0x7f0000002780)={0x10, 0x110, 0x7}, 0x10, 0x2004a1b0}, {&(0x7f00000027c0)={0x27, 0x1, 0x2, 0x4, 0x6, 0x81, "970cfe48e7b720b4d4d3c03e8768ca2ec62126216ce4f6821fc28ada04e721da95ad02547308e28fcc6db948cf34764a6c65cb55979a2ffd888d1cc49ba951", 0x34}, 0x60, &(0x7f0000003b40)=[{&(0x7f0000002840)="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", 0xfd}, {&(0x7f0000002940)="79126241fccc0ea46da43a51", 0xc}, {&(0x7f0000002980)="b17fab31e8c48a66bd2730db56d0e05d1352db04547d7f1fdb2f02cd74af5a70ec62bd195a2a05c6365db6b3a66a893efd22ae5251939ceaa0e73829bd", 0x3d}, {&(0x7f00000029c0)="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", 0x1000}, {&(0x7f00000039c0)="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", 0xfe}, {&(0x7f0000003ac0)="39db48f92fb75baf952528b3a3dba4e394747dfd9dda59af5e7cddcbcf2636907dbf205fdf779de8653dae9cedfdab4a5c055199a4af7f65cc4f70d2391831f319e16e4b7c21bc53d3b24adc7f5baee7468ac03c12aaec8fe9aad71186779256d4a1c3f1b1", 0x65}], 0x6, 0x0, 0x0, 0x40000}, {&(0x7f0000003bc0)={0x27, 0x1, 0x2, 0x0, 0x9, 0x21, "f8f4d37ef1b102e4bd8838a388131d210d20e734442a1fe3ed4b507458deb61625c8155982e17911347184d38eb5eb1fc43821b4579b88e4714fed2b28c10f", 0x12}, 0x60, &(0x7f0000003d80)=[{&(0x7f0000003c40)="0b741503f5a431040dd2540c1ed430cfb0e788dbdd68d82a0c3ae72d5581f44904f035e36f0f580f60f32995c2c5a65425570efc7afc74cb1635982f5ef0996a5ca830bad6da91012bc0d6546d3471d7c9532cedbad20688296a69d2c9f5a56228f67bbe2b61f7288c8939d0232b490cf040fbb09745bcadc1e3a5ec8a885d63da0d7ef2efd3b9effed6aef75614083ee4d16ffbbc1cd353d6eea9a990d6a620f16f1b78c30463860611a210f0cc2e7fd8b83b1832472f02c79dadbffc700303fee171b83be2a080e2e05f0a561086b4cc4d1cd07a4d991ea28685757c3303feb17291046e7475060ca785", 0xeb}, {&(0x7f0000003d40)="e76c0530", 0x4}], 0x2, &(0x7f0000003dc0)={0x100, 0x104, 0xc824, "9f86e7813c81f15376bac39b6f75ef415efe119763e6c1f6ff5f88b1aa9dec54bb052648b3c478a458e24310f9f82f8a840b0e4c0f10081a1cff4df0da34d46cb61d939f2165855e7a9a99fa9b71e0faa14fb98ef901ebfad21fa15729b3bfb39b38911381d4cb80d3e4c54dc5ef3e5ca7c6f47a3d6e717df47c87ee6bf3b1526b61ea728db6dc783f5582afb11106b6b161876451b78cd92f5d56d3f2d40d0b08ff787c3d33324e8b910fcd84430eee1a65d5c956fd2bb69107dd3f3c00b9f0e92f3113b67b7ee9590092aebadf83599058ffc5a2dd938ccdeff300e8983b44e073a51b118bd044ff"}, 0x100, 0x4000000}, {&(0x7f0000003ec0)={0x27, 0x1, 0x0, 0x7, 0x0, 0x4, "93be75e294596672ed84d610fef267248293114e7fe545dc8e05a4e34baffc0989530379841b80cb953e89d9ca67179fafe44f4fbd2dc2a3ab98ec8b6ced78", 0xf}, 0x60, &(0x7f0000004100)=[{&(0x7f0000003f40)="7cb4bfb41de6a6e6f5fd96f3ea9307d44007f0f3d227d99b488f78a1693d8e0eb3ad2966b996cadf734017d54d899e629a13b7422e43914ac04ee65e5e3ea4eb75a89d451b190dba3770873c18657d77632e9c91c8aabb2739f8c2d17f05679d9c205587b530ac3a8aac46c7ccf1e3866487b432264c2c41b5a08075eec0785f24d5e489f01295ec014c802cb8b4a0b341842304fc3ecd69aa3f9d8f796ee87979ee8f8355a3e1fb6254477dfea4cb5b99b9289e", 0xb4}, {&(0x7f0000004000)="2eb63e2264bbcf222235623bbb1bee16752f2e1d76fae655cde3e0660f781cf1d0afe1c9cc7f63", 0x27}, {&(0x7f0000004040)="19607eb3fabafbe408e7f89086d83dc3d930cf4f84a4e03df935f9da48d7b395ebc8d1a7f0c585e3cb2eb947229a0d2a37775a2393d6e844f30e2e57d154fdd3a08fa29e6f132d574db6c1552db5326796f13a60b2c655637f4e63e55d92b87f9a60a71c6217fd01dee1857fc4c402660f4197e08df9085b862916351951774982cff4ba7c6a6fc2728ad5", 0x8b}], 0x3, 0x0, 0x0, 0x20000000}, {&(0x7f0000004140)={0x27, 0x1, 0x2, 0x1, 0x5, 0x4, "a59df09e7957933a01194b9e63d3e47e6f417ae29fdbf6f6d04cd872aab81accaca136050bfd5d0898b1d016c82910d4fccf81eca09668db518d1818e67035", 0x18}, 0x60, &(0x7f00000043c0)=[{&(0x7f00000041c0)="7005882de219d879e29bd3d466f7115735b02386e4de0a33c31438c8e36e3f42967e5da305beda7d807596fc841ec5ffcacf5a8502545fcf7af2e003b3e83aae3b677725942b35a6711e2929de7fa626e737c4d9540ae5d7f8e11e508cab27c316a7db69368cea6c3f0c32fe09d90f9615a4", 0x72}, {&(0x7f0000004240)="0790f67e43eb88d8c0b8a55d4539e982", 0x10}, {&(0x7f0000004280)="40b625c45f7d8773ef06f17914a93ded927e3a76a21b9417b2fe3b13f413e06284959ae79f3a1783e249f926ee4aa39dfd7432233ce62f64bfcd9374e932a79112993bbe73ad48bb50bc269fec4afbe6a4a87f30a3a1b1f785d1347b371f344a3e575b92b38eb5d33b7c5c8ff602b7823409a1d3bcb40793", 0x78}, {&(0x7f0000004300)="5b5ff6939672e160bfe4fc0be873bc86b5e597b98bbb66bfd7d0a4c47a01754db20053c683adb1a4bb1d86503ba5eac6daa2aa893516399e354c5846f4b608f2bf40d2778104dc2d9b1ea2feb0de6985ee207b80038a518439a2fa7076d6c8009058b789fb6212419d03876622a71e8fd4f9bd65272f193c014d8d7defd30fda1b8658de448b6a0cbc2fc8853d882873f231a5c947a3772e80", 0x99}], 0x4, &(0x7f0000004400)={0x50, 0x10c, 0x7, "c1320edc14112fc26e00b5fc6822c813c91a86d44751006ce761985c0b4bdc5b1c98d4d9409ffd2d659dae18f4aef6aaf722dad39f00a75116d7"}, 0x50}, {&(0x7f0000004480)={0x27, 0x1, 0x0, 0x0, 0x0, 0xc0, "71d6b3864058438c5e04948434eb39f4fae6155686d6906a3355d8346e5a41b5cda0f09decab2d677facf5fc89b8af02c3b63820516d14d6af9e7a0b22b7d0", 0x5}, 0x60, &(0x7f00000045c0)=[{&(0x7f0000004500)="2083fe3ad117121a146fb667966807f8f5629e5e25eb31b352a526f94fe56f62eb4d109adb240c43c9fda105c29592d33be59dc615c020128c47bf2d94dc70e62858366c6dbfa56a76c0a5004e081d664b3a65cda10dff8e193aa67cbc682ab7bef61ce0829a883cd4466a4a69eb88538e081ffc198fad", 0x77}, {&(0x7f0000004580)="10080ea8639c415b9f0820ac9af8445a729e8631472e", 0x16}], 0x2, &(0x7f0000004600)={0x28, 0xff, 0x495d, "f42ef16b9d1a8f8037be1ff40b4f1eafed74"}, 0x28}], 0xa, 0x4000) ioctl$SNDCTL_DSP_RESET(r4, 0x5000, 0x0) dup2(r2, r0) 15:43:21 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x4000000}, 0x3c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r2, 0x4008550d, &(0x7f00000000c0)) r3 = dup2(r1, r0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="030f70c2102701779b056b5ef00e99b73fdb6ad63a6b6abe9438de393102bf1af5f5ca4b", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000cc0)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r6, &(0x7f0000000180)=0x4) 15:43:21 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x40002, 0xc) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000080)={0x20, 0x0, 0x2}) 15:43:22 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000140)=@HCI_SCODATA_PKT={0x3, "4d2143e8b0873267be325875de646b12aaae3977e5ea08b31738d1c9d5d27972bf765dd2cb624ee416485d62b5e1920faa39f36541412d1ebf8bdba4ec318987ceb5891e19d4ab17e3116685aa1c5a4047354c9bfbce5681386e9115354488d8d1d9901d84d149ecb1c9d23053b1fad6c79bcff4e58decdcec7cb3fbe41b72cfeb3d2a2b25a134a5415340df029c553c4d9348928a5c8aeea163ee77f3f968e8e760f1c2033d27c4f89afb3c53e0f482e68c9d48ca6e337ac41a33efefd25d16155c051be8ea4b58cc7fad2321914996e7b725ba5ae0c4f20b94b11f7dfcfa76757be769da13eef02e2c1fb36e92709558c3849f5935838589125fcea5c4c7d7c8e03b2ed9d5bc80d9c98dbf66229edd152e9e15921e46b0d77a29b8a6cdfc4356232d3d799aea5b87abc1daef372c228a3800ad218dd1f67239bfdf15b274dd3e71cb29be41f6623845ea4530e8a6e30a6d0573855de42cf5c9b3fa62eec963e66d09f326a2bf13e4a46b2db70aa715d15bff8f624847c34a1e78d8545f3501d486019b1460ef0c241669b989a5b0d3ddac8c8b0334642985c8622924f7822af5aaee5af40ea2c1ac8cb85a6d4b9155fd50757fb6fe0ed1bd4220f17089a7c0310d78e89c160a311dc30e467fa928a7b9c4791fb0e0cfa1d0dd8f78ccf397daebb9d2a04337f0767e55e1e3c7aa18fd3d5d03b690c7103c5ede383f2485de177004513f96eb8ad85c80234681a955019ce5a5e3b9cf2f95219edd8504a82c3dd9a7a589c7ce819db4f59e7272c641b28ff24fb73ba341cb2d258a4d636172fc5fc289f248bf862482dfbae202e4d61567faaec3901cfa76472b8a31e69bd3f4044d55b5fab7c5a25e4e3e915fcd00741220e4efde2e55d64cb66d40ff317c668b2e2dcbf1b02c5e0ca8802ebae66ee03ac8ec42dc427eae97ffba55eb122d7e8866caa55faf4c483bec4d0c457e37c9604246e9284a90db303da2ee9ef523632e8e6dfa5000ebbf9b8f7273a36a5f6f5b00025e7689f3f7aed1bef362f17813e5e3ef9fc0e58511f511bd9115222fe56d344c5cfccd2591da6ccdd5dc3092ff5d2f2007f3b78c09d75a1a8b201908c4a30e4d1baec9664ff28f6f1319debf6a5ea2008dcd0528fb15cec2fe174e3e13f4fe61ff6a8bc08d3265141c6e6c3db62d775b29cb29946ff84cd8f8dfd4f7cbc0e361e227cb441037e2ad60a6c9bb9ff6a32887994c9cd33fd5eaf1538578e922a362e8d341679c1d8806e45e5c1157983f5d5e89c88adc820e905d782c53069f8cdb4f59c3a79f97cb8796e02ec4ad5106f1aa83d2a4b6f48144ea3e91f637ec8ed94f0344dc4211eee7b0fa0fe21e3769356c8be75e757f9b6b5af8460af5be2e1dcf4298c335de1468c7d3d96c34f65c9b17be6595170d178b489912c456bf716ef3d4250f0bda573ae288974c25905c8e406b9f8ed21e92c73a206d85904fd3aed7060189494bf74b8b15c8d939d21cf6ea31b9fb831301d6efbd4285792ed8c1b16d9ca6f9d8a4478ff2af292accc79ea4375a023fe31448dcc786697a14312decf1dc66f24e308cfd7ebdeb68d01123f8ceb2a4a0905b292e09fccb58849b86e257c8e2bd721d5aef997fc35290c72d29b654df1c92bcfa78ab9f0fa149e8f79901ca94b7010c5bf4bfea29b3c8287f240edfe7297f52ae897bb7442ba800ca81c67e49ebe17eb32b861186fb844143d407c8e73a905080467efb84f43e1b58149be1beaa2beddc6a8b74ad9623ecf90f806ff7d0dd5e4223ad42b9a6fce29f78593d142c16c76d765bc6914dbc8a17cea3206d4af728648060bf61ac67d645b78bfb7abe10c081652f44d1b41ebccdffd7f1c125d9be6beff675373539d57b6d7325b0a955d2f538e035556b5c1e778296f3ad9b0b96365db12295975e19239b715decdcabb0e9250c5a86c7a9343921a37de53e4d69bcad1786828f761d2dd1c234029730006e420dc9662afa852953e780c3f88c351c723dd893b750f1c798b577e21181a6d968e5e8563c18a411c3c3963a8c03da043ac8b6b5ea962a0ba7f053ef1f0c2cb2555336563acfd08863ce625189c0cb7006b0fefba89fe62a17166f6505c29634dfa38f521c349b79e2dd25bd40b8bc4b5497df7a4c22ff3b52d2270e8e9b65f5235172ef0aaded8c234afdf308ae5bb2ab0751fd7ddc96d91a127f627f38ded85f9042de98169d42d19ee970fa5a7b1a79ac3a3990e23c8c0f979b279f3942863ec962a92e92d5ec3ad3093cbec1e01a8e4ba58c15dcca124ca7a6ff88f34678bef4fe4825f3ed5a8e3a002f0a6f72ea0a9392ead59a570b3f232dc6313699f4d175f1bf55ab6d085f8abdb8159807ef2c8493429502bc3696f08d7a9c9dd4c40e226702607eef96fef3b7b6c526ca83a1ef4f636a6e4690039f298988bd90d883f8b41e85fcb923d95a94f4807a355bbc511e8fdbd655b2e02cb020c4a61bbb0a8673508b70cc10e16cf58bf7c2bc0fe07fb2319b042b347bad71dcbf4d13b00a3fc0924375a2244a32ba518de04aef70db959e970b776e53a194e9d587618638bd8e4c82bf206be1e2fabaf3cfb925565b14371cb36fb1deb25d939be737e6a6ed5ad05d7cdc4b0d7e8f6b05fe7c6534808209a510324d4577e73653852e567554dcf249a0f398b66c15f0f6b058c7d97e56aaaffb38a4e58ab4bf40caf0d81a4e644709926756e230e552a0f0a188ea46ad26f92a26da7c843b670de78e3fd061dafe9eb47a3ecd8a9e298533d3317631b7fe6179a28a085bdf9462750ff090fb75160c9fa76734808468d6f2793def097b4395a3298be50d5c2b2580e9786885b8488961ffa99960f0a9acf9c28ef9e21a2ba17d3765c5594e070c9e9c25f4c8d5ef494016eef811e7fee09a524e79c0f5aa296e814a149e21d95eba939f42a731d06d6893da3cb6f31da9a1f8683737b836eb68ea37815048ff7d890498c8e5ad316bb82d518f03709e4c58328c7d8568a6f35db72e1e358d1d076af49fb6a6708db6929d5598436af0e4ae38d95ec7525acedf7a0eab35cf9529d588b8571c5ceec14d3e0943cffbae19bbe56a855488f429451e77ee7e58858ce276e0514cefdcb9ce1760ae85c0f928ee011c8a75eef0da69c6c6e67389261dcbab92267479dcf14ed331c5088be904d460198323e54bb164aae68b6147b69e6fe64bb3e0c9d0ee02ab8816a3c671c42c7015fdfcc84d4b4597959a27db8d4680bed1b060e47aaa901335587d10142dd7223d14432c405d8fd1198e219a70bb7172d5472ddf7aa7e3915ba4a992a15494164ff061360da6c31a7307edd6b7c3c55c02efaa8843a7b879cba477db3fc23a99e4177a16483597eda9ff00e02feb60083ccb3e18ac1c95810260d8871bfe515a657b4c4408982d00f0f62c2c3f7746357096ed13d419ef4b5bf0a5f0c364e2fbde136c5379a231fe1cbca063969651a28b57df24e57105902cf67de95d830847aa60d45594ecec1b5cd896bb137e5645777167683790ce027c33fb6480d6769285117c1f29d82af2b8bb79c8cbb3f4ad7a68e86aeedd19bb8d1770b4e8a63ff8d1916107c2fb15dd270d510ad358526b4077d7fa6602c5846520385160c01ab13402685f45f44c1b1b91371272893dc7b2398a5a38df04f7069a128a716234ae62dfc270751ed06e776900d4b7223d0c7fd4a8aac06ea56db4d4f79682b1855355e40ad529c1df1d3f25f37fe8de5e5f8daded6960894c85e5bae6fec1ca3eae82fdc0e9421a9edf96a082b2e5d691f09d0cac1cb2702b083da6ea49d6e16faf6ca84e24ff3d0426ccab39a56d4d697ac4c4c09dbf32d0828d202c3fafefc8dd2011c08517422934af62849bf1c878a8fe50d1610c278a41b3a04286a0c2b730a43ec4c137170adcadb203918d565f2eeaa16e6be17617343588b628e186995e32cef0dd9434fc90aa0b6ff640ca1d204a1e813dc19012768cadce4a33c25a6ff6b565c8d4d0c98c6ad9a95f6e2c6cacd8a97c455093c77de0241c211647ea574bd51ed50b9d89eb8367e2c928e049806243a9935f77ca59851a2f7299e49252097b9df6f506063b07dcaf84dd03705604b6c8847fbad51476bc3507adbf009c74d1d92dc7f05a6614075557ba323d13f6afdd3b9025acf9843f32240679ece1e0fe43bac3758b9f102b7da10c9b3d719f173092cbb8b7cfcb44867867a7e64d923edb09d3561f79828e005c2b0ff705a85e296da2adc42b9587e99f9a4222dd234b95dafa3a277b38dfcc82fee6f728c6915299db266266cd52a2c6f56f513e4157f4e70d127534f0d5eb4dbe332924b611f3d64f99c5288728f5cd794812c7801e73162aadac6f4e2268e1c98a07d2e15d1d9c59a3d245c0663e2936e4bff1bd54c8a61d7b8580395aece8d50bf564bf343f0db225591703f31ccb6f68d81a11c34b6b8f7455f266d62503cbeb4fd2c9e17504f8bb8a6c5b402d1044f7b5a5596c150e78ccd6f0a6adcea791eb87b2d5fe2b120dcce760012691c6baefe19ff3b81f5259619423628413ea4643866cb689a9042968e3407307c1ff5391ef9356a9ec5a54aad5f6f5bec46f57c50674fa7fa83c9320dc0533688dc22669be790369486b87408c5acb1739cf752c32bfead068474b254365212229a2636d9664d015b552d6df4c2f1106f70f135fea150202f4b41ade9503541d159a3c8710493577970a1978ce748a0bc3e795f2f111185280803db4ef5f0f91a808a480baab11a61f54b364807ff8c3f7cb7f9513aa922bbfa91d35afbb08f083ce6f6e6a2733af12d342aeb6032372e95c958d88233993010cfca2eae19f352059c5265b46872fa94ad4c148f54605a09c3db1a48d4ed5b166a2404ab715c3cee5ef7b42d388f4d437af96b76ac8e4f0baa7036f43e39c4c7fc924ba193e92f7acced8968fe753809f0b2fa4ea1d238b9f02c4e8f3491f2e6c1529bf4bb22ac5722f57627b45d4ad6f2cee86f00d89c047f4647db429e0a4d991343a1099fe3b4049620d13be2d8a2bbdd7c553909ec4353ea1df357b01a8800a8daf1873987f5eb7faac7c54de0cc80a3a571792557940aa348db9a75fe43ab8dda363fc74ab5e29b8cf145dae2c7aba652f283fdc13a6ef9ca8813d633ffa7a16ca4dd29a8aed3bd1d355018713cdbc9269a090f33e4201989220392686616d07d73d2b193f63a5a8550941aca92bbaa81139040716e9e3cdf83da4a4cc02eea607085b842fd681fca262e1177ccfe128c0831201aba3f0e4e00107c802865c08aeba5ee4af6022801e81072e08dbf31f1621ef6495c2981eaa60715d57795a969b002b4b33d096b769415f5f2da739eb1a65f981d2575db60a377a71e6ba3b134f88179e507a36d603716d4932fe3a26589c95ade98283cfcec39d6732b394a017385a529e18c72d3436df685bfc2bdf84a4d63807d624be6ea7fcfc1a9fe9e63f8b801f18a0a968ae9022f0cb6c7a44376f7b3643218a5c78b9e5c5f577a0fdca514a687f771485007897f2b516d9c745db53c9aa9e4c25e6d657f63b2dab5196bebea58e7aca11e1c898d0319fd93c7c6248ef00d55696b96d5bc12de6dfa90821caac10bb699e7909e3c3f980676e2600cb534faf6b94a6358ea1c1990491e3c97495cf1a115a0c13b11a9c4435120cd12d484145edaaa35714083a057dde01b55610bd5be9f365328f1ba72b3ba38be205cbe770813a44b71711c5d0e783a22f29c866c1d29f8a922b4ea89651f37e176c0758f87ea519e60db9c8fc22f5"}, 0x1001) dup2(0xffffffffffffffff, r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x0, &(0x7f0000001180)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=r9, @ANYBLOB=',max_read=0x0000000000000004,blksize=0x0000000000000400,default_permissions,allow_other,context=staff_u,\x00']) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r10}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r11}, 0x2c, {'group_id', 0x3d, r12}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) r13 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r13}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r14}, 0x2c, {'group_id', 0x3d, r15}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000001280)) r16 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r16}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id', 0x3d, r18}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) 15:43:22 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x8000) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:22 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x5}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x40007, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r4}, 0x3c) dup2(r8, r0) 15:43:22 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) delete_module(&(0x7f0000000180)='/dev/vhci\x00', 0x1b00) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = mq_open(&(0x7f0000000040)='/dev/vhci\x00', 0x2, 0x0, &(0x7f0000000080)={0x101, 0xe705, 0x80, 0xffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) mq_notify(r1, &(0x7f0000000140)={0x0, 0x19, 0x2, @tid=r2}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x401000, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000200)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r4, r0) 15:43:22 executing program 1: r0 = semget$private(0x0, 0x0, 0x8) semctl$IPC_INFO(r0, 0x3, 0x3, &(0x7f0000000200)=""/48) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000040)=""/148) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r1) 15:43:22 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0x1, 0x0, [], 0x0, r1, 0x3}, 0x3c) dup2(r2, r0) 15:43:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x111082) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x2, 0x4e21, @rand_addr=0x1}, 0x8, 0x0, 0x0, 0x0, 0x101, &(0x7f0000000080)='batadv0\x00', 0x7ff, 0xffff, 0xfff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r2, 0x80044dfb, &(0x7f0000000240)) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) accept$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0xfffffffffffffee8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x1, 0x5, 0x9, 0xc, 0x310, 0xffffffffffffffff, 0x0, [], r4, 0xffffffffffffffff, 0x3}, 0x3c) dup2(r5, r0) [ 447.275214] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:22 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) dup2(r1, r0) 15:43:22 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5226, 0x282000) accept$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="011000000000000000000800000014008100"/34], 0x28}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1261fdeb12a42c2b}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r4, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x9}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_DEBUG={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) 15:43:22 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, r1}, 0x3c) dup2(r2, r0) [ 447.350639] IPv6: ADDRCONF(NETDEV_UP): veth169: link is not ready [ 447.405507] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2700, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x17, 0x5, 0x7, 0x9}, 0x3c) dup2(r2, r0) 15:43:22 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={0x0, @llc={0x1a, 0x17, 0x9, 0x20, 0x3f, 0xf8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @tipc=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}, 0x2}}, @can, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x7ff}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r7, 0x0, 0x200) ioctl$TIOCL_SETVESABLANK(r7, 0x541c, &(0x7f00000002c0)) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x4c}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x58, 0x0, 0xcd07d5576d92c377, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x3}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x0, 0x3}}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r6}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x8}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x382}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}]}, 0x58}}, 0x20000400) dup2(r1, r0) 15:43:22 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt(r3, 0x4, 0x3ff, 0x0, 0xfffffffffffffeaf) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r4, 0x0, 0x200) setsockopt$packet_int(r4, 0x107, 0xe, &(0x7f0000000080)=0x19, 0x4) dup2(r1, r2) 15:43:22 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:22 executing program 5: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$vhci(r0, &(0x7f0000000600)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000000c0)={0x2, 0x1, [0x1, 0x3, 0x101, 0x4, 0x7, 0xe1e3, 0x47ba, 0x3]}) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x92, 0x606680) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000080)=0x1018000) r3 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)) dup2(r0, r3) 15:43:22 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x5}}, 0x10) 15:43:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) accept4(r2, &(0x7f0000000080)=@generic, &(0x7f0000000540)=0x80, 0x800) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000580)={0x20, 0x1, 0x3d78, 0x101, 0x200}) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000040)={0x0, 0x0, 0x14, 0x0, 0xdc, &(0x7f0000000140)="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"}) dup2(r1, r0) [ 447.633938] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:43:22 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x14c02) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:22 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x40000) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x400000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2afdf28a2efb2273, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x15, 0x5, 0x7, 0x9, 0x80, 0xffffffffffffffff, 0x0, [], 0x0, r1}, 0x3c) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) fcntl$dupfd(r3, 0x0, r4) r5 = dup2(r2, r0) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x40000, 0x0) ioctl$EVIOCSABS2F(r6, 0x401845ef, &(0x7f0000000080)={0x5, 0x1, 0xa5, 0x40, 0xfff, 0x1008}) fstatfs(0xffffffffffffffff, &(0x7f0000000140)=""/78) 15:43:22 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt(r3, 0x4, 0x3ff, 0x0, 0xfffffffffffffeaf) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r4, 0x0, 0x200) setsockopt$packet_int(r4, 0x107, 0xe, &(0x7f0000000080)=0x19, 0x4) dup2(r1, r2) [ 447.691545] IPv6: ADDRCONF(NETDEV_UP): veth175: link is not ready [ 447.717123] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:43:22 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000040), 0x4) [ 447.828650] IPv6: ADDRCONF(NETDEV_UP): veth177: link is not ready 15:43:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) 15:43:22 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x80) write$vhci(r0, &(0x7f0000000080)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000002c0)={@local, @dev, 0x0}, &(0x7f0000000300)=0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0x40}, 0x3c) socket$l2tp(0x2, 0x2, 0x73) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x418180, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f00000000c0)) dup2(r3, r3) [ 447.911676] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:43:23 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt(r3, 0x4, 0x3ff, 0x0, 0xfffffffffffffeaf) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r4, 0x0, 0x200) setsockopt$packet_int(r4, 0x107, 0xe, &(0x7f0000000080)=0x19, 0x4) dup2(r1, r2) 15:43:23 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x200) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:23 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f00000000c0)={0x7, 0x3, 0xff, 0xb2, 0x20}) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x18, r9, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_NET_SET(r8, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40090}, 0xc, &(0x7f00000004c0)={&(0x7f0000000e80)={0x1d0, r9, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x754}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x14c}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x236}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff994}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4714}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}]}, @TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x54008002}, 0x10) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r12, 0x8010743f, &(0x7f0000000200)) r13 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000300)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r12, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x484b7b534c6ca5aa}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r13, 0x100, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0xd}, 0x1, 0x0, 0x0, 0x3e5312680d97f848}, 0x80) r14 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r14, 0x0, 0x482, 0x0, 0xffffff5c) r15 = socket$nl_generic(0x10, 0x3, 0x10) r16 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r15, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r16, @ANYBLOB="090700000000000000001fffffff0c009900ffffffff030000400c00990400800200030000000c009900ff030000000000000c00990004000000000800010002000000"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r14, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r16, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_STA_WME_MAX_SP={0x6, 0x2, 'cD'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x855c960541db6430}, 0x9d8f49449c2a9e10) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r17 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_UNISCRNMAP(r17, 0x4b6a, &(0x7f0000000400)="e2faffa9dacd8dbcfd562ac4c7549cc475d696c0076d7574e24cd29423bd35bb7eacb1342c5ee2d27e7b5331c64f773379479ba834e48d512f26cd37bc35b66d6de73466b226374f90b0d9f17558dab74b87c7e8e38090aa4bcedfa49047767cbfd2a1469bd6029e7e5be64ca8904aa025706c71e667042b346e833c82d6bf5dfd8b7ef1a3efe8a479ff4c706256d4f48169d2cf6696ea847e0435") sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB="4c0000001000810500"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000240012000c0001006d6163766c616e00140002000600020000000000080001001000000008000500", @ANYRES32=r5, @ANYBLOB="5d908fe8de1adfddb5a6ae9ced1fc40a5cf834ea065b738e92dce1b2157063517d449842d95098d4a99ac230dad230c953ab31c1bc342761681f4ec863165062d4cd2ef15e3f1ed294d05a0486d575ee85f742b29174e07792f4335371d7dae29dd8fa9e62a839ad88718e7680a24492e6480807810f3062150bf5aca2b5b5dbfd764f3cac1bff1bc6800713e1c3c5ec36acb7d27e7143d3d6ca30c8a133f9d8584af6bcf7e6ceb08f8d7b52efae5b88208fc8d4e59d9e1bea8943177803d3b0277c289a115a59f52e5f47028a759571de63a29fa792fe334308f749a7d01d1aca7ea17014cc9160d4"], 0x4c}}, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x401, 0x9, 0x90, 0xffffffffffffffff, 0xfffffffc, [], r11}, 0x3c) dup2(r18, r0) 15:43:23 executing program 3: ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, &(0x7f0000000040)={0x3, 0x0, {0x6, 0x20, 0x8, 0x7fff}}) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8, 0x9, 0x80}, 0x3c) dup2(r1, r0) 15:43:23 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='reno\x00', 0x5) dup2(r1, r0) [ 448.214268] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:23 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = socket(0x400000000000010, 0x802, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r3, 0x5, 0x3ff, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000280)={0x2, 0x1, &(0x7f0000000180)=""/17, &(0x7f00000001c0)=""/94, &(0x7f0000000240)=""/57, 0x10000}) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000000c0)=0x400, 0x2) r5 = socket$inet6(0xa, 0x0, 0x3) r6 = dup(0xffffffffffffffff) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x582, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {r8, 0x7, "1e1dcb", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x7ff, 0x8, "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", 0x1, 0xf8, 0xe0, 0x4, 0x1f, 0x8, 0x1, 0x1}, r8}}, 0x120) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)) dup2(r1, r5) ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCRSSL2CALL(r9, 0x89e2, &(0x7f0000000140)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}) 15:43:23 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt(r1, 0x4, 0x3ff, 0x0, 0xfffffffffffffeaf) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) setsockopt$packet_int(r2, 0x107, 0xe, &(0x7f0000000080)=0x19, 0x4) [ 448.324995] IPv6: ADDRCONF(NETDEV_UP): veth171: link is not ready 15:43:23 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x82000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:23 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x10001, 0xcb7c1f42b65e1995) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, r1}, 0x15) dup2(r2, r0) [ 448.383770] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 448.463320] IPv6: ADDRCONF(NETDEV_UP): veth173: link is not ready [ 448.524569] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:23 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt(r1, 0x4, 0x3ff, 0x0, 0xfffffffffffffeaf) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) [ 448.587442] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:23 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0xe, 0x5, 0x5, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000040)={0x1, 'gretap0\x00', {}, 0xe5a7}) dup2(r1, r0) [ 448.706607] IPv6: ADDRCONF(NETDEV_UP): veth175: link is not ready 15:43:23 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0xfffffffffffffe54) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) r3 = dup(0xffffffffffffffff) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x582, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {r5, 0x7, "1e1dcb", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r5, 0x6, 0x0, 0x0, 0x0, @ib={0x1b, 0x65b8, 0x0, {"04d2a43ab7557947c8d4f0cfc38bea97"}, 0x0, 0x0, 0x6}, @in6={0xa, 0x4e21, 0x20, @rand_addr="e226e69e4ca92a38e4ce06bf5e4c70af"}}}, 0x118) r6 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000140)) r8 = dup3(r6, r7, 0xc0000) ioctl$sock_rose_SIOCRSCLRRT(r8, 0x89e4) dup2(r1, r0) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x4000, 0x0) ioctl$VT_DISALLOCATE(r9, 0x5608) 15:43:23 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0xd, 0x5, 0xa, 0x9}, 0x3c) dup2(r1, r0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x1, 0x2, 0x69, 0x80, "e0ec607f05c1b33e18af4d33ad08e376f2e47e94da1a6940acce695eae30a3f90023fd02aceb3c77f52f3dde1df554caa0e8e7ac9f8a2dcaea357df4ebfc24", 0x10}, 0x60) 15:43:23 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt(r1, 0x4, 0x3ff, 0x0, 0xfffffffffffffeaf) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) 15:43:23 executing program 5: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001600)='/dev/vga_arbiter\x00', 0x200, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000001640), &(0x7f0000001680)=0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x214a42, 0x0) unlinkat(r3, 0x0, 0x200) getsockopt$inet6_dccp_buf(r3, 0x21, 0xce, &(0x7f00000000c0)=""/59, &(0x7f0000000140)=0x3b) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) poll(&(0x7f0000000080)=[{r2, 0x104}], 0x1, 0x3f) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x7, 0x7, 0x9, 0x10}, 0x3c) dup2(r4, r0) 15:43:23 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x8801, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000001c0)={0xa, {0xa, 0x20, 0x37}}, 0xa) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f00000000c0)={0x7, 'ip6tnl0\x00', {0x1000}, 0x1}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x13, 0x5, 0x7, 0x9, 0x0, r3}, 0xffffffffffffff9c) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x201, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) syz_open_dev$ndb(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, 0x0) fanotify_init(0x0, 0x40000) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff83, 0x0, 0x0, 0xfffffffffffffe6d) socket$kcm(0x29, 0x5, 0x0) r8 = socket$kcm(0x29, 0x5, 0x0) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) dup2(r8, r9) socket$kcm(0x29, 0x0, 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x1) socket$kcm(0x29, 0x0, 0x0) 15:43:23 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0xa0001, 0x0) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x3) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x15, 0x5, 0x7, 0xb, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0xfffffffd}, 0xfffffffffffffd30) dup2(r3, r0) r4 = socket(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)) r6 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) r8 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, 0x0, 0xffffff5c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x9, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x2e, 0x5f, 0x2733629d0fee3412, 0x2e, 0x0]}}, &(0x7f0000000380)=""/220, 0x2b, 0xdc}, 0x20) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r9, 0x0, 0x200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r10, 0x8010743f, &(0x7f0000000200)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r11, 0x8010743f, &(0x7f0000000200)) r12 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, 0x0, 0xffffff5c) accept4(r12, &(0x7f00000004c0)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000540)=0x80, 0x80800) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/qat_adf_ctl\x00', 0x220c00, 0x0) r13 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r13, 0x0, 0x482, 0x0, 0xffffff5c) close(r13) r14 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/276, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000cc0)={r15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040)={r15, 0x7547f45f}, &(0x7f0000000140)=0xc) 15:43:24 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt(r1, 0x4, 0x3ff, 0x0, 0xfffffffffffffeaf) 15:43:24 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$SNDRV_PCM_IOCTL_RESET(r2, 0x4141, 0x0) dup2(r1, r0) 15:43:24 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000140)=@HCI_EVENT_PKT={0x4, "c05b61bc16c3832ef0bb7fe14e237cbbc8b733c749142ab60480e2058ab9b7c58f14a68a8e89958d3cdf1851727aef1fe24670231913998d5504ba6ac7a81e86b572dad19ba14569a334ff71280cb8e9e44f5ec40cd4454801ed7a9ff42d4271e0ffbc0f4f3bf41700736b64758b0ccd347607edd301d33b1098ef11a34eafa82a2f092fdd1a564c08ec5c94a128dd8b1eb61dc2b5dc2e5b6d2ed0b37f6430d07c557ddea81da198e3070440ee0b2574aa84e1e4d48b633c80e2168d97a63e0adb6e2fdf2b02cec7d7f06a"}, 0xcc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000cc0)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x401, 0x4, 0xadd, 0x8001, 0x10, 0x7fffffff, 0x8, r4}, &(0x7f0000000040)=0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r5, r0) 15:43:24 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) 15:43:24 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x3, 0xb, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff, 0x5}, 0x3c) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x80000001, 0x102) r2 = memfd_create(&(0x7f0000000080)='/dev/vhci\x00', 0x4) dup2(r2, r1) 15:43:24 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x2, 0x208840) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x7, 0x4) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x80000, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x6, 0x101, 0x9, 0x40, r2, 0x31, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) dup2(r3, r0) 15:43:24 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0xc5b78968fb3e3811) write$vhci(r0, &(0x7f0000000300)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) dup2(0xffffffffffffffff, r0) 15:43:24 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) socket(0x400000000000010, 0x802, 0x0) 15:43:24 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x3, 0x4, 0x1, 0x40, 0x0, 0xffffffffffffffff, 0xfffffffd, [], 0x0, r1, 0x5}, 0x50cd118b86a4b0a4) mount$9p_xen(&(0x7f0000000040)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x61876ebb2bbe7e54, &(0x7f0000000140)={'trans=xen,', {[{@access_user='access=user'}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@cache_mmap='cache=mmap'}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fsuuid={'fsuuid', 0x3d, {[0x1c, 0xdf850027ff5ea4ca, 0x52, 0x66, 0x36, 0x65, 0x39, 0x36], 0x2d, [0x32, 0x32, 0x31, 0x66], 0x2d, [0x33, 0x64, 0x63, 0x66], 0x2d, [0x34, 0x3f, 0x63, 0x35], 0x2d, [0x53, 0x32, 0x38, 0x32, 0x34, 0x65, 0x16, 0x64]}}}, {@audit='audit'}]}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2040, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000280)={{0xdd, 0x85, 0x9, 0x7f, 0x8, 0x3f}, 0x74afe476}) dup2(r2, r0) 15:43:24 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x40000) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:24 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) r2 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r2, 0x5, 0x3ff, 0x0, 0x0) dup2(r2, r1) 15:43:24 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) 15:43:24 executing program 2: rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x35, 0x401, 0x1}, 0x2}, 0x4, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:24 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendto(r1, &(0x7f0000000180)="909b3d474c9e0c3f12ed2e9c21d5a6bf34caca46d15dafe53dd036b206455b04cf403cf0ffd1c852a610d7922475b46ae871111f254542622c909db430a48409c45ebc0b7cdabb6afb2e905a49edd8ce81b8cee0237bbd9772aa6d96736d9ce562d4c116b503ebc6ba75aff0fd75044d3450472a59a004f3879b138e8f9fb7d58cfe4e25603652b6e8bdc23b30fb0973e51ca8f9cea4a2b9e25fc4f5ded78214abb6948edf5fa40ccdc98795f6482a164a", 0xb1, 0x2cb757c9a4c59150, &(0x7f0000000240)=@nfc_llcp={0x27, 0x1, 0x0, 0x4, 0x2, 0x1f, "7f2bb398f833cffd6c4554273b4347c4cb573eb86d94528e5de418146629f8cab195a7bb34714fd2af9fdccfe911b80e32b9b39d6416d36ea9e50d47ccc384", 0x2c}, 0x80) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) bind$packet(r2, &(0x7f0000000540)={0x11, 0x18, 0x0, 0x1, 0xfd, 0x6, @broadcast}, 0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x40800, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x9, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xa, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3}, @generic={0x20, 0x7, 0x7, 0x7fff, 0xffffffff}, @map={0x18, 0xb, 0x1, 0x0, r3}, @generic={0xf9, 0x0, 0x1, 0x3ff, 0x9}, @call={0x85, 0x0, 0x0, 0x55}, @call={0x85, 0x0, 0x0, 0x4d}, @jmp={0x5, 0x0, 0x7, 0x0, 0x4, 0x10, 0x8}, @call={0x85, 0x0, 0x0, 0x16}], &(0x7f0000000340)='GPL\x00', 0x3, 0x7d, &(0x7f0000000380)=""/125, 0x40f00, 0x1e, [], 0x0, 0x14, r4, 0x8, &(0x7f0000000440)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x2, 0x10000, 0xa381}, 0x10, r5}, 0x78) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r7 = dup2(r6, r0) creat(&(0x7f0000000580)='./file0\x00', 0x10) r8 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, 0x0, 0xffffff5c) statx(r8, &(0x7f00000005c0)='./file0\x00', 0x0, 0xf374e23fd37c120a, &(0x7f0000000600)) ioctl$sock_netrom_SIOCDELRT(r7, 0x890c, &(0x7f0000000040)={0x1, @bcast, @bpq0='bpq0\x00', 0x7fffffff, 'syz1\x00', @bcast, 0x8000, 0x8, [@null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) 15:43:24 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c, 0x80000) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x38, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x13, @local, 0x5}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0xbc}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB="0177fcb80406000004070009defeffffff008023cc87ffc54aa4f598a391"], &(0x7f0000000200)=0x14) r5 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4068aea3, &(0x7f0000000280)={0x0, 0x0, [0x7f, 0x5, 0xf6d, 0x6]}) r8 = dup(r6) recvfrom$phonet(r8, 0x0, 0x0, 0x40020103, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r9, r0) 15:43:24 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1002) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800c0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'vlan1\x00', 0xa9414f7a25d91925}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, r3) 15:43:24 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socket$rds(0x15, 0x5, 0x0) 15:43:24 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) flock(0xffffffffffffffff, 0xd73b9128f557de83) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000040)="a7f17f322c97e287d540b99f8a51c12bf56c4852c7b570ad48221871a542d1834dde3c7c2f373073c80e6a0695a66cc748163ccabfe46c76d8e8cd76555c5dcf16f7f41a0f228d552d0761f8862fa41ac841e07333a14fdd82c4405147610978a63d1ac9e56522380261ae71b150cb45dc7798e0bd797a4ffb7bbfc848a11467b072ad2cfca2c02ea62373e86b9c", 0x8e, r2}, 0x68) 15:43:24 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)={@local, @broadcast, 0x0}, &(0x7f0000000040)=0xc) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, 0x0, 0xffffff5c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x10, 0x8, 0x20000000, 0x9, 0x100, r2, 0x9, [], r3, r4, 0x4, 0x3}, 0x3c) dup2(r1, r0) 15:43:24 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) 15:43:25 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x472d67e09018cf0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x48000, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000080)) dup2(r1, r0) 15:43:25 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x800) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0xa2}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x7, 0x9, 0x84}, 0x124) dup2(r1, r0) 15:43:25 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r4, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000280)) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r4, 0x300, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x3c3, @bearer=@l2={'ib', 0x3a, 'macvlan1\x00'}}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x2001}, 0x1) r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) 15:43:25 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:25 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x100) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:25 executing program 4: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x2002) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:25 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x101000) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fgetxattr(r3, &(0x7f0000000140)=@random={'system.', 'selinuxvmnet0\x00'}, &(0x7f00000001c0)=""/179, 0xb3) unlinkat(r2, 0x0, 0x200) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x100, 0x5, 0x13, 0xd, "008c9a96307ebc36ed93b4d3a0425aa533a7863d02471f1b161014b43c92a46435244a5810750add0220913b8749856e3731d849c584d3d881b65a91cc65a5aa", "d4c1af34b873ab6b4a198bcb78f91893fa63d67bb490647964165a4542b44872", [0x10001, 0x1000]}) dup2(r1, r0) 15:43:25 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r3, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x40}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}]}, 0x44}}, 0x40000040) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r6, 0x8010743f, &(0x7f0000000200)) r7 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$FBIOPAN_DISPLAY(r7, 0x4606, &(0x7f0000000500)={0xf0, 0x10, 0x10, 0x80, 0x0, 0x1, 0x4, 0x2, {0x4, 0xffffffb3, 0x1}, {0x6cf, 0x9}, {0x9, 0xfffffff7}, {0x7, 0xfff, 0x1}, 0x0, 0x12, 0xfff, 0x7, 0x0, 0x4, 0x3, 0x7, 0x9, 0x5, 0x7, 0x5c6, 0x4, 0x200, 0x2, 0x9}) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x6, 0x7, [0x9, 0x4a5b, 0x0, 0x4, 0x0, 0x1, 0x5]}, &(0x7f00000000c0)=0x16) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{}, {}, {}]}) dup2(r1, r0) 15:43:25 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:25 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x80000000}, 0x3c) r2 = dup2(r1, r0) memfd_create(&(0x7f0000000040)='/dev/vhci\x00', 0x1) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000080)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000240)="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", 0xff}, {&(0x7f0000000140)="e388bdf7da0e68fb6e403367bd0b5452d4cdd32c1c9d7a88d2494593d8ac085f41a0840ab42b4e399b1eec46ba2067db03ba25fa4344f94240a50bb09ed957943a276cfe8635e0", 0x47}, {&(0x7f0000000340)="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", 0xfe}], 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x78}, 0x4001) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) 15:43:25 executing program 4: r0 = semget$private(0x0, 0x0, 0x190) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000140)=0x124) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x80, 0x100) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x200}, 0x3c) dup2(r3, r1) 15:43:25 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:25 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000cc0)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r4, 0x0, 0x8135}, 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x3e, 0x6b458bb0001238e9, 0x35, "ea8100edc690d64fa53a697fd76564c4", "3a09413b64f0d4298067856781940d2bef085e352e5def42f2c13289d3eb1aeeddaf83f87706650dd8"}, 0x3e, 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x910}, 0x3c) dup2(r5, r0) 15:43:25 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x7, 0x9}, 0x3c) dup2(r1, r0) 15:43:25 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000040)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f00000013c0)=@HCI_ACLDATA_PKT={0x2, "b145141ca7eb781ed30a5001de78f3870f7960b911da9c435689643751eb805fd29a3d7631f1dd2eb052cc7d6ca89ae959573cb6352d4aceb950b0f7382665ab1ab710f9eb0f52765b96ab8c41cf2541dfb4fba3943722dfedb6084d1bf3b98412fcd70731e14a1dd062967ea73e2af94c230fa2ea277957c7ba6498feea4d3449710ba05ab382d879e836dcea01b53448b5bca20d5e5e70e58029b1a4209260a844b46a72a3e2a4741c158719de4947ec55696d0c19bb103d622eda435219527ba51482fa1996fefc05c976788a4eef53af3b6e52025a40e36a77f11e95cdc7f50c847493d82efa1f698c27a0b1a00d"}, 0xf1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x140, 0x140, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5}}, @enum={0xa, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x101}, {0x8, 0x4}, {}, {0x10, 0x6}, {0x10, 0x48}, {0x5, 0x70a}]}, @union={0x4, 0x8, 0x0, 0x5, 0x0, 0x20, [{0x8, 0x1, 0xfffffffa}, {0x9, 0x0, 0x1c7ddb7a}, {0x8, 0x5}, {0x1, 0x0, 0x200}, {0x8, 0x3, 0x80}, {0x5, 0x1, 0xb501}, {0x10, 0x1, 0x9}, {0x6, 0x0, 0x8}]}, @fwd={0x8}, @var={0xd, 0x0, 0x0, 0xe, 0x5}, @enum={0x5, 0x9, 0x0, 0x6, 0x4, [{0x3, 0xff}, {0x9, 0xfff}, {0x6, 0x7}, {0x5, 0x1ff}, {0x4, 0x1}, {0xe, 0x7}, {0xf, 0x5}, {0x5, 0x20}, {0xa, 0x86}]}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x65, 0x9}]}, {0x0, [0x4ca99f4e35c6400e, 0x61, 0x30, 0x6bb86784e1ecbca, 0x5f, 0x2e3afa1cca983584, 0x41]}}, &(0x7f00000003c0)=""/4096, 0x161, 0x1000, 0x1}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x1, [], 0x0, r2}, 0x3c) dup2(r5, r1) 15:43:25 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0xa102) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x11, 0x5, 0xffffffcf, 0x9, 0x15e4e7e6598f279a, 0xffffffffffffffff, 0x7, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0xe0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x61f7eeeb, 0x0, 0x3ff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) dup2(r1, r0) 15:43:26 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:26 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1ed3045c47925275, 0x7fffffff, 0x2, 0x7fffffff, 0x40, 0x1, 0x1, [], 0x0, r1, 0x0, 0x5}, 0x3c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, r2, 0x0, [], 0x0, r3, 0x1, 0xfffffffc}, 0x3c) r5 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x100, 0x3ff}) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000080)=0xa5c, 0x2) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000000c0)) dup2(r4, r0) mknod(&(0x7f0000000140)='./file0\x00', 0x8000, 0x4) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x8280, 0x0) 15:43:26 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x490080, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f00000006c0)=0x4) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)) r6 = dup3(r5, r1, 0x80000) timerfd_settime(r6, 0x2, &(0x7f0000000640)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000680)) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000000000010000000000000006000000000000000000000000000000000000000000000000000000000000000100000000000000020000000000000000d223a016afb2000000fffffdfd00000000000000000004000000000000"]) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r9, 0x0, 0x200) ioctl$PPPIOCGIDLE(r9, 0x8010743f, &(0x7f0000000080)) r10 = syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x7, 0x62c080) ioctl$KVM_SET_FPU(r10, 0x41a0ae8d, &(0x7f0000000400)={[], 0x80, 0x4, 0x1, 0x0, 0x4, 0x4000, 0x4, [], 0x2}) setsockopt$netrom_NETROM_T4(r8, 0x103, 0x6, &(0x7f0000000140)=0x3ff, 0x4) write$vhci(r7, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x3abd, 0x9, 0x0, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) dup2(r11, r7) truncate(&(0x7f00000000c0)='./file0\x00', 0x3ff) r12 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x400002, 0x0) r13 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r13, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$VIDIOC_TRY_EXT_CTRLS(r13, 0xc0205649, &(0x7f00000002c0)={0xa30000, 0x7, 0x200, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x10376, 0x3, [], @value64=0x1}}) ioctl$KVM_SET_REGS(r14, 0x4090ae82, &(0x7f0000000300)={[0x6, 0xffffffff, 0xff, 0x4, 0x2, 0x1, 0x80000001, 0x401, 0x7d, 0x9, 0xa9, 0x3, 0x2, 0xffffffff, 0x7, 0x3], 0x4, 0x20000}) ioctl$PIO_CMAP(r12, 0x4b71, &(0x7f0000000240)={0x1, 0x2, 0x6, 0xff, 0x4, 0x401}) 15:43:26 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0xa, 0x9}, 0x3c) dup2(r1, r0) open(&(0x7f0000000040)='./file0\x00', 0x240801, 0x82) 15:43:26 executing program 2: accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x103400) prctl$PR_SET_TSC(0x1a, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:26 executing program 1: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:26 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x64a809b53063c0da) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r3 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$setpipe(r3, 0x407, 0x200) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, 0x0, 0xffffff5c) r5 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000080)={0xf000000, 0x40000, 0x3f, r5, 0x0, &(0x7f0000000040)={0x0, 0x4, [], @value64=0xfff}}) dup2(r2, r0) 15:43:26 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) accept4$packet(r1, 0x0, &(0x7f0000000080), 0x80000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0xb903e623889f54f9, 0x8285, 0x7, 0x9}, 0x3c) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x80, 0x0) dup2(r2, r0) 15:43:26 executing program 1: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:26 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = pkey_alloc(0x0, 0x1) pkey_free(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:26 executing program 1: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:26 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = dup(0xffffffffffffffff) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x582, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {r4, 0x7, "1e1dcb", "d5432e65e8e743d5c1ad7189b3f6b292603cebb02c1d95f3a55d581fd998bc5cb772abaa47e3d14b3a60b4a7e173ad9daf3b32d46c553f9da19265211dffd837a3b3ff3056ce2957a1ea1010fdd42cc915e35f739382b74d3218613ee1ef0be5db425962e9afd3c2751f5aeaeddf782ab23d20e2a95b769fbf7a65cdd7425639b2e5dc72d489fc0a4ed315849c31067aa911c3e5df2453c9f537eab8f76a12a3ff0a812cf3a49559ef5cf838cf7a6dfafc2f78c9feea073f704710e328d2a039abb663515761ce0df607ef82fd5112645c7aeb2ad10fe61c9bf3afe74e2106dd5946ff4650c1a3a59231574468784384c8e6bf78264dfffc29b6dcbef0756c06"}}, 0x110) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r4, 0x5}}, 0x18) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000440)) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f00000000c0)) 15:43:26 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:26 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x20000, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x5, 0x6, 0x8, 0x8, r1, 0x3, [], 0x0, r2, 0x3, 0xfffffffe}, 0x3c) dup2(r3, r0) [ 451.890419] QAT: Invalid ioctl [ 451.920320] QAT: Invalid ioctl 15:43:26 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:26 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r2, 0x5, 0x3ff, 0x0, 0x0) splice(r2, &(0x7f0000000040)=0x1203, r0, &(0x7f0000000080)=0x2, 0x6, 0x2597dd7d1a577f66) prctl$PR_SET_SECUREBITS(0x1c, 0x4) dup2(r1, r0) 15:43:26 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x2}, 0x3c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000140)={0x100}) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0xb, 0x2, 0xffff}, &(0x7f00000005c0)=0x80000000000005, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, r5}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r5}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r5}, 0x8) dup2(r1, r0) 15:43:26 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:26 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) r3 = socket$nl_route(0x10, 0x3, 0x0) sync() r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, 0x0, 0xffffff5c) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xe5ef21304fbaaec4) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x4c}}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcb5e, 0xa, 0x0, r1, 0x8, [], r10, r2}, 0x3c) dup2(r11, r0) 15:43:27 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 452.147805] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:27 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:27 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x4c}}, 0x0) r10 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x10000, 0x4000) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r11, 0x0, 0x200) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r11, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)=""/149, 0x95, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd59f0d903de1bc4f, 0x2, &(0x7f0000000080)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r2}], &(0x7f00000000c0)='syzkaller\x00', 0x10001, 0x0, 0x0, 0x41100, 0x7, [], r6, 0x9, r10, 0x8, &(0x7f0000000180)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x0, 0x2, 0x3f}, 0x10, r12}, 0x78) dup2(r1, r0) 15:43:27 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r1) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x368100, 0x0) 15:43:27 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x81000004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x8c, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond_slave_0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x1e}}, @NLBL_UNLABEL_A_SECCTX={0x21, 0x7, 'system_u:object_r:sysfs_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x8c}, 0x1, 0x0, 0x0, 0x44884}, 0x24000050) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000240)=@routing={0x67, 0x6, 0x0, 0x97, 0x0, [@ipv4={[], [], @empty}, @empty, @local]}, 0x38) [ 452.274411] IPv6: ADDRCONF(NETDEV_UP): veth97: link is not ready [ 452.295984] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:27 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 452.407185] IPv6: ADDRCONF(NETDEV_UP): veth99: link is not ready 15:43:27 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r4}, 0xc) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000003c0)) unlinkat(r5, 0x0, 0x200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r6, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) r8 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r9 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r9, 0x5, 0x3ff, 0x0, 0x0) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r11, 0x8010743f, &(0x7f0000000200)) r12 = socket(0x400000000000010, 0x802, 0x0) write(r12, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r7, 0x400}, {r8}, {r9, 0x400}, {r10, 0x508}, {r11, 0x1067}, {r12, 0x1052a}, {r5, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) pipe(&(0x7f0000000580)) dup2(r1, r0) [ 452.458118] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:27 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)=0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id', 0x3d, r10}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) r11 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r11}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r12}, 0x2c, {'group_id', 0x3d, r13}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x66d22ec1a3f3ef3d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r15}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id', 0x3d, r17}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r19}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r20}, 0x2c, {'group_id', 0x3d, r21}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) r22 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r24 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r22, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757365725f69643dcb470f318c8c0dfbe65d28684790d6006f18b56296dad1ab5e492972f803cbf054d2438b6ebf3cb30bd6804faf987c1ba5960a46be0083181f1d61732dac44f12e548d0ab26c0a5414a35bd656a4db3ef4d0cd0775a7d1ac4c818038a50ee020e04045e58947321ce3c57124c953afc5b602a4d839a896c3ed5e459d6922de6ff75f5725fe55ecda78163b7481ac26ff73ad", @ANYRESDEC=r23, @ANYBLOB=',group_id=', @ANYRESDEC=r24, @ANYBLOB=',max_read=0x0000000000000004,blksize=0x0000000000000400,default_permissions,allow_other,context=staff_u,\x00']) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x2}, [{0x2, 0x1, r2}, {0x2, 0x4, r5}, {0x2, 0x5, r7}, {0x2, 0x4, r9}, {0x2, 0x1, r12}], {0x4, 0xb}, [{0x8, 0x4, r14}, {0x8, 0x4, r17}, {0x8, 0x5, r18}, {0x8, 0x0, r21}, {0x8, 0x1, r24}], {0x10, 0x1}, {0x20, 0x1}}, 0x74, 0x7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r25 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r25, r0) 15:43:27 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 452.536203] IPv6: ADDRCONF(NETDEV_UP): veth177: link is not ready [ 452.574595] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:27 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 452.666406] IPv6: ADDRCONF(NETDEV_UP): veth179: link is not ready [ 452.716767] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 452.771461] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 452.809500] IPv6: ADDRCONF(NETDEV_UP): veth101: link is not ready [ 452.816614] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 452.847595] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:27 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000040)=0x100) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:27 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:43:27 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:27 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r4}, 0xc) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000003c0)) unlinkat(r5, 0x0, 0x200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r6, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) r8 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r9 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r9, 0x5, 0x3ff, 0x0, 0x0) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r11, 0x8010743f, &(0x7f0000000200)) r12 = socket(0x400000000000010, 0x802, 0x0) write(r12, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r7, 0x400}, {r8}, {r9, 0x400}, {r10, 0x508}, {r11, 0x1067}, {r12, 0x1052a}, {r5, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) pipe(&(0x7f0000000580)) dup2(r1, r0) 15:43:27 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0xffffffffffffffca) dup2(r1, r0) [ 452.971244] FAULT_INJECTION: forcing a failure. [ 452.971244] name failslab, interval 1, probability 0, space 0, times 0 [ 453.018471] CPU: 0 PID: 14331 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 453.026316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.035686] Call Trace: [ 453.038301] dump_stack+0x197/0x210 [ 453.041953] should_fail.cold+0xa/0x1b [ 453.045866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 453.050993] ? lock_downgrade+0x880/0x880 [ 453.055172] __should_failslab+0x121/0x190 [ 453.059424] should_failslab+0x9/0x14 [ 453.063245] __kmalloc+0x2e2/0x750 [ 453.066813] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 453.072373] ? fput+0x128/0x1a0 [ 453.075669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 453.081301] ? strnlen_user+0x15f/0x1e0 [ 453.085297] ? __x64_sys_memfd_create+0x13c/0x470 [ 453.090163] __x64_sys_memfd_create+0x13c/0x470 [ 453.094858] ? memfd_fcntl+0x1750/0x1750 [ 453.098939] ? do_syscall_64+0x26/0x620 [ 453.102937] ? lockdep_hardirqs_on+0x415/0x5d0 [ 453.107544] ? trace_hardirqs_on+0x67/0x220 [ 453.111892] do_syscall_64+0xfd/0x620 [ 453.115721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.120932] RIP: 0033:0x45af49 [ 453.124144] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.143064] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 453.150809] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045af49 [ 453.158097] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004bfff2 15:43:28 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 453.165385] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 453.172669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 453.179947] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:43:28 executing program 5: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:28 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:28 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) r3 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsu\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r10, 0x110, 0x2, &(0x7f0000000500)='macvlan\x00', 0x8) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x4c}}, 0x0) r12 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, 0x0, 0xffffff5c) setsockopt$sock_timeval(r12, 0x1, 0x15, &(0x7f0000000840), 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000140)={'team0\x00', r11}) r14 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r14, 0x0, 0x200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x5}, 0x0, 0x0, &(0x7f0000000280)={0x1, 0x10, 0x0, 0x1000}, &(0x7f00000002c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x6}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x10, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7fff}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @exit, @call={0x85, 0x0, 0x0, 0x69}, @map={0x18, 0x6, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x41}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @generic={0x3, 0x0, 0x7, 0xfa0, 0xc7d}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x9, [], r13, 0x6, r14, 0x8, &(0x7f0000000180)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x2, 0x1}, 0x10, r15}, 0x78) 15:43:28 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:28 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x7) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) write$P9_RREADLINK(r3, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) dup2(r2, r1) [ 453.428817] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:28 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:28 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000140)="6ee810ffc0372ab8dd5401e8382a5c6d4c75604e61cc5f9ca748b4151e766bf3e3a35609821af48e4168c740c625262c1a862a6d92540131fa2b60c15063c95a83b4064dffee57e93644637a478717916942682c6819edb6a3c45e964040c84e57948ea71bc2063a19a48e1cc349849060a4a6bd697833cb17661bb024233c9caec7c99a9583eb4c98bba4676003", 0x8e}], 0x1, 0x0, 0x0, 0xc00}, 0x6f67a4eaac9f7e40) dup2(r1, r0) [ 453.491014] IPv6: ADDRCONF(NETDEV_UP): veth103: link is not ready [ 453.516606] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 453.576791] IPv6: ADDRCONF(NETDEV_UP): veth105: link is not ready [ 453.652545] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:28 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:43:28 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:28 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r4}, 0xc) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000003c0)) unlinkat(r5, 0x0, 0x200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r6, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) r8 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r9 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r9, 0x5, 0x3ff, 0x0, 0x0) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r11, 0x8010743f, &(0x7f0000000200)) r12 = socket(0x400000000000010, 0x802, 0x0) write(r12, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r7, 0x400}, {r8}, {r9, 0x400}, {r10, 0x508}, {r11, 0x1067}, {r12, 0x1052a}, {r5, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) pipe(&(0x7f0000000580)) dup2(r1, r0) 15:43:28 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:43:28 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) write$vhci(r1, &(0x7f00000002c0)=@HCI_SCODATA_PKT={0x3, "f519bf8d58b0fdcbe6c6b89f48af9893cf21b924d5e45d2fda6811ff537a78aa3f08e6163b0f745583ebb785391277ae571f1f0306fb4805ea3928714b12bb7f3e014e176191bcbecda12b350f0cc7a46480f7e69b188d3f2d515dbaa56a8db0edb18c7bb68b785d89f60c26eb78dee1d233c739ea29dea9b31c5ee49e9f5dba3926dcc75a8f9846bb63c968657a798f7e28541d6e03341d73b43fbf72de3047d78c056a582f340d8b32521be86527d01308acf844cf97fb4a8b5a7cf0b8725beb2bc5f6615a222760e3d7"}, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r3 = dup2(r2, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000140)={0x9, 0x2, 0x4, 0x40, 0x6, {r5, r6/1000+10000}, {0x2, 0x2, 0x8, 0x3, 0x7f, 0x4, "4b98bb5d"}, 0x7, 0x3, @offset=0x1, 0xc524, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000001c0)={0x172, 0x1, 0x1, 'queue0\x00', 0xb}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000080)=0x1, 0x4) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x40000, 0x0) [ 453.800916] FAULT_INJECTION: forcing a failure. [ 453.800916] name failslab, interval 1, probability 0, space 0, times 0 15:43:28 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000040)) dup2(r1, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x130) write$rfkill(r3, &(0x7f00000000c0)={0xcb, 0x7, 0x0, 0x1, 0x1}, 0x8) [ 453.938984] CPU: 1 PID: 14376 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 453.946829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.956196] Call Trace: [ 453.958986] dump_stack+0x197/0x210 [ 453.962664] should_fail.cold+0xa/0x1b [ 453.966583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 453.971713] ? lock_downgrade+0x880/0x880 [ 453.976071] __should_failslab+0x121/0x190 [ 453.980332] should_failslab+0x9/0x14 [ 453.984146] kmem_cache_alloc+0x2ae/0x700 [ 453.988307] ? __alloc_fd+0x44d/0x560 [ 453.992129] ? shmem_destroy_callback+0xc0/0xc0 [ 453.996816] shmem_alloc_inode+0x1c/0x50 [ 454.000890] alloc_inode+0x64/0x190 [ 454.004531] new_inode_pseudo+0x19/0xf0 [ 454.008527] new_inode+0x1f/0x40 [ 454.011915] shmem_get_inode+0x84/0x780 [ 454.015914] __shmem_file_setup.part.0+0x7e/0x2b0 [ 454.020775] shmem_file_setup+0x66/0x90 [ 454.024764] __x64_sys_memfd_create+0x2a2/0x470 [ 454.029455] ? memfd_fcntl+0x1750/0x1750 [ 454.033536] ? do_syscall_64+0x26/0x620 [ 454.037542] ? lockdep_hardirqs_on+0x415/0x5d0 [ 454.042148] ? trace_hardirqs_on+0x67/0x220 [ 454.046490] do_syscall_64+0xfd/0x620 [ 454.050307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.055507] RIP: 0033:0x45af49 [ 454.058708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.077620] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 15:43:28 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x8000) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x10000, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:28 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)={{0xff, 0x80}, {0x9, 0x3}, 0x8, 0x4, 0x7}) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000140), 0x2) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) bind$l2tp(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) [ 454.085346] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045af49 [ 454.092635] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 454.099922] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 454.107204] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 454.114483] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:43:29 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x2, 0x5bd, 0x200007, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r2}, 0x3c) dup2(r3, r0) 15:43:29 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000040)=0xffff, 0x4) dup2(r1, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f00000000c0)={r4, 0x0, 0x77}) 15:43:29 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept(r0, &(0x7f0000000080)=@llc, &(0x7f0000000140)=0xfffffffffffffe4e) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="300000000203000429bd7000fbdbdf25030094c4fb730540000000200800054000000002090002000000000201000000"], 0x30}, 0x1, 0x0, 0x0, 0x84}, 0x24040110) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) write$P9_RLERRORu(r4, &(0x7f0000000040)={0xd, 0x7, 0x2, {{}, 0x2f2}}, 0xd) dup2(r3, r2) 15:43:29 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 454.314486] FAULT_INJECTION: forcing a failure. [ 454.314486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 454.326490] CPU: 1 PID: 14405 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 454.334742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.344207] Call Trace: [ 454.346834] dump_stack+0x197/0x210 [ 454.350498] should_fail.cold+0xa/0x1b [ 454.354424] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 454.359672] ? mark_held_locks+0x100/0x100 [ 454.363957] __alloc_pages_nodemask+0x1ee/0x750 [ 454.368664] ? find_held_lock+0x35/0x130 [ 454.372782] ? __alloc_pages_slowpath+0x2870/0x2870 [ 454.378186] cache_grow_begin+0x91/0x8c0 [ 454.382278] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.387833] ? check_preemption_disabled+0x48/0x290 [ 454.392874] kmem_cache_alloc+0x63b/0x700 [ 454.397056] ? shmem_destroy_callback+0xc0/0xc0 [ 454.401741] shmem_alloc_inode+0x1c/0x50 [ 454.405820] alloc_inode+0x64/0x190 [ 454.409467] new_inode_pseudo+0x19/0xf0 [ 454.413459] new_inode+0x1f/0x40 [ 454.416843] shmem_get_inode+0x84/0x780 [ 454.420843] __shmem_file_setup.part.0+0x7e/0x2b0 [ 454.425712] shmem_file_setup+0x66/0x90 [ 454.429715] __x64_sys_memfd_create+0x2a2/0x470 [ 454.434406] ? memfd_fcntl+0x1750/0x1750 [ 454.438489] ? do_syscall_64+0x26/0x620 [ 454.442487] ? lockdep_hardirqs_on+0x415/0x5d0 [ 454.447090] ? trace_hardirqs_on+0x67/0x220 [ 454.451524] do_syscall_64+0xfd/0x620 [ 454.455346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.460984] RIP: 0033:0x45af49 [ 454.464192] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.483114] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 454.490850] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045af49 [ 454.498210] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 454.505505] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 454.512884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 454.520173] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:43:29 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) write$FUSE_IOCTL(r2, &(0x7f0000000040)={0x20, 0x0, 0x5, {0x3, 0x0, 0x1000, 0x1}}, 0x20) dup2(r1, r0) 15:43:38 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:38 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x4c}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r9, 0x8010743f, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x400, 0x2, 0x0, 0x1, 0x1, 0x1a55, [], r5, r9, 0x3}, 0x3c) dup2(r1, r0) 15:43:38 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) r7 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r8 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r8, 0x5, 0x3ff, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r10, 0x8010743f, &(0x7f0000000200)) r11 = socket(0x400000000000010, 0x802, 0x0) write(r11, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r6, 0x400}, {r7}, {r8, 0x400}, {r9, 0x508}, {r10, 0x1067}, {r11, 0x1052a}, {r4, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) pipe(&(0x7f0000000580)) 15:43:38 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:43:38 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f00000000c0)={'ip6erspan0\x00', {0x2, 0x4e22, @multicast1}}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000080)=0xfd0, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) write$vhci(r4, &(0x7f0000000140)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101000, 0x0) dup2(r1, r0) 15:43:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xe8, r1, 0x1, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x6c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x68}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r2, &(0x7f0000000480)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000002c0)={0x8, 0x7, 0x4, 0x2201, 0x6, {r3, r4/1000+30000}, {0x4, 0x0, 0x5, 0x8, 0x5, 0x4, "90ed58a0"}, 0x10001, 0x4, @userptr, 0x0, 0x0, 0xffffffffffffffff}) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[]}}, 0x0) recvmsg(r6, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) accept4$llc(r6, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="38001000", @ANYRES16=r7, @ANYBLOB="000227bd3901cd6adf25010b00080000000000000000000000000000000000000000d84a00bd00"/54], 0x3}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r7, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$NBD_CMD_STATUS(r5, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80401810}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x50, r7, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80000001}]}, 0x50}, 0x1, 0x0, 0x0, 0x8}, 0x40) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r8, r2) [ 464.060183] FAULT_INJECTION: forcing a failure. [ 464.060183] name failslab, interval 1, probability 0, space 0, times 0 [ 464.110671] nla_parse: 1 callbacks suppressed [ 464.110682] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 464.118972] CPU: 1 PID: 14412 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 464.131663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.141025] Call Trace: [ 464.143639] dump_stack+0x197/0x210 [ 464.147292] should_fail.cold+0xa/0x1b [ 464.151194] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 464.156309] ? lock_downgrade+0x880/0x880 [ 464.157322] IPv6: ADDRCONF(NETDEV_UP): veth181: link is not ready [ 464.160481] __should_failslab+0x121/0x190 [ 464.160501] should_failslab+0x9/0x14 [ 464.160515] kmem_cache_alloc+0x2ae/0x700 [ 464.160531] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 464.160550] ? lockdep_hardirqs_on+0x415/0x5d0 [ 464.188622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.194182] ? timespec64_trunc+0xf0/0x180 [ 464.198445] __d_alloc+0x2e/0x9c0 [ 464.201930] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 464.207148] d_alloc_pseudo+0x1e/0x70 [ 464.210971] alloc_file_pseudo+0xe2/0x280 [ 464.215145] ? __lockdep_init_map+0x10c/0x5b0 [ 464.219668] ? alloc_file+0x4d0/0x4d0 [ 464.223485] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 464.229039] ? kasan_check_write+0x14/0x20 [ 464.233292] __shmem_file_setup.part.0+0x108/0x2b0 [ 464.238247] shmem_file_setup+0x66/0x90 [ 464.242243] __x64_sys_memfd_create+0x2a2/0x470 [ 464.246925] ? memfd_fcntl+0x1750/0x1750 [ 464.251005] ? do_syscall_64+0x26/0x620 [ 464.254993] ? lockdep_hardirqs_on+0x415/0x5d0 [ 464.259585] ? trace_hardirqs_on+0x67/0x220 [ 464.263937] do_syscall_64+0xfd/0x620 [ 464.268021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.273222] RIP: 0033:0x45af49 [ 464.276430] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.295344] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 464.303064] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045af49 15:43:39 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000002200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f00000021c0)={&(0x7f00000000c0)={0x1c, r1, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000}, 0x4000004) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r3, r2) r4 = dup2(r3, 0xffffffffffffffff) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000000140)={{0x0, 0x0, 0x80}}) 15:43:39 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x204001) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x4ac, 0xffffffffffffffff, 0x400, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x3c) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) fcntl$setsig(r2, 0xa, 0x33) dup2(r1, r0) [ 464.310346] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 464.324046] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 464.331334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 464.338619] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 464.347906] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 15:43:39 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:43:39 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x204, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0xc831, 0x7, 0x4, 0x80000040, 0xfff, {r2, r3/1000+30000}, {0x1, 0xc, 0x7f, 0x4, 0xa5, 0x40, "8b2511a8"}, 0x101, 0x1, @userptr=0x1, 0x80000001, 0x0, r4}) [ 464.425471] IPv6: ADDRCONF(NETDEV_UP): veth183: link is not ready [ 464.452680] FAULT_INJECTION: forcing a failure. [ 464.452680] name failslab, interval 1, probability 0, space 0, times 0 15:43:39 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) r7 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r8 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r8, 0x5, 0x3ff, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r10, 0x8010743f, &(0x7f0000000200)) r11 = socket(0x400000000000010, 0x802, 0x0) write(r11, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r6, 0x400}, {r7}, {r8, 0x400}, {r9, 0x508}, {r10, 0x1067}, {r11, 0x1052a}, {r4, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) [ 464.489052] CPU: 1 PID: 14439 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 464.490127] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 464.496889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.496896] Call Trace: [ 464.496922] dump_stack+0x197/0x210 [ 464.496943] should_fail.cold+0xa/0x1b [ 464.496965] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 464.530101] ? lock_downgrade+0x880/0x880 [ 464.534284] __should_failslab+0x121/0x190 15:43:39 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x4) dup2(r1, r2) [ 464.538542] should_failslab+0x9/0x14 [ 464.542360] kmem_cache_alloc+0x2ae/0x700 [ 464.546540] __alloc_file+0x27/0x330 [ 464.548715] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 464.550276] alloc_empty_file+0x72/0x170 [ 464.550298] alloc_file+0x5e/0x4d0 [ 464.550321] alloc_file_pseudo+0x189/0x280 [ 464.550340] ? alloc_file+0x4d0/0x4d0 [ 464.550360] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 464.580129] ? kasan_check_write+0x14/0x20 [ 464.584394] __shmem_file_setup.part.0+0x108/0x2b0 [ 464.589362] shmem_file_setup+0x66/0x90 [ 464.590827] IPv6: ADDRCONF(NETDEV_UP): veth185: link is not ready [ 464.593366] __x64_sys_memfd_create+0x2a2/0x470 [ 464.593384] ? memfd_fcntl+0x1750/0x1750 [ 464.593428] ? do_syscall_64+0x26/0x620 [ 464.593449] ? lockdep_hardirqs_on+0x415/0x5d0 [ 464.616958] ? trace_hardirqs_on+0x67/0x220 [ 464.621322] do_syscall_64+0xfd/0x620 [ 464.625150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.630360] RIP: 0033:0x45af49 [ 464.633664] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.652588] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 464.660323] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045af49 [ 464.667642] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 464.674928] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 464.682212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 464.689491] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:43:49 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:43:49 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r7, 0x0, 0x200) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x200020, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}], [{@fowner_lt={'fowner<', r8}}, {@fowner_eq={'fowner', 0x3d, r9}}]}}) r10 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) r11 = socket$inet(0x2, 0xa, 0xe8) setsockopt$IP_VS_SO_SET_ADD(r11, 0x0, 0x482, 0x0, 0x0) ioctl$FBIOGET_FSCREENINFO(r10, 0x4602, &(0x7f0000000040)) 15:43:49 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) r2 = accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x80000) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080), 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r3, r0) getitimer(0x3, &(0x7f00000000c0)) 15:43:49 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:43:49 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0x3ff, 0x0, 0x10001, 0x1000}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000140)={r3, 0x3}) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, 0x0, 0xffffff5c) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r12, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r9}]}, 0x4c}}, 0x0) r13 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) bind$xdp(r5, &(0x7f0000000240)={0x2c, 0xc, r9, 0x29, r13}, 0x10) dup2(r4, r0) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r14, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000004000"/88], 0x58) 15:43:49 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) r9 = socket(0x400000000000010, 0x802, 0x0) write(r9, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) [ 474.301966] FAULT_INJECTION: forcing a failure. [ 474.301966] name failslab, interval 1, probability 0, space 0, times 0 [ 474.334340] CPU: 0 PID: 14458 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 474.337559] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 474.342200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.342212] Call Trace: [ 474.342236] dump_stack+0x197/0x210 [ 474.342261] should_fail.cold+0xa/0x1b [ 474.342284] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.342301] ? lock_downgrade+0x880/0x880 [ 474.342325] __should_failslab+0x121/0x190 [ 474.342348] should_failslab+0x9/0x14 [ 474.387622] kmem_cache_alloc+0x2ae/0x700 [ 474.391814] __alloc_file+0x27/0x330 [ 474.395551] alloc_empty_file+0x72/0x170 [ 474.399637] alloc_file+0x5e/0x4d0 [ 474.403196] alloc_file_pseudo+0x189/0x280 [ 474.407453] ? alloc_file+0x4d0/0x4d0 [ 474.411280] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 474.416750] IPv6: ADDRCONF(NETDEV_UP): veth179: link is not ready [ 474.416845] ? kasan_check_write+0x14/0x20 [ 474.427303] __shmem_file_setup.part.0+0x108/0x2b0 [ 474.432249] shmem_file_setup+0x66/0x90 [ 474.436237] __x64_sys_memfd_create+0x2a2/0x470 [ 474.437899] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 474.440914] ? memfd_fcntl+0x1750/0x1750 [ 474.440932] ? do_syscall_64+0x26/0x620 [ 474.440950] ? lockdep_hardirqs_on+0x415/0x5d0 [ 474.440967] ? trace_hardirqs_on+0x67/0x220 [ 474.440986] do_syscall_64+0xfd/0x620 [ 474.441009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.475492] RIP: 0033:0x45af49 [ 474.478710] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:43:49 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@l2tp={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x80) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r2, 0x400, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x840}, 0x4000000) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x11, 0x400005, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) dup2(r3, r0) 15:43:49 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4000, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="9fcaab7f2b01a38cbb8d71a67163f1e2", 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:43:49 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 474.497713] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 474.502918] IPv6: ADDRCONF(NETDEV_UP): veth181: link is not ready [ 474.505519] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045af49 [ 474.505530] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 474.505540] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 474.505548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 474.505557] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:43:49 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) socket(0x400000000000010, 0x802, 0x0) 15:43:49 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000080)={0x0, 0x0, {0x100, 0x100, 0x1f, 0x9}}) r3 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r3, 0x5, 0x3ff, 0x0, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x20, 0x0) dup2(r4, r1) 15:43:49 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0xe6efd13e51a3407a}, 0x1d2) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3e}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r8, 0x0, 0x200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xfb, "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"}, &(0x7f00000000c0)=0x103) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000400)={r9, 0x48, 0xfb6, 0x10000, 0x100, 0x3}, 0x14) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, r8, 0x0, [], r7}, 0x3c) dup2(r10, r0) [ 474.729071] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 474.748365] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:49 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) sendmsg$IPSET_CMD_TYPE(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x88, 0xd, 0x6, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1, 0x0, 0x2}, [@IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x2c044012}, 0x40000) [ 474.781042] IPv6: ADDRCONF(NETDEV_UP): veth107: link is not ready [ 474.798390] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 474.838751] IPv6: ADDRCONF(NETDEV_UP): veth183: link is not ready [ 474.846039] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:49 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x1, 0x5, 0x7, 0x9}, 0x3c) dup2(r1, r0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000040)=0x800, 0x4) [ 474.883896] IPv6: ADDRCONF(NETDEV_UP): veth109: link is not ready [ 474.893876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pig=14492 comm=syz-executor.5 [ 474.916774] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:49 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000140)=0x93d4) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000cc0)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x9}, 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r6, r0) [ 474.935498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14499 comm=syz-executor.5 [ 474.937802] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:43:49 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:43:49 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000040)=0x8, 0x4) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x3, 0x5, 0x7, 0x9}, 0x3c) dup2(r1, r0) 15:43:50 executing program 3: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r0, 0xffffffffffffffff) [ 475.062196] FAULT_INJECTION: forcing a failure. [ 475.062196] name fail_page_alloc, interval 1, probability 0, space 0, times 0 15:43:50 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = semget(0x3, 0x0, 0x422) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000040)=""/39) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r3 = dup2(r2, r0) r4 = accept(r3, &(0x7f0000000080)=@phonet, &(0x7f0000000140)=0x80) sendmmsg$inet(r4, &(0x7f0000000500)=[{{&(0x7f0000000180)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000001c0)="be5e679a93bf3a6d58682430725984cb6102a065fe92e8993c82f04ade1dfa1bc11d70d7129932e73c7ebcc4a5871a0a1d8bc3df4428db4d2062bce9ebca4c59791bc4fcf497498cd60941082b88cc7a66aa293b46bd071ae8f0ef7f3d07c19dc962b7fbd799", 0x66}, {&(0x7f0000000240)="306f0a6e280024747082ec9e5681157bdfea691636049bba25154eb62a1846800c290c876d4318253c24e686e901cf3101d3d5f087f0b08b5c11943249d18d5761011f8b13fcb009250d1dde7127", 0x4e}, {&(0x7f00000002c0)="f1a098987e438792f2a2f6283e9b8004eee18e4964cb41f5ce8671d51b6a5b1377bc6cec46c7c927d00286804229aaae58cd252881b791ea66b5d65b5f7f59666bede50ebc9dbae9edb7b3bdb787da76c614afbb4871a5c356c25f588cafb77fe8003402657dffcf3adb9e61c82d2b3706c225d3a2851b48c9b817256d82210e5d4bdbb86527663494b64759b11ce0779279b34388841c58439efc2da9c74a41dc0dab95ffc8456b479ef2d8c9cefcda5500d9ecf2b7e7e265dceee6b8fd512cebf17e8bbdb7edb2d4642222e4975602c8c84bb8bc9d7890ef29b38ce585d31b72", 0xe1}, {&(0x7f00000003c0)="1ad1a08595f8faa796c39ea74116bb762112b5620d986130a240b8ae3e21a91daf403c677817281e189661f7b00363beba7fde55742fb683e53c39d16217e818b1d26e6ab6d54e93797fa11ab7b2ceca1329fdacc0b6513b0caca623716f37586f503d38837e2a3ea332e8e9f25f64ae18c435d73707b150ef9bdd06dbd77c3e5db8d177d655960f21bd2f10a375fad6768ce70cd845168decf4fb2c3f3e866d527c7b9eae4167e00f9fb39a14ed306a993e5d62a046fde1015e4a6d1b9f4478aa47e383f2d65d379b022f6e714f672f6060cae5d04630db710550ec24331dd408b3d457ba77", 0xe6}], 0x4}}], 0x1, 0x2008000) [ 475.115083] CPU: 0 PID: 14505 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 475.122938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.132309] Call Trace: [ 475.135049] dump_stack+0x197/0x210 [ 475.138704] should_fail.cold+0xa/0x1b [ 475.142628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.147772] ? __might_sleep+0x95/0x190 [ 475.152516] __alloc_pages_nodemask+0x1ee/0x750 [ 475.157230] ? lock_downgrade+0x880/0x880 [ 475.161500] ? __alloc_pages_slowpath+0x2870/0x2870 [ 475.166542] ? avc_has_perm_noaudit+0x3b6/0x570 [ 475.171231] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 475.176785] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 475.182343] alloc_pages_vma+0xdd/0x590 [ 475.186335] shmem_alloc_page+0xc0/0x180 [ 475.190405] ? shmem_swapin+0x1a0/0x1a0 [ 475.194392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.199960] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 475.204990] ? __vm_enough_memory+0x324/0x5a0 [ 475.209508] shmem_alloc_and_acct_page+0x165/0x970 15:43:50 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) r7 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r8 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r8, 0x5, 0x3ff, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r10, 0x8010743f, &(0x7f0000000200)) r11 = socket(0x400000000000010, 0x802, 0x0) write(r11, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r6, 0x400}, {r7}, {r8, 0x400}, {r9, 0x508}, {r10, 0x1067}, {r11, 0x1052a}, {r4, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) pipe(&(0x7f0000000580)) [ 475.214459] shmem_getpage_gfp+0x44a/0x3930 [ 475.218798] ? current_time+0x6f/0x140 [ 475.222703] ? shmem_writepage+0xf60/0xf60 [ 475.226982] ? current_time+0x6f/0x140 [ 475.231232] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 475.236357] ? lockdep_hardirqs_on+0x415/0x5d0 [ 475.240957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 475.246584] ? iov_iter_fault_in_readable+0x22c/0x450 [ 475.251804] shmem_write_begin+0x10b/0x1e0 [ 475.256069] generic_perform_write+0x22a/0x520 [ 475.260686] ? page_endio+0x780/0x780 [ 475.264506] ? current_time+0x140/0x140 [ 475.268505] ? lock_acquire+0x16f/0x3f0 [ 475.272501] __generic_file_write_iter+0x25e/0x630 [ 475.277449] generic_file_write_iter+0x383/0x72f [ 475.282227] __vfs_write+0x587/0x810 [ 475.285958] ? kernel_read+0x120/0x120 [ 475.289878] ? rcu_read_lock_sched_held+0x110/0x130 [ 475.294909] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 475.299680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.305231] ? __sb_start_write+0x1a9/0x360 [ 475.309576] vfs_write+0x20c/0x560 [ 475.313398] ksys_pwrite64+0x183/0x1c0 [ 475.317297] ? __ia32_sys_pread64+0xf0/0xf0 [ 475.321629] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.326496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.331364] ? do_syscall_64+0x26/0x620 [ 475.335468] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.340877] ? do_syscall_64+0x26/0x620 [ 475.344999] __x64_sys_pwrite64+0x97/0xf0 [ 475.349177] do_syscall_64+0xfd/0x620 [ 475.353013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.358568] RIP: 0033:0x414d47 [ 475.361779] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 475.380697] RSP: 002b:00007f8a9b118a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 475.388419] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 0000000000414d47 [ 475.395692] RDX: 0000000000000017 RSI: 0000000020000080 RDI: 0000000000000004 [ 475.402984] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 475.410267] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f8a9b1196d4 [ 475.417549] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 475.439299] FAT-fs (loop4): bogus number of reserved sectors [ 475.445310] FAT-fs (loop4): Can't find a valid FAT filesystem 15:44:00 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:44:00 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x12, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) dup2(r1, r0) 15:44:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)='w', 0x1}, {&(0x7f0000000000)="c2", 0xffffff41}, {&(0x7f0000000240)="c3", 0x1}], 0x3, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r3, r0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x4, [@struct={0x5, 0x5, 0x0, 0x4, 0x1, 0x8, [{0x1, 0x3, 0x9}, {0x1, 0x2, 0x1ed3}, {0x9, 0x5, 0x20}, {0x8, 0x1, 0x40}, {0x8, 0x3, 0x9}]}, @restrict={0x5}, @struct={0x4, 0x4, 0x0, 0x4, 0x0, 0x2, [{0xc, 0x2, 0x20}, {0x6, 0x4}, {0xf, 0x4, 0x101}, {0x2, 0x5}]}, @typedef={0x10, 0x0, 0x0, 0x8, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x52, 0x0, 0x70, 0xa5b29230bd0a0d14}, @fwd={0xa}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000040)=""/79, 0xd4, 0x4f}, 0x20) fremovexattr(r4, &(0x7f0000000280)=@known='trusted.overlay.impure\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f0000000200)) ioctl$EVIOCGABS20(r5, 0x80184560, &(0x7f0000000240)=""/57) 15:44:00 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) 15:44:00 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) r7 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r8 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r8, 0x5, 0x3ff, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r10, 0x8010743f, &(0x7f0000000200)) r11 = socket(0x400000000000010, 0x802, 0x0) write(r11, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r6, 0x400}, {r7}, {r8, 0x400}, {r9, 0x508}, {r10, 0x1067}, {r11, 0x1052a}, {r4, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) pipe(&(0x7f0000000580)) [ 485.188517] FAULT_INJECTION: forcing a failure. [ 485.188517] name failslab, interval 1, probability 0, space 0, times 0 [ 485.209163] CPU: 0 PID: 14527 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 485.217005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.226371] Call Trace: [ 485.228987] dump_stack+0x197/0x210 [ 485.232649] should_fail.cold+0xa/0x1b [ 485.236580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.241710] ? lock_downgrade+0x880/0x880 [ 485.245887] __should_failslab+0x121/0x190 [ 485.250141] should_failslab+0x9/0x14 [ 485.253966] kmem_cache_alloc+0x2ae/0x700 [ 485.258144] ? lock_downgrade+0x880/0x880 [ 485.262419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.267973] ? check_preemption_disabled+0x48/0x290 [ 485.273021] getname_flags+0xd6/0x5b0 [ 485.276930] getname+0x1a/0x20 [ 485.280141] do_sys_open+0x2c9/0x550 [ 485.283867] ? filp_open+0x80/0x80 [ 485.287429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 485.292206] ? do_syscall_64+0x26/0x620 [ 485.296193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.301575] ? do_syscall_64+0x26/0x620 [ 485.305569] __x64_sys_open+0x7e/0xc0 [ 485.309403] do_syscall_64+0xfd/0x620 [ 485.313228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.318430] RIP: 0033:0x414ce1 [ 485.321655] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 485.340578] RSP: 002b:00007f8a9b118a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 485.348310] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 0000000000414ce1 [ 485.355596] RDX: 00007f8a9b118b0a RSI: 0000000000000002 RDI: 00007f8a9b118b00 [ 485.362878] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 485.370160] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f8a9b1196d4 [ 485.377628] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x18, r2, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000780)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)={0x28c, r2, 0xe2200ed7a412dd48, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xf8, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x426}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6a0}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3e3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x64}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @mcast2, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x101, @mcast1, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1fd, @local, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x84d3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7d2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x28c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40020) syz_read_part_table(0x10001, 0x4, &(0x7f0000000380)=[{&(0x7f0000000040)="d80c0f47d9a8174bf93326aa1a5a2512a41d6ee47b4b15dcd13dc477da86717f7f6438203c797aee5810729a30bdf4ee5b21783531b5c1f7826300d0778a625b4628df0af255cfe3b1df741cbf7d0d5d15e3724ef0c594afff32bc1d6ec9dca36dc0fedbfff6c6d3edd2fbd7", 0x6c, 0x8}, {&(0x7f0000000140)="93530b985dae5db288d8eca4297f2eedd41b3398eab612feb38b12969572177ad009106384451c8d4468ccd8ab9603f2ebc27eb79bb838af3e8d2b093ff34f998cda2289db778261f030da7fcb5ca70d728134cdb62d6997c270b1c0f2d4eb67b5be8ebd233062", 0x67, 0x9}, {&(0x7f00000000c0)="f2311c4cc5481c5ac19be35a7ab8d88c58fea0c9f323c72f28668b16f14fc8566148cf08ee88b4eecb33e432cd", 0x2d, 0x7}, {&(0x7f00000001c0)="cf227641e66438254f979b2b6f19b906e8ed93c122bd8f1545ad416f72e6449c193fe1c71d6789c4e70bad8a2b364de311a26f5649997523ba7881ddc6afd856d9656831e12b36df8346b8f32b1f01f6522cf997a5a52350a2e1fb1f7b2b958e5f9fa33c2dc6bc830726d0cdfc1822bc4b9317a841598a31154a196d8c829882bea8fff48824f567f76007eac760b5fd1fdce31ab4b6beddf90fb695746908168cc36c7a346d4d41094baf98b99bd23486", 0xb1, 0x2}]) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) connect$pppoe(r4, &(0x7f0000000280)={0x18, 0x0, {0x3, @broadcast, 'xfrm0\x00'}}, 0x1e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x80, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x5, 0x5, 0x7, 0xb1, 0x230, 0x1}, 0x3c) dup2(r5, r0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsa\x00', 0x2000, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000340)={0x2, 'vlan1\x00', {0x10000}, 0x76}) 15:44:00 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:44:00 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x7, 0x7}, 0x3c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) ioctl$SNDRV_PCM_IOCTL_XRUN(r2, 0x4148, 0x0) dup2(r1, r0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote}, &(0x7f0000000140)=0xc) ioctl$USBDEVFS_RESET(r2, 0x5514) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) ioctl$SNDCTL_DSP_GETBLKSIZE(r4, 0xc0045004, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x9, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ff01000000000000000000e5ff1a0000", @ANYRES32=r4, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0xfffffe00, 0xb5, &(0x7f00000002c0)=""/181, 0x41000, 0x4, [], r3, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x3, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x7, 0x2, 0x4}, 0x10, r5}, 0x78) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x288, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xc4, 0xc, [{0x3c, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfc4a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4609c1d8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4aaa1c3e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8f0c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfe5d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x63ef}]}, {0x44, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xac4d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa71d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcb34}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa403}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xba12}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2dc5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x66b2e491}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1937ca61}]}, {0x1c, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xca52}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7fef256b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd028}]}, {0x24, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd0bd125}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2bce2ed5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaba9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c35af31}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x184, 0xc, [{0x34, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ce0b475}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2232}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd965}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xefd4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b176eaf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x659845e4}]}, {0xc, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3dcd}]}, {0x14, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x779744a4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79619b1e}]}, {0x3c, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4cdbff38}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xea93}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x75cb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x368a5652}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53a8bc17}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2400}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55df6c44}]}, {0x34, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2fc3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x329e0de2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4a92}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd56e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x51e4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x491}]}, {0x1c, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5fe9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x387a3925}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7ce0}]}, {0x54, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4959}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x56a37785}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5b91}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe488}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2c784a60}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5dcfb31a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc232}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5d9fce}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x790a21f3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1196}]}, {0x24, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168187e8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29ee71de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29907265}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x42a6}]}, {0x14, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6db3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x75cd21b8}]}, {0x14, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x23e2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e477393}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, [{0x5}, {0x5, 0x3, 0xb01a8430fa0530de}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x288}, 0x1, 0x0, 0x0, 0x4}, 0x800) 15:44:00 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/vhci\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1eec130bba6dce4e) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1c8dbb499b958173}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x7, 0x0, r2, 0x4}, 0x3c) dup2(r3, r0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f00000000c0)=0x7fffffff) 15:44:00 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) 15:44:00 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000140)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x9db5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000040)) dup2(r1, r0) 15:44:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r2, 0xa435) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r4) keyctl$chown(0x4, r3, r4, 0x0) keyctl$reject(0x13, r2, 0x6, 0x2, r3) [ 485.748474] FAULT_INJECTION: forcing a failure. [ 485.748474] name failslab, interval 1, probability 0, space 0, times 0 [ 485.798793] CPU: 1 PID: 14561 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 485.806752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.816118] Call Trace: [ 485.818710] dump_stack+0x197/0x210 [ 485.823379] should_fail.cold+0xa/0x1b [ 485.827261] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.832473] ? lock_downgrade+0x880/0x880 [ 485.836640] __should_failslab+0x121/0x190 [ 485.840888] should_failslab+0x9/0x14 [ 485.844791] kmem_cache_alloc+0x2ae/0x700 [ 485.849067] ? lock_downgrade+0x880/0x880 [ 485.853238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.858775] ? check_preemption_disabled+0x48/0x290 [ 485.863794] getname_flags+0xd6/0x5b0 [ 485.867593] getname+0x1a/0x20 [ 485.870795] do_sys_open+0x2c9/0x550 [ 485.874507] ? filp_open+0x80/0x80 [ 485.878054] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 485.882819] ? do_syscall_64+0x26/0x620 [ 485.886788] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.892157] ? do_syscall_64+0x26/0x620 [ 485.896127] __x64_sys_open+0x7e/0xc0 [ 485.900354] do_syscall_64+0xfd/0x620 [ 485.904148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.909325] RIP: 0033:0x414ce1 [ 485.912510] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 485.931401] RSP: 002b:00007f8a9b118a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 485.939114] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 0000000000414ce1 15:44:00 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) prctl$PR_GET_KEEPCAPS(0x7) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x16, 0x5, 0x7, 0x9, 0xd, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x35) dup2(r1, r0) 15:44:00 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) r7 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r8 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r8, 0x5, 0x3ff, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r10, 0x8010743f, &(0x7f0000000200)) r11 = socket(0x400000000000010, 0x802, 0x0) write(r11, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r6, 0x400}, {r7}, {r8, 0x400}, {r9, 0x508}, {r10, 0x1067}, {r11, 0x1052a}, {r4, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) pipe(&(0x7f0000000580)) [ 485.946373] RDX: 00007f8a9b118b0a RSI: 0000000000000002 RDI: 00007f8a9b118b00 [ 485.953649] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 485.960910] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f8a9b1196d4 [ 485.968180] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)) 15:44:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x14802) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x7fbb6018b9926dc3, 0x4) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0xde21e70853523f6c, 0x1, 0x0, [], 0x0, r1, 0x0, 0x205}, 0x3c) dup2(r2, r0) 15:44:00 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 486.163624] FAULT_INJECTION: forcing a failure. [ 486.163624] name failslab, interval 1, probability 0, space 0, times 0 [ 486.184308] CPU: 1 PID: 14579 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 486.192249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.201619] Call Trace: [ 486.204228] dump_stack+0x197/0x210 [ 486.207879] should_fail.cold+0xa/0x1b [ 486.211801] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.216934] ? lock_downgrade+0x880/0x880 [ 486.221126] __should_failslab+0x121/0x190 [ 486.225913] should_failslab+0x9/0x14 [ 486.229738] kmem_cache_alloc+0x2ae/0x700 [ 486.233915] ? __save_stack_trace+0x99/0x100 [ 486.238365] __alloc_file+0x27/0x330 [ 486.242125] alloc_empty_file+0x72/0x170 [ 486.246204] path_openat+0xef/0x45e0 [ 486.249938] ? __lock_acquire+0x6ee/0x49c0 [ 486.254182] ? getname+0x1a/0x20 [ 486.257648] ? do_sys_open+0x2c9/0x550 [ 486.261550] ? __x64_sys_open+0x7e/0xc0 [ 486.265541] ? do_syscall_64+0xfd/0x620 [ 486.269559] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.275135] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 486.279837] ? __lock_is_held+0xb6/0x140 [ 486.283943] ? __alloc_fd+0x44d/0x560 [ 486.287775] do_filp_open+0x1a1/0x280 [ 486.291787] ? may_open_dev+0x100/0x100 [ 486.295784] ? lock_downgrade+0x880/0x880 [ 486.299955] ? do_raw_spin_unlock+0x181/0x270 [ 486.304497] ? _raw_spin_unlock+0x2d/0x50 [ 486.308661] ? __alloc_fd+0x44d/0x560 [ 486.312498] do_sys_open+0x3fe/0x550 [ 486.316227] ? filp_open+0x80/0x80 [ 486.319789] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 486.324565] ? do_syscall_64+0x26/0x620 [ 486.328558] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.333946] ? do_syscall_64+0x26/0x620 [ 486.337943] __x64_sys_open+0x7e/0xc0 [ 486.341783] do_syscall_64+0xfd/0x620 [ 486.346926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.353084] RIP: 0033:0x414ce1 [ 486.356289] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 486.375297] RSP: 002b:00007f8a9b118a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 486.383016] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 0000000000414ce1 [ 486.390296] RDX: 00007f8a9b118b0a RSI: 0000000000000002 RDI: 00007f8a9b118b00 [ 486.397587] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 486.404970] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f8a9b1196d4 [ 486.412266] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:10 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 15:44:10 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000040)={0x4, 0x2f1a, 0x81, 0x8, 0x200, 0x1}) dup2(r1, r0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000140)) 15:44:10 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RSTATFS(r1, &(0x7f0000000180)={0x43, 0x9, 0x2, {0x2, 0x3, 0x0, 0x9, 0x6, 0x200, 0xfffffffffffffffd, 0x8, 0x3}}, 0x43) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400402, 0x0) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000cc0)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000080)={r5, 0x1ff}, &(0x7f00000000c0)=0x8) dup2(r2, r0) 15:44:10 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) r7 = mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r8 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r8, 0x5, 0x3ff, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r10, 0x8010743f, &(0x7f0000000200)) r11 = socket(0x400000000000010, 0x802, 0x0) write(r11, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ppoll(&(0x7f00000004c0)=[{r6, 0x400}, {r7}, {r8, 0x400}, {r9, 0x508}, {r10, 0x1067}, {r11, 0x1052a}, {r4, 0x8}], 0x7, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)={0x9}, 0x8) 15:44:10 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:10 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) [ 496.065723] FAULT_INJECTION: forcing a failure. [ 496.065723] name failslab, interval 1, probability 0, space 0, times 0 [ 496.132404] CPU: 1 PID: 14589 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 496.140266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.149620] Call Trace: [ 496.152226] dump_stack+0x197/0x210 [ 496.155857] should_fail.cold+0xa/0x1b [ 496.159744] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.164845] ? lock_downgrade+0x880/0x880 [ 496.168998] __should_failslab+0x121/0x190 [ 496.173240] should_failslab+0x9/0x14 [ 496.177117] kmem_cache_alloc+0x2ae/0x700 [ 496.181285] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.186306] selinux_file_alloc_security+0xb4/0x190 [ 496.191322] security_file_alloc+0x63/0xa0 [ 496.195566] __alloc_file+0xcf/0x330 [ 496.199279] alloc_empty_file+0x72/0x170 [ 496.203337] path_openat+0xef/0x45e0 [ 496.207044] ? __lock_acquire+0x6ee/0x49c0 [ 496.211269] ? getname+0x1a/0x20 [ 496.215100] ? do_sys_open+0x2c9/0x550 [ 496.218986] ? __x64_sys_open+0x7e/0xc0 [ 496.222956] ? do_syscall_64+0xfd/0x620 [ 496.227022] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.232399] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 496.237058] ? __lock_is_held+0xb6/0x140 [ 496.241126] ? __alloc_fd+0x44d/0x560 [ 496.244919] do_filp_open+0x1a1/0x280 [ 496.248722] ? may_open_dev+0x100/0x100 [ 496.252742] ? lock_downgrade+0x880/0x880 [ 496.256888] ? do_raw_spin_unlock+0x181/0x270 [ 496.261376] ? _raw_spin_unlock+0x2d/0x50 [ 496.265527] ? __alloc_fd+0x44d/0x560 [ 496.269328] do_sys_open+0x3fe/0x550 [ 496.273035] ? filp_open+0x80/0x80 [ 496.276573] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.281322] ? do_syscall_64+0x26/0x620 [ 496.285296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.290663] ? do_syscall_64+0x26/0x620 [ 496.294723] __x64_sys_open+0x7e/0xc0 [ 496.298518] do_syscall_64+0xfd/0x620 [ 496.302325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.307607] RIP: 0033:0x414ce1 [ 496.310807] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 15:44:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) r3 = accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c, 0x800) getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=""/93, &(0x7f0000000240)=0x5d) 15:44:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x2}, 0x3c) dup2(r1, r0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000080)=[{{0x4, 0x1, 0x1, 0x1}, {0x3, 0x1, 0x1}}, {{0x2, 0x1, 0x1}, {0x1, 0x1, 0x0, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x1, 0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x1, 0x0, 0x1}}, {{0x1, 0x1, 0x0, 0x1}, {0x1, 0x1, 0x0, 0x1}}, {{0x1, 0x1, 0x1}, {0x0, 0x0, 0x1}}, {{0x2, 0x1, 0x1}, {0x0, 0x1, 0x1}}, {{0x0, 0x1}, {0x2, 0x1}}], 0x40) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xc8521903583c4201, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000280)=0x7) [ 496.329703] RSP: 002b:00007f8a9b118a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 496.337588] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 0000000000414ce1 [ 496.345290] RDX: 00007f8a9b118b0a RSI: 0000000000000002 RDI: 00007f8a9b118b00 [ 496.352835] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 496.360100] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f8a9b1196d4 [ 496.367420] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:11 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) r9 = socket(0x400000000000010, 0x802, 0x0) write(r9, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) 15:44:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000040)) 15:44:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x2, 0x3, 0xe537, 0x4000009, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff, 0xfffffffe}, 0xfffffffffffffd31) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r1, 0x5, 0x3ff, 0x0, 0x0) dup2(r1, r0) 15:44:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r0) 15:44:21 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 15:44:21 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) socket(0x400000000000010, 0x802, 0x0) 15:44:21 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:21 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x3}, 0xb) 15:44:21 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) getegid() setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req={0xffff5783, 0x7, 0x7, 0xa3f}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x14, 0x5, 0xf, 0x9, 0x2b, 0xffffffffffffffff, 0xfffffffe}, 0x3c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {r4, r5+30000000}}, &(0x7f00000001c0)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) dup2(r0, r2) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$PPPOEIOCSFWD(r6, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @local, 'gre0\x00'}}) 15:44:21 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) [ 506.317462] FAULT_INJECTION: forcing a failure. [ 506.317462] name failslab, interval 1, probability 0, space 0, times 0 [ 506.374758] CPU: 1 PID: 14626 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 506.382597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.391966] Call Trace: [ 506.394674] dump_stack+0x197/0x210 [ 506.398326] should_fail.cold+0xa/0x1b [ 506.402234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 506.407801] ? lock_downgrade+0x880/0x880 [ 506.412004] __should_failslab+0x121/0x190 [ 506.416260] should_failslab+0x9/0x14 [ 506.420075] kmem_cache_alloc+0x2ae/0x700 [ 506.424248] ? rcu_read_lock_sched_held+0x110/0x130 [ 506.429293] selinux_file_alloc_security+0xb4/0x190 [ 506.434327] security_file_alloc+0x63/0xa0 [ 506.438585] __alloc_file+0xcf/0x330 [ 506.442318] alloc_empty_file+0x72/0x170 [ 506.446391] path_openat+0xef/0x45e0 [ 506.450119] ? __lock_acquire+0x6ee/0x49c0 [ 506.454359] ? getname+0x1a/0x20 [ 506.457736] ? do_sys_open+0x2c9/0x550 [ 506.461632] ? __x64_sys_open+0x7e/0xc0 [ 506.465616] ? do_syscall_64+0xfd/0x620 [ 506.469604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.475008] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 506.479692] ? __lock_is_held+0xb6/0x140 [ 506.483771] ? __alloc_fd+0x44d/0x560 [ 506.487584] do_filp_open+0x1a1/0x280 [ 506.491400] ? may_open_dev+0x100/0x100 [ 506.495400] ? lock_downgrade+0x880/0x880 [ 506.499570] ? do_raw_spin_unlock+0x181/0x270 [ 506.504092] ? _raw_spin_unlock+0x2d/0x50 [ 506.508257] ? __alloc_fd+0x44d/0x560 [ 506.512091] do_sys_open+0x3fe/0x550 [ 506.515823] ? filp_open+0x80/0x80 [ 506.519383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 506.524152] ? do_syscall_64+0x26/0x620 [ 506.528140] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.533515] ? do_syscall_64+0x26/0x620 [ 506.537510] __x64_sys_open+0x7e/0xc0 [ 506.541327] do_syscall_64+0xfd/0x620 [ 506.545149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.550345] RIP: 0033:0x414ce1 [ 506.553555] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 15:44:21 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040)=0x37f, 0x4) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x800, 0x9}, 0x3c) dup2(r1, r0) [ 506.573593] RSP: 002b:00007f8a9b118a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 506.581314] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 0000000000414ce1 [ 506.588597] RDX: 00007f8a9b118b0a RSI: 0000000000000002 RDI: 00007f8a9b118b00 [ 506.595881] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 506.603588] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f8a9b1196d4 [ 506.610862] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:21 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) socket$pppoe(0x18, 0x1, 0x0) 15:44:21 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) 15:44:21 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001480)={0x0, @can, @generic={0x22, "123fcaec6cad56ee707417d07a81"}, @xdp={0x2c, 0x8, r4, 0x29}, 0x1, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001440)='ip_vti0\x00', 0x0, 0x0, 0x9}) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r9, 0x0, 0x200) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)={0x5, 0x8, 0xc, 0x9, 0x0, 0x1, 0x0, [], r8, r9}, 0x3c) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x0, r11}) dup2(r10, r0) 15:44:21 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:21 executing program 0: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000001c0)) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x1, 0x400) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) recvfrom(r0, &(0x7f0000000200)=""/4096, 0x1000, 0x33d06aff465382dd, 0x0, 0x0) [ 506.733432] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 506.774933] IPv6: ADDRCONF(NETDEV_UP): veth111: link is not ready [ 506.791171] FAULT_INJECTION: forcing a failure. [ 506.791171] name failslab, interval 1, probability 0, space 0, times 0 [ 506.809611] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 506.816254] CPU: 0 PID: 14649 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 506.826016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.835384] Call Trace: [ 506.838202] dump_stack+0x197/0x210 [ 506.841854] should_fail.cold+0xa/0x1b [ 506.845763] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 506.850894] ? lock_downgrade+0x880/0x880 [ 506.855077] __should_failslab+0x121/0x190 [ 506.859335] should_failslab+0x9/0x14 [ 506.863421] kmem_cache_alloc_trace+0x2cc/0x760 [ 506.868103] ? __lockdep_init_map+0x10c/0x5b0 [ 506.872173] IPv6: ADDRCONF(NETDEV_UP): veth113: link is not ready [ 506.872676] ? loop_info64_to_compat+0x6d0/0x6d0 [ 506.883608] __kthread_create_on_node+0xf2/0x460 [ 506.888381] ? lock_acquire+0x16f/0x3f0 [ 506.892367] ? __kthread_parkme+0x1b0/0x1b0 [ 506.896706] ? lo_ioctl+0x1c4/0x20e0 [ 506.900434] ? lock_downgrade+0x880/0x880 [ 506.904592] ? mutex_trylock+0x1e0/0x1e0 [ 506.908647] ? loop_info64_to_compat+0x6d0/0x6d0 [ 506.913408] kthread_create_on_node+0xbb/0xf0 [ 506.917917] ? __kthread_create_on_node+0x460/0x460 [ 506.922954] ? __lockdep_init_map+0x10c/0x5b0 [ 506.927471] ? __lockdep_init_map+0x10c/0x5b0 [ 506.931997] lo_ioctl+0xaf2/0x20e0 [ 506.935559] ? lo_rw_aio+0x1470/0x1470 [ 506.939527] blkdev_ioctl+0xc38/0x1ab6 [ 506.943434] ? blkpg_ioctl+0xa90/0xa90 [ 506.947331] ? find_held_lock+0x35/0x130 [ 506.951405] ? debug_check_no_obj_freed+0x200/0x464 [ 506.956448] ? __fget+0x340/0x540 [ 506.959928] block_ioctl+0xee/0x130 [ 506.963567] ? blkdev_fallocate+0x410/0x410 [ 506.967899] do_vfs_ioctl+0xd5f/0x1380 [ 506.971797] ? selinux_file_ioctl+0x46f/0x5e0 [ 506.976300] ? selinux_file_ioctl+0x125/0x5e0 [ 506.980814] ? ioctl_preallocate+0x210/0x210 [ 506.985234] ? selinux_file_mprotect+0x620/0x620 [ 506.990009] ? iterate_fd+0x360/0x360 [ 506.993906] ? do_sys_open+0x31d/0x550 [ 506.997812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.003359] ? security_file_ioctl+0x8d/0xc0 [ 507.007785] ksys_ioctl+0xab/0xd0 [ 507.011252] __x64_sys_ioctl+0x73/0xb0 [ 507.015153] do_syscall_64+0xfd/0x620 [ 507.018973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.024173] RIP: 0033:0x45adb7 [ 507.027381] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.046290] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 507.054007] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 507.061400] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 507.068672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 507.075946] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 507.083240] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 507.108350] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 507.124280] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:44:31 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 15:44:31 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:44:31 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:31 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f00000001c0)=@HCI_ACLDATA_PKT={0x2, "c3dc154fa7581cbe52c6dbe6056b7ae483f46dbef3c8c47887114057f64ab6e20a207288d36f7d"}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x7, 0x78e}, 0xc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000000)={0x0, 0x2400}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) dup2(r1, r0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, 0x0, 0xffffff5c) r5 = open(&(0x7f0000000200)='./file0\x00', 0x220000, 0x29) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000240)={r5, 0x7fffffff, 0xfe00, "4bd3ef18bedcd80a532c0e709f8c8a19919d0f80172767138c144ceb437a5445d8081cf71dcd3ede54d9c32b21e1e78a21394359ddad1f45c9da344e499c21042a2f4b9d144bc74ee6a1a936232959510da7331f5d8388a1ca07704ca98bfbf6052e3d2bf67130e7a6b240f85fe2acd8ad20b5aeb483ff599bb7b5bbad081b13b562dbde6fb0c74aeadebb19cd13e40aeea742a0a813d7e8f2286ee4a8b821e4a72f293a1725d37fa3c8841de4697a774389321646f88e8030"}) r6 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)) r7 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0xffffff5c) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r8, 0x84, 0xe, &(0x7f0000000cc0)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000340)={r10, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x36}, 0x4}}, 0x9, 0x100, 0x10001, 0x0, 0x20, 0x0, 0x11}, 0x9c) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000400)={0x7, 0xf, 0x0, "230e345b82a66f1ac670b1f0435595007cb1b86408a62abdff7eceb2dd468ae90c8d91b6131c630cb8a2245c08bb42fffa2e5fdc70d8edbfb4a7db90", 0x13, "dce358dec41363c8a1b6984dcbe3278eed34f687def35ffc2e2154e96dad7dd54fe6df9d3b109f83837be13465ca3e643df0d9aacd77c6cfcae13392", 0x8}) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000140)={0x9b0000, 0x1000, 0x3ff, r6, 0x0, &(0x7f00000000c0)={0x3d04d6, 0x5, [], @ptr=0x6}}) ioctl$VIDIOC_QUERYSTD(r11, 0x8008563f, &(0x7f0000000180)) 15:44:31 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) 15:44:31 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) [ 516.555346] FAULT_INJECTION: forcing a failure. [ 516.555346] name failslab, interval 1, probability 0, space 0, times 0 [ 516.579919] CPU: 0 PID: 14658 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 516.587742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.597110] Call Trace: [ 516.599720] dump_stack+0x197/0x210 [ 516.603377] should_fail.cold+0xa/0x1b [ 516.607285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.612401] ? lock_downgrade+0x880/0x880 [ 516.616579] __should_failslab+0x121/0x190 [ 516.620835] should_failslab+0x9/0x14 [ 516.624656] kmem_cache_alloc+0x2ae/0x700 [ 516.628827] ? find_held_lock+0x35/0x130 [ 516.632908] ? kernfs_activate+0x192/0x1f0 [ 516.637169] __kernfs_new_node+0xef/0x6f0 [ 516.641345] ? lock_downgrade+0x880/0x880 [ 516.645516] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 516.650283] ? lock_downgrade+0x880/0x880 [ 516.654443] ? kasan_check_write+0x14/0x20 [ 516.658689] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 516.663551] ? wait_for_completion+0x440/0x440 [ 516.668149] kernfs_new_node+0x99/0x130 [ 516.672146] __kernfs_create_file+0x51/0x33b [ 516.676574] sysfs_add_file_mode_ns+0x222/0x560 [ 516.681266] internal_create_group+0x383/0xc30 [ 516.685855] ? bd_set_size+0x89/0xb0 [ 516.689589] ? remove_files.isra.0+0x190/0x190 [ 516.694199] sysfs_create_group+0x20/0x30 [ 516.698364] lo_ioctl+0xf8f/0x20e0 [ 516.702016] ? lo_rw_aio+0x1470/0x1470 [ 516.705917] blkdev_ioctl+0xc38/0x1ab6 [ 516.709819] ? blkpg_ioctl+0xa90/0xa90 [ 516.713714] ? find_held_lock+0x35/0x130 [ 516.717792] ? debug_check_no_obj_freed+0x200/0x464 [ 516.722826] ? __fget+0x340/0x540 [ 516.726388] block_ioctl+0xee/0x130 [ 516.730022] ? blkdev_fallocate+0x410/0x410 [ 516.734361] do_vfs_ioctl+0xd5f/0x1380 [ 516.738279] ? selinux_file_ioctl+0x46f/0x5e0 [ 516.742795] ? selinux_file_ioctl+0x125/0x5e0 [ 516.747319] ? ioctl_preallocate+0x210/0x210 [ 516.751795] ? selinux_file_mprotect+0x620/0x620 [ 516.756577] ? iterate_fd+0x360/0x360 [ 516.760652] ? do_sys_open+0x31d/0x550 [ 516.764561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.770115] ? security_file_ioctl+0x8d/0xc0 [ 516.774543] ksys_ioctl+0xab/0xd0 [ 516.778013] __x64_sys_ioctl+0x73/0xb0 [ 516.781919] do_syscall_64+0xfd/0x620 [ 516.785752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.790946] RIP: 0033:0x45adb7 [ 516.794146] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.813054] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 516.820783] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 516.828060] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 516.835335] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 516.842609] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 516.849881] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:31 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:31 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000080)) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x70, r5, 0x510f727a51cea963, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xef}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb1}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4040010}, 0xc731d945e89a5ad8) r6 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x8a, 0x100) sendmsg$kcm(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="edecf34018b2e2a658261a233b19458516b44e682f71d13eebb8cc6fbd03", 0x1e}, {&(0x7f0000000240)="cd50d1b3d645a538dd8ceead755ff9f0b9acfc1972e7c7e56f2c5bbe2a517f348a3730e4df052f978619769bff357ad339e2ed516bfa381c40a0efc1268f7de7ace24351929ae85df319fb91f44ea10ae44b3a1b183a75cc3edb94f13681238865b94cb694235ad9b7af369ed7c9919ac49ee44b02d78427f5cc5e01d5295e1c76afefca3c09dc31b2f09b67b95e11d8f0b92c1efe6a4e35375236e9270fdf4aafec46fcfdd799e9a649bbb57fd4bd87346a72f1bbe6774d190ecb88656f062e941bb63c5e73733a5c99145ab0", 0xcd}, {&(0x7f0000000340)="13a3a15f549972717dfa7340a2", 0xd}, {&(0x7f0000000380)="61c88e10891a414f03e72c99ca20d643985958bcb6405d1f57775263a3beabbae82ed85cd79aac257aaf7aa088e00f0aaeb0167ba906b8393302e05e4e2a6d7e111aa96254390f224e226744b58fe6eb6e353f2aa15427e68ef197e2fce4f2a7b0ff4b27170df45a9b20ba609e975540e512f796f259ba2eef0d0427f97a4a169b137c6559f845d32756e7548a12e5b9cd02b8fc9ed62a032d3f3396076cc38ffc8e144928a975b8bdf47c9e2d47ac3280eb", 0xb2}, {&(0x7f0000000440)="a697", 0x2}, {&(0x7f0000000480)="0706876903ac6e7ea04b766ae2941d4865f0b5fabdf12e1e1192d23c180b5d0e8c5126796ce1eff602dd9507783e0e53d274b7ca", 0x34}], 0x6}, 0x20000000) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f0000000040)=0x6, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000140)=[@sack_perm, @window={0x3, 0x0, 0x8000}, @sack_perm, @timestamp, @mss={0x2, 0x2}, @mss={0x2, 0x5}, @window={0x3, 0x4, 0x2}], 0x7) 15:44:31 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x6, 0x5, 0x7, 0x9, 0x0, r1}, 0xfffffffffffffe96) [ 517.039080] FAULT_INJECTION: forcing a failure. [ 517.039080] name failslab, interval 1, probability 0, space 0, times 0 [ 517.056565] CPU: 1 PID: 14679 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 517.064404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.073766] Call Trace: [ 517.076383] dump_stack+0x197/0x210 [ 517.080034] should_fail.cold+0xa/0x1b [ 517.083948] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.089156] ? lock_downgrade+0x880/0x880 [ 517.093330] __should_failslab+0x121/0x190 [ 517.097584] should_failslab+0x9/0x14 [ 517.101393] kmem_cache_alloc+0x2ae/0x700 [ 517.105555] ? find_held_lock+0x35/0x130 [ 517.109629] ? kernfs_activate+0x192/0x1f0 [ 517.113878] __kernfs_new_node+0xef/0x6f0 [ 517.118036] ? lock_downgrade+0x880/0x880 [ 517.122199] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 517.126966] ? lock_downgrade+0x880/0x880 [ 517.131133] ? kasan_check_write+0x14/0x20 [ 517.135386] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 517.140251] ? wait_for_completion+0x440/0x440 [ 517.144854] kernfs_new_node+0x99/0x130 [ 517.148846] __kernfs_create_file+0x51/0x33b [ 517.153359] sysfs_add_file_mode_ns+0x222/0x560 [ 517.158050] internal_create_group+0x383/0xc30 [ 517.162643] ? bd_set_size+0x89/0xb0 [ 517.166377] ? remove_files.isra.0+0x190/0x190 [ 517.170988] sysfs_create_group+0x20/0x30 [ 517.175148] lo_ioctl+0xf8f/0x20e0 [ 517.178715] ? lo_rw_aio+0x1470/0x1470 [ 517.182613] blkdev_ioctl+0xc38/0x1ab6 [ 517.186511] ? blkpg_ioctl+0xa90/0xa90 [ 517.190409] ? find_held_lock+0x35/0x130 [ 517.194484] ? debug_check_no_obj_freed+0x200/0x464 [ 517.199517] ? __fget+0x340/0x540 [ 517.203016] block_ioctl+0xee/0x130 [ 517.206654] ? blkdev_fallocate+0x410/0x410 [ 517.211103] do_vfs_ioctl+0xd5f/0x1380 [ 517.215007] ? selinux_file_ioctl+0x46f/0x5e0 [ 517.219515] ? selinux_file_ioctl+0x125/0x5e0 [ 517.224025] ? ioctl_preallocate+0x210/0x210 [ 517.228449] ? selinux_file_mprotect+0x620/0x620 [ 517.233228] ? iterate_fd+0x360/0x360 [ 517.237047] ? do_sys_open+0x31d/0x550 [ 517.242521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.248069] ? security_file_ioctl+0x8d/0xc0 [ 517.252491] ksys_ioctl+0xab/0xd0 [ 517.256310] __x64_sys_ioctl+0x73/0xb0 [ 517.260215] do_syscall_64+0xfd/0x620 [ 517.264034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.269235] RIP: 0033:0x45adb7 [ 517.272441] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.291349] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 517.299090] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 517.306370] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 517.313646] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 517.320928] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 517.328214] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:32 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r8, 0x8010743f, &(0x7f0000000200)) 15:44:32 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) 15:44:32 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 517.562176] FAULT_INJECTION: forcing a failure. [ 517.562176] name failslab, interval 1, probability 0, space 0, times 0 [ 517.573513] CPU: 0 PID: 14691 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 517.581330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.590701] Call Trace: [ 517.593318] dump_stack+0x197/0x210 [ 517.596969] should_fail.cold+0xa/0x1b [ 517.600879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.605995] ? lock_downgrade+0x880/0x880 [ 517.610171] __should_failslab+0x121/0x190 [ 517.614425] should_failslab+0x9/0x14 [ 517.618236] kmem_cache_alloc+0x2ae/0x700 [ 517.622408] ? lock_downgrade+0x880/0x880 [ 517.626574] __kernfs_new_node+0xef/0x6f0 [ 517.630735] ? kasan_check_write+0x14/0x20 [ 517.634983] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 517.639754] ? wait_for_completion+0x440/0x440 [ 517.644357] ? mutex_unlock+0xd/0x10 [ 517.648082] ? kernfs_activate+0x192/0x1f0 [ 517.652332] kernfs_new_node+0x99/0x130 [ 517.656325] __kernfs_create_file+0x51/0x33b [ 517.660776] sysfs_add_file_mode_ns+0x222/0x560 [ 517.665467] internal_create_group+0x383/0xc30 [ 517.670059] ? bd_set_size+0x89/0xb0 [ 517.673795] ? remove_files.isra.0+0x190/0x190 [ 517.678413] sysfs_create_group+0x20/0x30 [ 517.682571] lo_ioctl+0xf8f/0x20e0 [ 517.686129] ? lo_rw_aio+0x1470/0x1470 [ 517.690030] blkdev_ioctl+0xc38/0x1ab6 [ 517.693934] ? blkpg_ioctl+0xa90/0xa90 [ 517.697835] ? find_held_lock+0x35/0x130 [ 517.701914] ? debug_check_no_obj_freed+0x200/0x464 [ 517.706947] ? __fget+0x340/0x540 [ 517.710423] block_ioctl+0xee/0x130 [ 517.714058] ? blkdev_fallocate+0x410/0x410 [ 517.718394] do_vfs_ioctl+0xd5f/0x1380 [ 517.722291] ? selinux_file_ioctl+0x46f/0x5e0 [ 517.726794] ? selinux_file_ioctl+0x125/0x5e0 [ 517.731309] ? ioctl_preallocate+0x210/0x210 [ 517.735728] ? selinux_file_mprotect+0x620/0x620 [ 517.740513] ? iterate_fd+0x360/0x360 [ 517.744326] ? do_sys_open+0x31d/0x550 [ 517.748239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.754320] ? security_file_ioctl+0x8d/0xc0 [ 517.758743] ksys_ioctl+0xab/0xd0 [ 517.762211] __x64_sys_ioctl+0x73/0xb0 [ 517.766113] do_syscall_64+0xfd/0x620 [ 517.769928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.775122] RIP: 0033:0x45adb7 [ 517.778323] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.797230] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 517.804962] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 517.812248] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 517.819535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 517.827781] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 517.835061] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:42 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:44:42 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/205, 0xcd}, {&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)=""/219, 0xdb}], 0x3, &(0x7f00000003c0)=""/69, 0x45}, 0x12142) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x98, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:admin_passwd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:user_cron_spool_t:s0\x00'}]}, 0x98}, 0x1, 0x0, 0x0, 0x2057075d40a01419}, 0x20040058) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) syz_mount_image$ntfs(&(0x7f0000000600)='ntfs\x00', &(0x7f0000000640)='./file0\x00', 0x80000000, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000680)="19d31a388e62d3d69938229b029432818ffefc938f8cfbfd2b6dcae9b71a3f7ed6f808277054096a373e49d0df57e25342c34be7f6dae18d6ecdb4d362253c6a585944f129828c753e1025e2bdc506fd19690201fe5d58cd28cb903b926dc62db057058c1faa070e86b55f43bf1d50ba5ccfd6ee6845cfebc5c297a8ba7fa538cf5472a8c2aa389c0f2f1726d103bcef645bfcc8137173a38e4d1f8ead5d1e2c46a566a896", 0xa5, 0x81}, {&(0x7f0000000740)="964c51262d94146257e11c360537d9e0b9c0c0f4f9d51ec93bc99558990d16ddf15426d3b8800712ef30d6ef", 0x2c, 0x120000000000000}, {&(0x7f0000000780)="409c9af7a2a68ca9a14bcb13595780bf2c621737e851dc1dc5e8dd0150d836", 0x1f, 0x4}], 0x400, &(0x7f0000000840)={[{@errors_recover='errors=recover'}, {@show_sys_files_yes='show_sys_files=yes'}, {@errors_recover='errors=recover'}, {@nls={'nls', 0x3d, 'cp866'}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) r2 = semget$private(0x0, 0x4, 0x1b2) semctl$GETPID(r2, 0x3, 0xb, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r3, r0) 15:44:42 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)) 15:44:42 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:42 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) socket$pppoe(0x18, 0x1, 0x0) 15:44:42 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 527.433161] FAULT_INJECTION: forcing a failure. [ 527.433161] name failslab, interval 1, probability 0, space 0, times 0 [ 527.448209] CPU: 0 PID: 14701 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 527.456053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.465418] Call Trace: [ 527.468029] dump_stack+0x197/0x210 [ 527.471679] should_fail.cold+0xa/0x1b [ 527.475598] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.480738] ? lock_downgrade+0x880/0x880 [ 527.484929] __should_failslab+0x121/0x190 [ 527.489202] should_failslab+0x9/0x14 [ 527.493040] kmem_cache_alloc+0x2ae/0x700 [ 527.497212] ? lock_downgrade+0x880/0x880 [ 527.501381] __kernfs_new_node+0xef/0x6f0 [ 527.505550] ? kasan_check_write+0x14/0x20 [ 527.509805] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 527.514576] ? wait_for_completion+0x440/0x440 [ 527.519183] ? mutex_unlock+0xd/0x10 [ 527.522917] ? kernfs_activate+0x192/0x1f0 [ 527.527166] kernfs_new_node+0x99/0x130 [ 527.531512] __kernfs_create_file+0x51/0x33b [ 527.535943] sysfs_add_file_mode_ns+0x222/0x560 [ 527.540638] internal_create_group+0x383/0xc30 [ 527.545341] ? bd_set_size+0x89/0xb0 [ 527.549079] ? remove_files.isra.0+0x190/0x190 [ 527.553687] sysfs_create_group+0x20/0x30 [ 527.557847] lo_ioctl+0xf8f/0x20e0 [ 527.561422] ? lo_rw_aio+0x1470/0x1470 [ 527.565325] blkdev_ioctl+0xc38/0x1ab6 [ 527.569226] ? blkpg_ioctl+0xa90/0xa90 [ 527.573122] ? find_held_lock+0x35/0x130 [ 527.577198] ? debug_check_no_obj_freed+0x200/0x464 [ 527.582236] ? __fget+0x340/0x540 [ 527.585712] block_ioctl+0xee/0x130 [ 527.589358] ? blkdev_fallocate+0x410/0x410 [ 527.593700] do_vfs_ioctl+0xd5f/0x1380 [ 527.597632] ? selinux_file_ioctl+0x46f/0x5e0 [ 527.602154] ? selinux_file_ioctl+0x125/0x5e0 [ 527.606674] ? ioctl_preallocate+0x210/0x210 [ 527.611100] ? selinux_file_mprotect+0x620/0x620 [ 527.615885] ? iterate_fd+0x360/0x360 [ 527.619707] ? do_sys_open+0x31d/0x550 [ 527.623715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.629269] ? security_file_ioctl+0x8d/0xc0 [ 527.633703] ksys_ioctl+0xab/0xd0 [ 527.637181] __x64_sys_ioctl+0x73/0xb0 [ 527.641082] do_syscall_64+0xfd/0x620 [ 527.644903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.650099] RIP: 0033:0x45adb7 [ 527.653302] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.672213] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 527.680024] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 527.688168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 527.695446] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 527.702737] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 527.710026] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 527.745388] ntfs: (device loop3): parse_options(): Unrecognized mount option mask. [ 527.753543] ntfs: (device loop3): parse_options(): Unrecognized mount option appraise. [ 527.762108] ntfs: (device loop3): parse_options(): Unrecognized mount option . 15:44:42 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:42 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x48, 0x4080) setsockopt$inet_dccp_int(r2, 0x21, 0xb, &(0x7f0000000080)=0x3, 0x4) dup2(r1, r0) [ 527.979771] FAULT_INJECTION: forcing a failure. [ 527.979771] name failslab, interval 1, probability 0, space 0, times 0 [ 527.991703] CPU: 0 PID: 14715 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 527.999523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.009072] Call Trace: [ 528.011681] dump_stack+0x197/0x210 [ 528.015331] should_fail.cold+0xa/0x1b [ 528.019241] ? is_bpf_text_address+0xd3/0x170 [ 528.023768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 528.028886] ? __kernel_text_address+0xd/0x40 [ 528.033403] ? unwind_get_return_address+0x61/0xa0 [ 528.038364] __should_failslab+0x121/0x190 [ 528.042618] should_failslab+0x9/0x14 [ 528.046454] kmem_cache_alloc+0x47/0x700 [ 528.050545] ? save_stack+0xa9/0xd0 [ 528.054201] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 528.059855] idr_get_free+0x527/0xa28 [ 528.063680] idr_alloc_u32+0x1d6/0x390 [ 528.067614] ? __fprop_inc_percpu_max+0x230/0x230 [ 528.072478] ? __lock_is_held+0xb6/0x140 [ 528.076554] ? should_fail+0x14d/0x85c [ 528.080558] ? __lock_is_held+0xb6/0x140 [ 528.084644] idr_alloc_cyclic+0x132/0x270 [ 528.088812] ? idr_alloc+0x150/0x150 [ 528.092545] ? kasan_check_write+0x14/0x20 [ 528.096809] ? do_raw_spin_lock+0xd7/0x250 [ 528.101073] __kernfs_new_node+0x139/0x6f0 [ 528.105333] ? kasan_check_write+0x14/0x20 [ 528.109588] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 528.114369] ? wait_for_completion+0x440/0x440 [ 528.118990] ? mutex_unlock+0xd/0x10 [ 528.122718] ? kernfs_activate+0x192/0x1f0 [ 528.126981] kernfs_new_node+0x99/0x130 [ 528.130987] __kernfs_create_file+0x51/0x33b [ 528.135424] sysfs_add_file_mode_ns+0x222/0x560 [ 528.140120] internal_create_group+0x383/0xc30 [ 528.144722] ? bd_set_size+0x89/0xb0 [ 528.148461] ? remove_files.isra.0+0x190/0x190 [ 528.153080] sysfs_create_group+0x20/0x30 [ 528.157252] lo_ioctl+0xf8f/0x20e0 [ 528.160811] ? lo_rw_aio+0x1470/0x1470 [ 528.164726] blkdev_ioctl+0xc38/0x1ab6 [ 528.168635] ? blkpg_ioctl+0xa90/0xa90 [ 528.172549] ? find_held_lock+0x35/0x130 15:44:43 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x240142) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) [ 528.176633] ? debug_check_no_obj_freed+0x200/0x464 [ 528.181666] ? __fget+0x340/0x540 [ 528.185156] block_ioctl+0xee/0x130 [ 528.188798] ? blkdev_fallocate+0x410/0x410 [ 528.193138] do_vfs_ioctl+0xd5f/0x1380 [ 528.197039] ? selinux_file_ioctl+0x46f/0x5e0 [ 528.201549] ? selinux_file_ioctl+0x125/0x5e0 [ 528.210320] ? ioctl_preallocate+0x210/0x210 [ 528.214747] ? selinux_file_mprotect+0x620/0x620 [ 528.219523] ? iterate_fd+0x360/0x360 [ 528.223351] ? do_sys_open+0x31d/0x550 [ 528.227352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.232907] ? security_file_ioctl+0x8d/0xc0 [ 528.237336] ksys_ioctl+0xab/0xd0 [ 528.240804] __x64_sys_ioctl+0x73/0xb0 [ 528.244708] do_syscall_64+0xfd/0x620 [ 528.248524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.253722] RIP: 0033:0x45adb7 [ 528.257009] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:44:43 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)) [ 528.275923] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 528.283639] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 528.290960] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 528.298214] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 528.305614] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 528.312884] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:43 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) 15:44:43 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 528.512984] FAULT_INJECTION: forcing a failure. [ 528.512984] name failslab, interval 1, probability 0, space 0, times 0 [ 528.529146] CPU: 0 PID: 14727 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 528.536951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.546306] Call Trace: [ 528.548911] dump_stack+0x197/0x210 [ 528.552565] should_fail.cold+0xa/0x1b [ 528.556493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 528.561625] ? lock_downgrade+0x880/0x880 [ 528.565805] __should_failslab+0x121/0x190 [ 528.570058] should_failslab+0x9/0x14 [ 528.573870] kmem_cache_alloc+0x2ae/0x700 [ 528.578031] ? lock_downgrade+0x880/0x880 [ 528.582216] __kernfs_new_node+0xef/0x6f0 [ 528.586384] ? kasan_check_write+0x14/0x20 [ 528.590634] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 528.595404] ? wait_for_completion+0x440/0x440 [ 528.600009] ? mutex_unlock+0xd/0x10 [ 528.603737] ? kernfs_activate+0x192/0x1f0 [ 528.607986] kernfs_new_node+0x99/0x130 [ 528.611978] __kernfs_create_file+0x51/0x33b [ 528.616406] sysfs_add_file_mode_ns+0x222/0x560 [ 528.621104] internal_create_group+0x383/0xc30 [ 528.625697] ? bd_set_size+0x89/0xb0 [ 528.629430] ? remove_files.isra.0+0x190/0x190 [ 528.634036] sysfs_create_group+0x20/0x30 [ 528.638200] lo_ioctl+0xf8f/0x20e0 [ 528.641761] ? lo_rw_aio+0x1470/0x1470 [ 528.645665] blkdev_ioctl+0xc38/0x1ab6 [ 528.649565] ? blkpg_ioctl+0xa90/0xa90 [ 528.653466] ? find_held_lock+0x35/0x130 [ 528.657562] ? debug_check_no_obj_freed+0x200/0x464 [ 528.662605] ? __fget+0x340/0x540 [ 528.666146] block_ioctl+0xee/0x130 [ 528.669788] ? blkdev_fallocate+0x410/0x410 [ 528.674128] do_vfs_ioctl+0xd5f/0x1380 [ 528.678030] ? selinux_file_ioctl+0x46f/0x5e0 [ 528.682552] ? selinux_file_ioctl+0x125/0x5e0 [ 528.687062] ? ioctl_preallocate+0x210/0x210 [ 528.691482] ? selinux_file_mprotect+0x620/0x620 [ 528.696255] ? iterate_fd+0x360/0x360 [ 528.700068] ? do_sys_open+0x31d/0x550 [ 528.703970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.709523] ? security_file_ioctl+0x8d/0xc0 [ 528.713949] ksys_ioctl+0xab/0xd0 [ 528.717425] __x64_sys_ioctl+0x73/0xb0 [ 528.721331] do_syscall_64+0xfd/0x620 [ 528.725148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.730342] RIP: 0033:0x45adb7 [ 528.733544] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.752457] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 528.760179] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 528.767456] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 528.774850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 528.782138] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 528.789418] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:52 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:44:52 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000040)={0xb, {0x1, 0x8bf4, 0x59b2, 0x3ff}, {0x0, 0x9, 0x4, 0x4}, {0x4, 0xdb97}}) dup2(r1, r0) 15:44:52 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:52 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) 15:44:52 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)) 15:44:52 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:44:52 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) [ 537.688642] FAULT_INJECTION: forcing a failure. [ 537.688642] name failslab, interval 1, probability 0, space 0, times 0 [ 537.706553] CPU: 0 PID: 14736 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 537.714387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.723768] Call Trace: [ 537.726381] dump_stack+0x197/0x210 [ 537.730041] should_fail.cold+0xa/0x1b [ 537.733962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.739086] ? lock_downgrade+0x880/0x880 [ 537.743263] __should_failslab+0x121/0x190 [ 537.747514] should_failslab+0x9/0x14 [ 537.751327] kmem_cache_alloc+0x2ae/0x700 [ 537.755496] ? lock_downgrade+0x880/0x880 [ 537.759667] __kernfs_new_node+0xef/0x6f0 [ 537.763837] ? kasan_check_write+0x14/0x20 [ 537.768088] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 537.772863] ? wait_for_completion+0x440/0x440 [ 537.777473] ? mutex_unlock+0xd/0x10 [ 537.781196] ? kernfs_activate+0x192/0x1f0 [ 537.785445] kernfs_new_node+0x99/0x130 [ 537.789445] __kernfs_create_file+0x51/0x33b [ 537.793875] sysfs_add_file_mode_ns+0x222/0x560 [ 537.798574] internal_create_group+0x383/0xc30 [ 537.803168] ? bd_set_size+0x89/0xb0 [ 537.806923] ? remove_files.isra.0+0x190/0x190 [ 537.811536] sysfs_create_group+0x20/0x30 [ 537.815697] lo_ioctl+0xf8f/0x20e0 [ 537.819260] ? lo_rw_aio+0x1470/0x1470 [ 537.823173] blkdev_ioctl+0xc38/0x1ab6 [ 537.827073] ? blkpg_ioctl+0xa90/0xa90 [ 537.830978] ? find_held_lock+0x35/0x130 [ 537.835140] ? debug_check_no_obj_freed+0x200/0x464 [ 537.840172] ? __fget+0x340/0x540 [ 537.843647] block_ioctl+0xee/0x130 [ 537.847294] ? blkdev_fallocate+0x410/0x410 [ 537.851629] do_vfs_ioctl+0xd5f/0x1380 [ 537.855527] ? selinux_file_ioctl+0x46f/0x5e0 [ 537.860031] ? selinux_file_ioctl+0x125/0x5e0 [ 537.864800] ? ioctl_preallocate+0x210/0x210 [ 537.869250] ? selinux_file_mprotect+0x620/0x620 [ 537.874052] ? iterate_fd+0x360/0x360 [ 537.877868] ? do_sys_open+0x31d/0x550 [ 537.881779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.887439] ? security_file_ioctl+0x8d/0xc0 [ 537.891867] ksys_ioctl+0xab/0xd0 [ 537.895337] __x64_sys_ioctl+0x73/0xb0 [ 537.899247] do_syscall_64+0xfd/0x620 [ 537.903065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.908269] RIP: 0033:0x45adb7 [ 537.911474] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.930405] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:44:52 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r3 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r3, 0x5, 0x3ff, 0x0, 0x0) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) dup2(r3, r4) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000040)={'bond_slave_1\x00', 0x6}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x1a, 0x1, 0x2}}, 0x14) [ 537.938128] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 537.945406] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 537.952685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 537.959969] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 537.967257] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:52 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 15:44:53 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:53 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x5, 0x7, 0x9, 0x8c, 0xffffffffffffffff, 0x0, [], r7, 0xffffffffffffffff, 0x3}, 0x3c) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r9 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, 0x0, 0xffffff5c) r10 = accept4$ax25(r9, &(0x7f0000000040)={{0x3, @null}, [@remote, @bcast, @bcast, @rose, @rose, @bcast, @bcast, @rose]}, &(0x7f00000000c0)=0x48, 0xc1000) r11 = dup2(r8, r10) ioctl$UI_SET_MSCBIT(r11, 0x40045568, 0x12) [ 538.152048] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 538.186404] IPv6: ADDRCONF(NETDEV_UP): veth115: link is not ready [ 538.205437] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 538.231635] FAULT_INJECTION: forcing a failure. [ 538.231635] name failslab, interval 1, probability 0, space 0, times 0 [ 538.243317] CPU: 1 PID: 14759 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 538.251131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.260518] Call Trace: [ 538.263135] dump_stack+0x197/0x210 [ 538.266795] should_fail.cold+0xa/0x1b [ 538.270712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.275850] ? lock_downgrade+0x880/0x880 [ 538.280036] __should_failslab+0x121/0x190 [ 538.284296] should_failslab+0x9/0x14 [ 538.288113] kmem_cache_alloc_trace+0x2cc/0x760 [ 538.292814] ? dev_uevent_filter+0xe0/0xe0 [ 538.297093] kobject_uevent_env+0x22c/0x1170 [ 538.301539] kobject_uevent+0x20/0x30 [ 538.305387] lo_ioctl+0x100b/0x20e0 [ 538.309038] ? lo_rw_aio+0x1470/0x1470 [ 538.312959] blkdev_ioctl+0xc38/0x1ab6 [ 538.316887] ? blkpg_ioctl+0xa90/0xa90 [ 538.320796] ? find_held_lock+0x35/0x130 [ 538.325015] ? debug_check_no_obj_freed+0x200/0x464 [ 538.330061] ? __fget+0x340/0x540 [ 538.333551] block_ioctl+0xee/0x130 [ 538.337198] ? blkdev_fallocate+0x410/0x410 [ 538.341537] do_vfs_ioctl+0xd5f/0x1380 [ 538.345529] ? selinux_file_ioctl+0x46f/0x5e0 [ 538.350069] ? selinux_file_ioctl+0x125/0x5e0 [ 538.354594] ? ioctl_preallocate+0x210/0x210 [ 538.359026] ? selinux_file_mprotect+0x620/0x620 [ 538.363809] ? iterate_fd+0x360/0x360 [ 538.367626] ? do_sys_open+0x31d/0x550 [ 538.371535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.377106] ? security_file_ioctl+0x8d/0xc0 [ 538.381548] ksys_ioctl+0xab/0xd0 [ 538.385029] __x64_sys_ioctl+0x73/0xb0 [ 538.388958] do_syscall_64+0xfd/0x620 [ 538.392790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.397995] RIP: 0033:0x45adb7 [ 538.401209] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.420131] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.427977] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 538.435268] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 538.442564] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 15:44:53 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 538.449848] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 538.457131] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:53 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:44:53 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x1000005, 0x7, 0x9, 0x204, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0xfffffffffffffcf9) dup2(r1, r0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) fsetxattr$security_evm(r2, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb9, 0x7) [ 538.646231] FAULT_INJECTION: forcing a failure. [ 538.646231] name failslab, interval 1, probability 0, space 0, times 0 [ 538.664361] CPU: 0 PID: 14771 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 538.672201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.681572] Call Trace: [ 538.684197] dump_stack+0x197/0x210 [ 538.687886] should_fail.cold+0xa/0x1b [ 538.691906] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.697032] ? lock_downgrade+0x880/0x880 [ 538.701238] __should_failslab+0x121/0x190 [ 538.705623] should_failslab+0x9/0x14 [ 538.709451] __kmalloc+0x2e2/0x750 [ 538.713017] ? rcu_read_lock_sched_held+0x110/0x130 [ 538.718135] ? kobject_get_path+0xc2/0x1a0 [ 538.722387] kobject_get_path+0xc2/0x1a0 [ 538.726471] kobject_uevent_env+0x251/0x1170 [ 538.730944] kobject_uevent+0x20/0x30 [ 538.734802] lo_ioctl+0x100b/0x20e0 [ 538.738455] ? lo_rw_aio+0x1470/0x1470 [ 538.742366] blkdev_ioctl+0xc38/0x1ab6 [ 538.746313] ? blkpg_ioctl+0xa90/0xa90 [ 538.750225] ? find_held_lock+0x35/0x130 [ 538.754377] ? debug_check_no_obj_freed+0x200/0x464 [ 538.759644] ? __fget+0x340/0x540 [ 538.759998] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 538.763126] block_ioctl+0xee/0x130 [ 538.763145] ? blkdev_fallocate+0x410/0x410 [ 538.763164] do_vfs_ioctl+0xd5f/0x1380 [ 538.763177] ? selinux_file_ioctl+0x46f/0x5e0 [ 538.763195] ? selinux_file_ioctl+0x125/0x5e0 [ 538.793769] ? ioctl_preallocate+0x210/0x210 [ 538.798206] ? selinux_file_mprotect+0x620/0x620 [ 538.803003] ? iterate_fd+0x360/0x360 [ 538.804203] IPv6: ADDRCONF(NETDEV_UP): veth117: link is not ready [ 538.806927] ? do_sys_open+0x31d/0x550 [ 538.806953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.806971] ? security_file_ioctl+0x8d/0xc0 [ 538.806990] ksys_ioctl+0xab/0xd0 [ 538.830594] __x64_sys_ioctl+0x73/0xb0 [ 538.834503] do_syscall_64+0xfd/0x620 [ 538.838328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.843530] RIP: 0033:0x45adb7 15:44:53 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x4000001, 0x4}, 0xffffffffffffffc7) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r8}]}, 0x4c}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r15, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r18, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r18}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r15}]}, 0x4c}}, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r22, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r25, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r19, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r25}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r22}]}, 0x4c}}, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r29, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r31, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r31, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r30, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r32, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r26, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r32}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r29}]}, 0x4c}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r34 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r34, 0x0, 0x200) getsockopt$inet_pktinfo(r34, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @remote}, &(0x7f00000003c0)=0xc) r36 = socket$nl_route(0x10, 0x3, 0x0) r37 = socket$netlink(0x10, 0x3, 0x0) r38 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r38, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r38, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r37, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r39, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r40 = socket$netlink(0x10, 0x3, 0x0) r41 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r41, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r41, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r40, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r42, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r36, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r42}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r39}]}, 0x4c}}, 0x0) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x181642}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x3b8, r4, 0x11, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x1e4, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r32}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xa3b}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8, 0x1, r33}, {0xb4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r35}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x64c}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r39}}}]}}]}, 0x3b8}, 0x1, 0x0, 0x0, 0x100800b2}, 0x0) [ 538.846830] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.865865] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.873704] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 538.881428] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 538.883505] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:44:53 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) [ 538.888712] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 538.888721] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 538.888730] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:44:53 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 538.987452] IPv6: ADDRCONF(NETDEV_UP): veth119: link is not ready [ 539.008378] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 539.035528] IPv6: ADDRCONF(NETDEV_UP): veth121: link is not ready [ 539.064291] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 539.111599] IPv6: ADDRCONF(NETDEV_UP): veth123: link is not ready [ 539.127066] FAULT_INJECTION: forcing a failure. [ 539.127066] name failslab, interval 1, probability 0, space 0, times 0 [ 539.145166] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 539.158707] CPU: 0 PID: 14781 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 539.166537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.175990] Call Trace: [ 539.178598] dump_stack+0x197/0x210 [ 539.182246] should_fail.cold+0xa/0x1b [ 539.186154] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.191326] ? lock_downgrade+0x880/0x880 [ 539.195511] __should_failslab+0x121/0x190 [ 539.199764] should_failslab+0x9/0x14 [ 539.203766] kmem_cache_alloc_node+0x26c/0x710 [ 539.208385] ? find_held_lock+0x35/0x130 [ 539.212471] __alloc_skb+0xd5/0x5f0 [ 539.216115] ? skb_trim+0x190/0x190 [ 539.219771] ? kasan_check_read+0x11/0x20 [ 539.223945] alloc_uevent_skb+0x86/0x220 [ 539.228200] kobject_uevent_env+0x8fb/0x1170 [ 539.232631] kobject_uevent+0x20/0x30 [ 539.236462] lo_ioctl+0x100b/0x20e0 [ 539.240112] ? lo_rw_aio+0x1470/0x1470 [ 539.244025] blkdev_ioctl+0xc38/0x1ab6 [ 539.247928] ? blkpg_ioctl+0xa90/0xa90 [ 539.251838] ? find_held_lock+0x35/0x130 [ 539.255931] ? debug_check_no_obj_freed+0x200/0x464 [ 539.261053] ? __fget+0x340/0x540 [ 539.264528] block_ioctl+0xee/0x130 [ 539.268164] ? blkdev_fallocate+0x410/0x410 [ 539.272514] do_vfs_ioctl+0xd5f/0x1380 [ 539.276432] ? selinux_file_ioctl+0x46f/0x5e0 [ 539.280944] ? selinux_file_ioctl+0x125/0x5e0 [ 539.285460] ? ioctl_preallocate+0x210/0x210 [ 539.289884] ? selinux_file_mprotect+0x620/0x620 [ 539.294686] ? iterate_fd+0x360/0x360 [ 539.298502] ? do_sys_open+0x31d/0x550 [ 539.302408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.307963] ? security_file_ioctl+0x8d/0xc0 [ 539.312385] ksys_ioctl+0xab/0xd0 [ 539.315880] __x64_sys_ioctl+0x73/0xb0 [ 539.319784] do_syscall_64+0xfd/0x620 [ 539.323619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.328817] RIP: 0033:0x45adb7 [ 539.332044] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.350964] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.358693] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 539.365982] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 539.373272] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 539.380676] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 539.387957] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 539.434469] IPv6: ADDRCONF(NETDEV_UP): veth125: link is not ready [ 539.477513] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 539.511724] IPv6: ADDRCONF(NETDEV_UP): veth127: link is not ready [ 539.522064] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 539.539432] IPv6: ADDRCONF(NETDEV_UP): veth129: link is not ready [ 539.553991] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 539.571230] IPv6: ADDRCONF(NETDEV_UP): veth131: link is not ready [ 539.590158] IPv6: ADDRCONF(NETDEV_UP): veth133: link is not ready [ 539.635276] IPv6: ADDRCONF(NETDEV_UP): veth135: link is not ready [ 539.695034] IPv6: ADDRCONF(NETDEV_UP): veth137: link is not ready [ 539.746454] IPv6: ADDRCONF(NETDEV_UP): veth139: link is not ready [ 539.846491] IPv6: ADDRCONF(NETDEV_UP): veth141: link is not ready [ 539.884663] IPv6: ADDRCONF(NETDEV_UP): veth143: link is not ready 15:45:03 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:03 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:03 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:03 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) 15:45:03 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r1, r0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x10200, 0x0, &(0x7f0000ffc000/0x1000)=nil}) 15:45:03 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e3599"}, 0xd) [ 548.559209] FAULT_INJECTION: forcing a failure. [ 548.559209] name failslab, interval 1, probability 0, space 0, times 0 [ 548.571784] CPU: 0 PID: 14789 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 548.579631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.588999] Call Trace: [ 548.591605] dump_stack+0x197/0x210 [ 548.595258] should_fail.cold+0xa/0x1b [ 548.599169] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.604334] ? lock_downgrade+0x880/0x880 [ 548.608611] __should_failslab+0x121/0x190 [ 548.612866] should_failslab+0x9/0x14 [ 548.616695] kmem_cache_alloc+0x2ae/0x700 [ 548.620863] ? lock_downgrade+0x880/0x880 [ 548.625051] skb_clone+0x156/0x3e0 [ 548.628617] netlink_broadcast_filtered+0x875/0xb30 [ 548.633661] netlink_broadcast+0x3a/0x50 [ 548.637751] kobject_uevent_env+0x8c4/0x1170 [ 548.642394] kobject_uevent+0x20/0x30 [ 548.646368] lo_ioctl+0x100b/0x20e0 [ 548.650063] ? lo_rw_aio+0x1470/0x1470 [ 548.654069] blkdev_ioctl+0xc38/0x1ab6 [ 548.658944] ? blkpg_ioctl+0xa90/0xa90 [ 548.662941] ? find_held_lock+0x35/0x130 [ 548.667029] ? debug_check_no_obj_freed+0x200/0x464 [ 548.672088] ? __fget+0x340/0x540 [ 548.675572] block_ioctl+0xee/0x130 [ 548.679216] ? blkdev_fallocate+0x410/0x410 [ 548.683560] do_vfs_ioctl+0xd5f/0x1380 [ 548.687472] ? selinux_file_ioctl+0x46f/0x5e0 [ 548.692161] ? selinux_file_ioctl+0x125/0x5e0 [ 548.696689] ? ioctl_preallocate+0x210/0x210 [ 548.701107] ? selinux_file_mprotect+0x620/0x620 [ 548.705970] ? iterate_fd+0x360/0x360 [ 548.709808] ? do_sys_open+0x31d/0x550 [ 548.713716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.720225] ? security_file_ioctl+0x8d/0xc0 [ 548.724660] ksys_ioctl+0xab/0xd0 [ 548.728130] __x64_sys_ioctl+0x73/0xb0 [ 548.732039] do_syscall_64+0xfd/0x620 [ 548.736031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.742463] RIP: 0033:0x45adb7 [ 548.745765] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.765376] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 548.773893] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 548.781433] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 548.789251] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 548.797362] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 15:45:03 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 548.805382] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:03 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:03 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:03 executing program 0: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:04 executing program 0: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 549.071577] FAULT_INJECTION: forcing a failure. [ 549.071577] name failslab, interval 1, probability 0, space 0, times 0 [ 549.105529] CPU: 1 PID: 14813 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 549.113375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.122743] Call Trace: [ 549.125361] dump_stack+0x197/0x210 [ 549.129017] should_fail.cold+0xa/0x1b [ 549.132934] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 549.138064] ? lock_downgrade+0x880/0x880 [ 549.142267] __should_failslab+0x121/0x190 [ 549.146525] should_failslab+0x9/0x14 [ 549.150592] kmem_cache_alloc+0x2ae/0x700 [ 549.154778] ? lock_downgrade+0x880/0x880 [ 549.158952] skb_clone+0x156/0x3e0 [ 549.162513] netlink_broadcast_filtered+0x875/0xb30 [ 549.167684] netlink_broadcast+0x3a/0x50 [ 549.171778] kobject_uevent_env+0x8c4/0x1170 [ 549.176211] kobject_uevent+0x20/0x30 [ 549.180036] lo_ioctl+0x100b/0x20e0 [ 549.183683] ? lo_rw_aio+0x1470/0x1470 [ 549.187591] blkdev_ioctl+0xc38/0x1ab6 [ 549.191495] ? blkpg_ioctl+0xa90/0xa90 [ 549.195399] ? find_held_lock+0x35/0x130 [ 549.199479] ? debug_check_no_obj_freed+0x200/0x464 [ 549.204516] ? __fget+0x340/0x540 [ 549.207995] block_ioctl+0xee/0x130 [ 549.211639] ? blkdev_fallocate+0x410/0x410 [ 549.215984] do_vfs_ioctl+0xd5f/0x1380 [ 549.219898] ? selinux_file_ioctl+0x46f/0x5e0 [ 549.224405] ? selinux_file_ioctl+0x125/0x5e0 [ 549.229009] ? ioctl_preallocate+0x210/0x210 [ 549.233433] ? selinux_file_mprotect+0x620/0x620 [ 549.238215] ? iterate_fd+0x360/0x360 [ 549.242031] ? do_sys_open+0x31d/0x550 [ 549.245942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.251496] ? security_file_ioctl+0x8d/0xc0 [ 549.255921] ksys_ioctl+0xab/0xd0 [ 549.259391] __x64_sys_ioctl+0x73/0xb0 [ 549.263295] do_syscall_64+0xfd/0x620 [ 549.267119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.272318] RIP: 0033:0x45adb7 [ 549.275520] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.294433] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.302153] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045adb7 [ 549.309433] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 549.316720] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 549.324012] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 549.331298] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:04 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:04 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r2}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) 15:45:04 executing program 0: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:04 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:04 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:04 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 549.565078] FAULT_INJECTION: forcing a failure. [ 549.565078] name failslab, interval 1, probability 0, space 0, times 0 [ 549.597061] CPU: 0 PID: 14828 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 549.604902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.614272] Call Trace: [ 549.616884] dump_stack+0x197/0x210 [ 549.620540] should_fail.cold+0xa/0x1b [ 549.624447] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 549.629576] __should_failslab+0x121/0x190 [ 549.633829] should_failslab+0x9/0x14 [ 549.637643] kmem_cache_alloc+0x2ae/0x700 [ 549.641870] ? security_compute_sid.part.0+0xbb0/0x15c0 [ 549.647248] ? rcu_read_lock_sched_held+0x110/0x130 [ 549.652281] ? ratelimit_state_init+0xb0/0xb0 [ 549.656912] ext4_alloc_inode+0x1f/0x630 [ 549.661009] ? ratelimit_state_init+0xb0/0xb0 [ 549.665535] alloc_inode+0x64/0x190 [ 549.669190] new_inode_pseudo+0x19/0xf0 [ 549.673184] new_inode+0x1f/0x40 [ 549.676566] __ext4_new_inode+0x3cb/0x52d0 [ 549.680821] ? kasan_check_read+0x11/0x20 [ 549.684992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.690549] ? ext4_free_inode+0x1470/0x1470 [ 549.694978] ? dquot_get_next_dqblk+0x180/0x180 [ 549.699672] ? selinux_determine_inode_label+0x1b1/0x360 [ 549.705145] ext4_mkdir+0x3d5/0xdf0 [ 549.708795] ? ext4_init_dot_dotdot+0x520/0x520 [ 549.714184] ? selinux_inode_mkdir+0x23/0x30 [ 549.718605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.724166] ? security_inode_mkdir+0xe4/0x120 [ 549.728785] vfs_mkdir+0x42e/0x690 [ 549.732353] do_mkdirat+0x234/0x2a0 [ 549.735999] ? __ia32_sys_mknod+0xb0/0xb0 [ 549.740163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 549.744937] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.750400] ? do_syscall_64+0x26/0x620 [ 549.754393] ? lockdep_hardirqs_on+0x415/0x5d0 [ 549.758987] __x64_sys_mkdir+0x5c/0x80 [ 549.762892] do_syscall_64+0xfd/0x620 [ 549.766710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.771906] RIP: 0033:0x45a367 [ 549.775109] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.794018] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 549.801750] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 549.809027] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 549.816306] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 549.823579] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 549.830853] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:14 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e3599"}, 0xd) 15:45:14 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:14 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:14 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r2}, 0xc) 15:45:14 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:14 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000040)=""/56) ioctl$sock_ifreq(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'veth1_to_team\x00', @ifru_flags=0x100}) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-', 0x3}, 0x16, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4003000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x6, 0x6, 0x400, 0x70bd2a, 0x25dfdbfc, {0xc, 0x0, 0x3}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) accept4$ax25(r3, &(0x7f0000000380)={{0x3, @bcast}, [@default, @null, @null, @bcast, @remote, @rose, @null, @netrom]}, &(0x7f0000000400)=0x48, 0x80000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000240)={r5, 0x0, 0xfffffffffffffe01}) dup2(r2, r0) [ 559.448197] FAULT_INJECTION: forcing a failure. [ 559.448197] name failslab, interval 1, probability 0, space 0, times 0 [ 559.486086] CPU: 1 PID: 14839 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 559.493928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.503308] Call Trace: [ 559.505922] dump_stack+0x197/0x210 [ 559.509581] should_fail.cold+0xa/0x1b [ 559.513488] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.518612] ? lock_downgrade+0x880/0x880 [ 559.523316] __should_failslab+0x121/0x190 [ 559.527833] should_failslab+0x9/0x14 [ 559.531657] kmem_cache_alloc+0x2ae/0x700 [ 559.535827] ? __d_lookup+0x433/0x760 [ 559.539641] ? lookup_dcache+0x23/0x140 [ 559.543665] ? d_lookup+0xf9/0x260 15:45:14 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = dup2(r1, r0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r4, 0x0, 0x200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000180)={r6, @in6={{0xa, 0xb9, 0x1, @loopback, 0x9}}}, 0x84) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x3, 0x100, 0x787, 0x20, r3, 0xfffffffd, [], 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x3c) [ 559.547234] ? lockdep_hardirqs_on+0x415/0x5d0 [ 559.551842] __d_alloc+0x2e/0x9c0 [ 559.555318] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 559.560361] d_alloc+0x4d/0x280 [ 559.563666] __lookup_hash+0xcd/0x190 [ 559.567484] filename_create+0x1a7/0x4f0 [ 559.571559] ? kern_path_mountpoint+0x40/0x40 [ 559.576063] ? strncpy_from_user+0x21b/0x2d0 [ 559.580493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.586042] ? getname_flags+0x277/0x5b0 [ 559.590124] do_mkdirat+0xb5/0x2a0 [ 559.593762] ? __ia32_sys_mknod+0xb0/0xb0 [ 559.597929] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 559.602710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.608093] ? do_syscall_64+0x26/0x620 [ 559.612085] ? lockdep_hardirqs_on+0x415/0x5d0 [ 559.616687] __x64_sys_mkdir+0x5c/0x80 [ 559.620596] do_syscall_64+0xfd/0x620 [ 559.624420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.629633] RIP: 0033:0x45a367 15:45:14 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) ppoll(&(0x7f0000000000)=[{r0, 0xd420}], 0x1, &(0x7f0000000040), &(0x7f0000000080)={0x8}, 0x8) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) dup2(r2, r1) [ 559.632833] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.651744] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 559.659469] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 559.666747] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 559.674028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 559.681328] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 559.688620] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:14 executing program 3 (fault-call:2 fault-nth:0): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:14 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:14 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 559.822323] FAULT_INJECTION: forcing a failure. [ 559.822323] name failslab, interval 1, probability 0, space 0, times 0 [ 559.843244] CPU: 0 PID: 14860 Comm: syz-executor.3 Not tainted 4.19.95-syzkaller #0 [ 559.843629] FAULT_INJECTION: forcing a failure. [ 559.843629] name failslab, interval 1, probability 0, space 0, times 0 [ 559.851109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.851183] Call Trace: [ 559.874362] dump_stack+0x197/0x210 [ 559.878009] should_fail.cold+0xa/0x1b [ 559.881917] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.887025] ? lock_downgrade+0x880/0x880 [ 559.891193] __should_failslab+0x121/0x190 [ 559.895438] should_failslab+0x9/0x14 [ 559.899239] kmem_cache_alloc+0x47/0x700 [ 559.903312] dst_alloc+0x10e/0x1d0 [ 559.906909] ip6_dst_alloc+0x34/0xa0 [ 559.910642] ip6_create_rt_rcu+0x275/0x5c0 [ 559.915016] ? ip6_dst_ifdown+0x3c0/0x3c0 [ 559.919190] ? rcu_read_lock_sched_held+0x110/0x130 [ 559.924232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 559.930666] ? trace_fib6_table_lookup+0x77/0x290 [ 559.935535] ip6_pol_route_lookup+0x88d/0xb90 [ 559.940057] ? fib6_multipath_select+0x2d0/0x2d0 [ 559.944820] ? mark_held_locks+0x100/0x100 [ 559.949145] fib6_rule_lookup+0x125/0x550 [ 559.953316] ? __lock_acquire+0x6ee/0x49c0 [ 559.957573] ? fib6_multipath_select+0x2d0/0x2d0 [ 559.962337] ? fib6_lookup+0x360/0x360 [ 559.966245] ? mark_held_locks+0x100/0x100 [ 559.970499] rt6_lookup+0x1b4/0x280 [ 559.974139] ? ip6_route_input_lookup+0xd0/0xd0 [ 559.978828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.984378] ? check_preemption_disabled+0x48/0x290 [ 559.989410] ? lock_acquire+0x16f/0x3f0 [ 559.993444] ip6_mc_find_dev_rcu+0x45/0x230 [ 559.997771] ip6_mc_source+0x1ce/0x15b0 [ 560.001757] ? _copy_from_user+0xdd/0x150 [ 560.005910] do_ipv6_setsockopt.isra.0+0x3571/0x3ec0 [ 560.011038] ? ipv6_update_options+0x3b0/0x3b0 [ 560.015629] ? mark_held_locks+0x100/0x100 [ 560.019863] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.025402] ? _kstrtoull+0x14c/0x200 [ 560.029218] ? avc_has_perm+0x379/0x610 [ 560.033198] ? find_held_lock+0x35/0x130 [ 560.037259] ? avc_has_perm+0x379/0x610 [ 560.041247] ? lock_downgrade+0x880/0x880 [ 560.045399] ? kasan_check_read+0x11/0x20 [ 560.049554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.055103] ? avc_has_perm+0x404/0x610 [ 560.059081] ? avc_has_perm_noaudit+0x570/0x570 [ 560.063753] ? kasan_check_read+0x11/0x20 [ 560.067943] ? selinux_netlbl_socket_setsockopt+0xb5/0x3f0 [ 560.073581] ? selinux_netlbl_sock_rcv_skb+0x480/0x480 [ 560.078873] ipv6_setsockopt+0xf6/0x170 [ 560.082858] ? ipv6_setsockopt+0xf6/0x170 [ 560.087020] udpv6_setsockopt+0x68/0xb0 [ 560.090996] sock_common_setsockopt+0x94/0xd0 [ 560.095503] __sys_setsockopt+0x17a/0x280 [ 560.099666] ? kernel_accept+0x310/0x310 [ 560.103742] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.108499] ? do_syscall_64+0x26/0x620 [ 560.112477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.117851] ? do_syscall_64+0x26/0x620 [ 560.121831] __x64_sys_setsockopt+0xbe/0x150 [ 560.126252] do_syscall_64+0xfd/0x620 [ 560.130066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.135254] RIP: 0033:0x45af49 [ 560.138445] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.157962] RSP: 002b:00007f8e2c77dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 560.165677] RAX: ffffffffffffffda RBX: 00007f8e2c77dc90 RCX: 000000000045af49 [ 560.172950] RDX: 000000000000002f RSI: 0000000000000029 RDI: 0000000000000003 [ 560.180223] RBP: 000000000075bf20 R08: 0000000000000108 R09: 0000000000000000 [ 560.187492] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f8e2c77e6d4 [ 560.194757] R13: 00000000004d3c00 R14: 00000000004e4ec0 R15: 0000000000000004 [ 560.202090] CPU: 1 PID: 14863 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 560.209906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.219270] Call Trace: [ 560.221874] dump_stack+0x197/0x210 [ 560.225528] should_fail.cold+0xa/0x1b [ 560.229433] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.234570] __should_failslab+0x121/0x190 [ 560.238822] should_failslab+0x9/0x14 [ 560.242636] kmem_cache_alloc+0x2ae/0x700 [ 560.246803] ? security_compute_sid.part.0+0xbb0/0x15c0 [ 560.252188] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.257235] ? ratelimit_state_init+0xb0/0xb0 [ 560.261751] ext4_alloc_inode+0x1f/0x630 [ 560.265832] ? ratelimit_state_init+0xb0/0xb0 [ 560.270347] alloc_inode+0x64/0x190 [ 560.273995] new_inode_pseudo+0x19/0xf0 [ 560.278426] new_inode+0x1f/0x40 [ 560.281807] __ext4_new_inode+0x3cb/0x52d0 [ 560.286054] ? kasan_check_read+0x11/0x20 [ 560.290214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.295773] ? ext4_free_inode+0x1470/0x1470 [ 560.300217] ? dquot_get_next_dqblk+0x180/0x180 [ 560.304912] ? selinux_determine_inode_label+0x1b1/0x360 [ 560.310383] ext4_mkdir+0x3d5/0xdf0 [ 560.314035] ? ext4_init_dot_dotdot+0x520/0x520 [ 560.318724] ? selinux_inode_mkdir+0x23/0x30 [ 560.323270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.328823] ? security_inode_mkdir+0xe4/0x120 [ 560.333423] vfs_mkdir+0x42e/0x690 [ 560.336983] do_mkdirat+0x234/0x2a0 [ 560.340623] ? __ia32_sys_mknod+0xb0/0xb0 [ 560.344779] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.349550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.354928] ? do_syscall_64+0x26/0x620 [ 560.358919] ? lockdep_hardirqs_on+0x415/0x5d0 [ 560.363524] __x64_sys_mkdir+0x5c/0x80 [ 560.367428] do_syscall_64+0xfd/0x620 [ 560.371247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.376445] RIP: 0033:0x45a367 [ 560.379646] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.398562] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 560.406286] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 560.413564] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 560.420849] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 560.428125] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 560.435400] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:24 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e3599"}, 0xd) 15:45:24 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:24 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) 15:45:24 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) r7 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r7, 0x5, 0x3ff, 0x0, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:24 executing program 3 (fault-call:2 fault-nth:1): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:24 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 569.699968] FAULT_INJECTION: forcing a failure. [ 569.699968] name failslab, interval 1, probability 0, space 0, times 0 [ 569.728961] CPU: 1 PID: 14872 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 569.736802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.746172] Call Trace: 15:45:24 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:24 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 569.748787] dump_stack+0x197/0x210 [ 569.752630] should_fail.cold+0xa/0x1b [ 569.756581] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 569.761729] __should_failslab+0x121/0x190 [ 569.765989] should_failslab+0x9/0x14 [ 569.769808] kmem_cache_alloc+0x2ae/0x700 [ 569.773977] ? security_compute_sid.part.0+0xbb0/0x15c0 [ 569.779362] ? rcu_read_lock_sched_held+0x110/0x130 [ 569.784489] ? ratelimit_state_init+0xb0/0xb0 [ 569.789000] ext4_alloc_inode+0x1f/0x630 [ 569.793076] ? ratelimit_state_init+0xb0/0xb0 15:45:24 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x11, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 569.797583] alloc_inode+0x64/0x190 [ 569.801222] new_inode_pseudo+0x19/0xf0 [ 569.805208] new_inode+0x1f/0x40 [ 569.808845] __ext4_new_inode+0x3cb/0x52d0 [ 569.813099] ? kasan_check_read+0x11/0x20 [ 569.817264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.822821] ? ext4_free_inode+0x1470/0x1470 [ 569.827250] ? dquot_get_next_dqblk+0x180/0x180 [ 569.831948] ? selinux_determine_inode_label+0x1b1/0x360 [ 569.837425] ext4_mkdir+0x3d5/0xdf0 [ 569.841083] ? ext4_init_dot_dotdot+0x520/0x520 [ 569.845778] ? selinux_inode_mkdir+0x23/0x30 15:45:24 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 569.850209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.855850] ? security_inode_mkdir+0xe4/0x120 [ 569.860452] vfs_mkdir+0x42e/0x690 [ 569.864016] do_mkdirat+0x234/0x2a0 [ 569.867663] ? __ia32_sys_mknod+0xb0/0xb0 [ 569.871833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 569.876616] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.882001] ? do_syscall_64+0x26/0x620 [ 569.886169] ? lockdep_hardirqs_on+0x415/0x5d0 [ 569.890772] __x64_sys_mkdir+0x5c/0x80 [ 569.894695] do_syscall_64+0xfd/0x620 15:45:24 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x88, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 569.898613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.903831] RIP: 0033:0x45a367 [ 569.907037] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.926053] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 569.933806] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 569.941117] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 15:45:24 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 569.948404] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 569.955696] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 569.963071] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:34 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0"}, 0x13) 15:45:34 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:34 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:34 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:34 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) 15:45:34 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) socket$pppoe(0x18, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 579.908218] FAULT_INJECTION: forcing a failure. [ 579.908218] name failslab, interval 1, probability 0, space 0, times 0 [ 579.940490] CPU: 1 PID: 14895 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 579.948332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:45:34 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:34 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 579.957701] Call Trace: [ 579.960325] dump_stack+0x197/0x210 [ 579.963982] should_fail.cold+0xa/0x1b [ 579.967896] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 579.973037] __should_failslab+0x121/0x190 [ 579.977296] should_failslab+0x9/0x14 [ 579.981118] kmem_cache_alloc+0x2ae/0x700 [ 579.985301] ? security_compute_sid.part.0+0xbb0/0x15c0 [ 579.990704] ? rcu_read_lock_sched_held+0x110/0x130 [ 579.995738] ? ratelimit_state_init+0xb0/0xb0 [ 580.000249] ext4_alloc_inode+0x1f/0x630 [ 580.004328] ? ratelimit_state_init+0xb0/0xb0 [ 580.008854] alloc_inode+0x64/0x190 [ 580.012501] new_inode_pseudo+0x19/0xf0 [ 580.016581] new_inode+0x1f/0x40 [ 580.019964] __ext4_new_inode+0x3cb/0x52d0 [ 580.024218] ? kasan_check_read+0x11/0x20 [ 580.028380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.033950] ? ext4_free_inode+0x1470/0x1470 [ 580.038413] ? dquot_get_next_dqblk+0x180/0x180 [ 580.043123] ? selinux_determine_inode_label+0x1b1/0x360 [ 580.048603] ext4_mkdir+0x3d5/0xdf0 [ 580.052359] ? ext4_init_dot_dotdot+0x520/0x520 [ 580.057051] ? selinux_inode_mkdir+0x23/0x30 [ 580.061478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.067037] ? security_inode_mkdir+0xe4/0x120 [ 580.071640] vfs_mkdir+0x42e/0x690 [ 580.075198] do_mkdirat+0x234/0x2a0 [ 580.078836] ? __ia32_sys_mknod+0xb0/0xb0 [ 580.082992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 580.087767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.093146] ? do_syscall_64+0x26/0x620 [ 580.097132] ? lockdep_hardirqs_on+0x415/0x5d0 [ 580.101730] __x64_sys_mkdir+0x5c/0x80 [ 580.105630] do_syscall_64+0xfd/0x620 [ 580.109445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.114642] RIP: 0033:0x45a367 [ 580.117877] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.136816] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 580.144559] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 580.151844] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 580.159124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 580.166403] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 580.173684] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:35 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:35 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:35 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:35 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) [ 580.365420] FAULT_INJECTION: forcing a failure. [ 580.365420] name failslab, interval 1, probability 0, space 0, times 0 [ 580.387466] CPU: 0 PID: 14919 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 580.395298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.404665] Call Trace: [ 580.407272] dump_stack+0x197/0x210 [ 580.410924] should_fail.cold+0xa/0x1b [ 580.414843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 580.419972] ? lockdep_hardirqs_on+0x415/0x5d0 [ 580.424584] __should_failslab+0x121/0x190 [ 580.428836] should_failslab+0x9/0x14 [ 580.432644] kmem_cache_alloc+0x2ae/0x700 [ 580.437755] ? map_id_range_down+0x1ee/0x370 [ 580.442181] ? __put_user_ns+0x70/0x70 [ 580.446179] selinux_inode_alloc_security+0xb6/0x2a0 [ 580.451300] security_inode_alloc+0x8a/0xd0 [ 580.455648] inode_init_always+0x56e/0xb40 [ 580.459898] alloc_inode+0x81/0x190 [ 580.463537] new_inode_pseudo+0x19/0xf0 [ 580.467540] new_inode+0x1f/0x40 [ 580.470919] __ext4_new_inode+0x3cb/0x52d0 [ 580.475171] ? kasan_check_read+0x11/0x20 [ 580.479336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.484892] ? ext4_free_inode+0x1470/0x1470 [ 580.489342] ? dquot_get_next_dqblk+0x180/0x180 [ 580.494070] ? selinux_determine_inode_label+0x1b1/0x360 [ 580.499564] ext4_mkdir+0x3d5/0xdf0 [ 580.503216] ? ext4_init_dot_dotdot+0x520/0x520 [ 580.507909] ? selinux_inode_mkdir+0x23/0x30 [ 580.512338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.517894] ? security_inode_mkdir+0xe4/0x120 [ 580.522517] vfs_mkdir+0x42e/0x690 [ 580.526085] do_mkdirat+0x234/0x2a0 [ 580.529731] ? __ia32_sys_mknod+0xb0/0xb0 [ 580.534068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 580.538843] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.544216] ? do_syscall_64+0x26/0x620 [ 580.549163] ? lockdep_hardirqs_on+0x415/0x5d0 [ 580.554024] __x64_sys_mkdir+0x5c/0x80 [ 580.557938] do_syscall_64+0xfd/0x620 [ 580.561762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.566958] RIP: 0033:0x45a367 [ 580.570167] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.589087] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 580.596821] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 580.604112] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 580.611402] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 580.618690] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 580.625994] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:45 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0"}, 0x13) 15:45:45 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:45 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:45 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:45 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)) 15:45:45 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) socket$pppoe(0x18, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 590.191807] FAULT_INJECTION: forcing a failure. [ 590.191807] name failslab, interval 1, probability 0, space 0, times 0 [ 590.204002] CPU: 1 PID: 14934 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 590.212224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.222209] Call Trace: [ 590.224834] dump_stack+0x197/0x210 [ 590.228505] should_fail.cold+0xa/0x1b [ 590.232523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 590.238028] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 590.243956] __should_failslab+0x121/0x190 [ 590.248670] should_failslab+0x9/0x14 [ 590.252487] __kmalloc+0x2e2/0x750 [ 590.256585] ? ext4_find_extent+0x76e/0x9d0 [ 590.261035] ext4_find_extent+0x76e/0x9d0 [ 590.265227] ext4_ext_map_blocks+0x1c3/0x55c0 [ 590.270591] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 590.275637] ? __lock_is_held+0xb6/0x140 [ 590.279757] ? lock_acquire+0x16f/0x3f0 [ 590.283847] ? ext4_map_blocks+0x928/0x1b20 [ 590.288905] ext4_map_blocks+0x990/0x1b20 [ 590.293081] ? ext4_issue_zeroout+0x170/0x170 [ 590.297639] ? kasan_check_write+0x14/0x20 [ 590.301920] ? __brelse+0x95/0xb0 [ 590.305514] ext4_getblk+0xc4/0x510 [ 590.309166] ? ext4_iomap_begin+0xf70/0xf70 [ 590.313531] ? ext4_free_inode+0x1470/0x1470 [ 590.318051] ext4_bread+0x8f/0x230 [ 590.321611] ? ext4_getblk+0x510/0x510 [ 590.325531] ext4_append+0x155/0x370 [ 590.329272] ext4_mkdir+0x61b/0xdf0 [ 590.332923] ? ext4_init_dot_dotdot+0x520/0x520 [ 590.337707] ? selinux_inode_mkdir+0x23/0x30 [ 590.342223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 590.348077] ? security_inode_mkdir+0xe4/0x120 [ 590.352928] vfs_mkdir+0x42e/0x690 [ 590.357136] do_mkdirat+0x234/0x2a0 [ 590.360806] ? __ia32_sys_mknod+0xb0/0xb0 [ 590.365096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 590.370045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.375531] ? do_syscall_64+0x26/0x620 [ 590.379548] ? lockdep_hardirqs_on+0x415/0x5d0 [ 590.385021] __x64_sys_mkdir+0x5c/0x80 [ 590.389193] do_syscall_64+0xfd/0x620 [ 590.393450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.399384] RIP: 0033:0x45a367 [ 590.402592] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 590.422326] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 590.430462] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 15:45:45 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x5, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:45 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) 15:45:45 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) mq_open(&(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x4d, &(0x7f0000000440)={0x6, 0xc, 0x5, 0x7f32e0d2}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:45 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:45 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) 15:45:45 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x8, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 590.438215] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 590.445500] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 590.455391] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 590.462697] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:55 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0"}, 0x13) 15:45:55 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) r6 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r6, 0x5, 0x3ff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:55 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:45:55 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0xb, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:55 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017671121e9"}, 0x18) 15:45:55 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) [ 600.409824] FAULT_INJECTION: forcing a failure. [ 600.409824] name failslab, interval 1, probability 0, space 0, times 0 [ 600.421485] CPU: 1 PID: 14963 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 600.430099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.439596] Call Trace: [ 600.442213] dump_stack+0x197/0x210 [ 600.446153] should_fail.cold+0xa/0x1b [ 600.450073] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 600.455296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 600.460862] __should_failslab+0x121/0x190 [ 600.465129] should_failslab+0x9/0x14 [ 600.469309] __kmalloc+0x71/0x750 [ 600.473225] ? context_struct_to_string+0x428/0x880 [ 600.478632] context_struct_to_string+0x428/0x880 [ 600.484143] ? security_load_policycaps+0x540/0x540 [ 600.490065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 600.495625] ? sidtab_search_core+0x1d0/0x320 [ 600.500158] security_sid_to_context_core.isra.0+0x226/0x2f0 [ 600.505985] security_sid_to_context_force+0x38/0x50 [ 600.511118] selinux_inode_init_security+0x3b6/0x7a0 [ 600.516256] ? selinux_inode_create+0x30/0x30 [ 600.520764] ? ext4_get_acl+0x107/0x5a0 [ 600.524757] ? rcu_read_lock_sched_held+0x110/0x130 [ 600.529823] security_inode_init_security+0x1ad/0x3b0 [ 600.535036] ? ext4_init_acl+0x240/0x240 [ 600.539118] ? security_kernel_load_data+0xb0/0xb0 [ 600.544092] ? posix_acl_create+0x11a/0x450 [ 600.548435] ? lock_downgrade+0x880/0x880 [ 600.552692] ? ext4_set_acl+0x490/0x490 [ 600.556692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 600.562253] ? check_preemption_disabled+0x48/0x290 [ 600.567309] ext4_init_security+0x34/0x40 [ 600.571474] __ext4_new_inode+0x3b2f/0x52d0 [ 600.575828] ? ext4_free_inode+0x1470/0x1470 [ 600.580253] ? dquot_get_next_dqblk+0x180/0x180 [ 600.584943] ? selinux_determine_inode_label+0x1b1/0x360 [ 600.590421] ext4_mkdir+0x3d5/0xdf0 [ 600.594079] ? ext4_init_dot_dotdot+0x520/0x520 [ 600.598778] ? selinux_inode_mkdir+0x23/0x30 [ 600.603206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 600.608771] ? security_inode_mkdir+0xe4/0x120 [ 600.613391] vfs_mkdir+0x42e/0x690 [ 600.616967] do_mkdirat+0x234/0x2a0 [ 600.620614] ? __ia32_sys_mknod+0xb0/0xb0 [ 600.624776] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 600.629547] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.634922] ? do_syscall_64+0x26/0x620 [ 600.638909] ? lockdep_hardirqs_on+0x415/0x5d0 [ 600.643515] __x64_sys_mkdir+0x5c/0x80 [ 600.647429] do_syscall_64+0xfd/0x620 [ 600.651260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.656464] RIP: 0033:0x45a367 [ 600.659669] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 600.678588] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 600.686339] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 600.693796] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 600.701635] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 15:45:55 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:55 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) socket$pppoe(0x18, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:55 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:45:55 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:45:55 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 600.709037] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 600.716320] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:45:55 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 600.845162] FAULT_INJECTION: forcing a failure. [ 600.845162] name failslab, interval 1, probability 0, space 0, times 0 [ 600.864960] CPU: 0 PID: 14990 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 600.873923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.883293] Call Trace: [ 600.885901] dump_stack+0x197/0x210 [ 600.889549] should_fail.cold+0xa/0x1b [ 600.893540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 600.898667] ? lockdep_hardirqs_on+0x415/0x5d0 [ 600.904313] __should_failslab+0x121/0x190 [ 600.908648] should_failslab+0x9/0x14 [ 600.912462] kmem_cache_alloc+0x2ae/0x700 [ 600.916617] ? map_id_range_down+0x1ee/0x370 [ 600.927288] ? __put_user_ns+0x70/0x70 [ 600.931281] selinux_inode_alloc_security+0xb6/0x2a0 [ 600.936482] security_inode_alloc+0x8a/0xd0 [ 600.940817] inode_init_always+0x56e/0xb40 [ 600.945759] alloc_inode+0x81/0x190 [ 600.949828] new_inode_pseudo+0x19/0xf0 [ 600.953820] new_inode+0x1f/0x40 [ 600.958257] __ext4_new_inode+0x3cb/0x52d0 [ 600.962886] ? kasan_check_read+0x11/0x20 [ 600.967405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 600.974802] ? ext4_free_inode+0x1470/0x1470 [ 600.979239] ? dquot_get_next_dqblk+0x180/0x180 [ 600.984370] ? selinux_determine_inode_label+0x1b1/0x360 [ 600.990207] ext4_mkdir+0x3d5/0xdf0 [ 600.994229] ? ext4_init_dot_dotdot+0x520/0x520 [ 600.999439] ? selinux_inode_mkdir+0x23/0x30 [ 601.004291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 601.010411] ? security_inode_mkdir+0xe4/0x120 [ 601.015024] vfs_mkdir+0x42e/0x690 [ 601.018727] do_mkdirat+0x234/0x2a0 [ 601.022509] ? __ia32_sys_mknod+0xb0/0xb0 [ 601.026681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 601.031895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.037284] ? do_syscall_64+0x26/0x620 [ 601.041276] ? lockdep_hardirqs_on+0x415/0x5d0 [ 601.045876] __x64_sys_mkdir+0x5c/0x80 [ 601.049793] do_syscall_64+0xfd/0x620 [ 601.053760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.059414] RIP: 0033:0x45a367 [ 601.062713] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.081904] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 601.090089] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 601.097389] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 601.104690] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 601.112144] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 601.119422] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:05 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:05 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0176711"}, 0x16) 15:46:05 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:05 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:05 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 15:46:05 executing program 2: read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) 15:46:05 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x14, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 610.661608] FAULT_INJECTION: forcing a failure. [ 610.661608] name failslab, interval 1, probability 0, space 0, times 0 [ 610.673719] CPU: 0 PID: 15000 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 610.681560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.691118] Call Trace: [ 610.693734] dump_stack+0x197/0x210 [ 610.697385] should_fail.cold+0xa/0x1b [ 610.701650] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 610.706770] ? save_stack+0xa9/0xd0 [ 610.710423] ? __es_tree_search.isra.0+0x1bf/0x230 [ 610.715365] ? save_stack+0x45/0xd0 [ 610.719017] __should_failslab+0x121/0x190 [ 610.723271] should_failslab+0x9/0x14 [ 610.727097] kmem_cache_alloc+0x47/0x700 [ 610.731190] ? ext4_es_scan+0x730/0x730 [ 610.735184] __es_insert_extent+0x2cc/0xf20 [ 610.739517] ? do_raw_write_lock+0xbd/0x1e0 [ 610.743870] ext4_es_insert_extent+0x27e/0x640 [ 610.748478] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 610.754314] ? rcu_read_lock_sched_held+0x110/0x130 [ 610.759349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 610.764998] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 610.770815] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 610.775935] ? ext4_zeroout_es+0x180/0x180 [ 610.780182] ? ext4_find_extent+0x76e/0x9d0 [ 610.784645] ? ext4_find_extent+0x6a6/0x9d0 [ 610.788989] ext4_ext_map_blocks+0x204c/0x55c0 [ 610.793784] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 610.798824] ? __lock_is_held+0xb6/0x140 [ 610.802991] ? lock_acquire+0x16f/0x3f0 [ 610.807899] ? ext4_map_blocks+0x4cf/0x1b20 [ 610.812248] ext4_map_blocks+0xf83/0x1b20 [ 610.816458] ? ext4_issue_zeroout+0x170/0x170 [ 610.821025] ? kasan_check_write+0x14/0x20 [ 610.825843] ? __brelse+0x95/0xb0 [ 610.829334] ext4_getblk+0xc4/0x510 [ 610.832992] ? ext4_iomap_begin+0xf70/0xf70 [ 610.837401] ? ext4_free_inode+0x1470/0x1470 [ 610.841858] ext4_bread+0x8f/0x230 [ 610.845427] ? ext4_getblk+0x510/0x510 [ 610.849446] ext4_append+0x155/0x370 [ 610.853181] ext4_mkdir+0x61b/0xdf0 [ 610.856840] ? ext4_init_dot_dotdot+0x520/0x520 [ 610.861532] ? selinux_inode_mkdir+0x23/0x30 [ 610.865963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 610.871513] ? security_inode_mkdir+0xe4/0x120 [ 610.876114] vfs_mkdir+0x42e/0x690 [ 610.879720] do_mkdirat+0x234/0x2a0 [ 610.883456] ? __ia32_sys_mknod+0xb0/0xb0 [ 610.887900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 610.893423] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.898808] ? do_syscall_64+0x26/0x620 [ 610.902802] ? lockdep_hardirqs_on+0x415/0x5d0 [ 610.908273] __x64_sys_mkdir+0x5c/0x80 [ 610.912364] do_syscall_64+0xfd/0x620 [ 610.916310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.921508] RIP: 0033:0x45a367 [ 610.924726] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.944377] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 610.952100] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 15:46:05 executing program 2: read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) [ 610.959467] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 610.966836] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 610.974126] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 610.981404] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:06 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:06 executing program 2: read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) 15:46:06 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x15, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:06 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) [ 611.210499] FAULT_INJECTION: forcing a failure. [ 611.210499] name failslab, interval 1, probability 0, space 0, times 0 [ 611.222320] CPU: 0 PID: 15014 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 611.230308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.239786] Call Trace: [ 611.242399] dump_stack+0x197/0x210 [ 611.246050] should_fail.cold+0xa/0x1b [ 611.250228] ? fault_create_debugfs_attr+0x1e0/0x1e0 15:46:06 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 611.257789] ? mark_held_locks+0xb1/0x100 [ 611.261957] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 611.267019] ? __es_tree_search.isra.0+0x1bf/0x230 [ 611.271976] __should_failslab+0x121/0x190 [ 611.276241] should_failslab+0x9/0x14 [ 611.280064] kmem_cache_alloc+0x47/0x700 [ 611.284155] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 611.289196] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 611.293971] ? ext4_es_scan+0x730/0x730 [ 611.298016] __es_insert_extent+0x2cc/0xf20 [ 611.302361] ? do_raw_write_lock+0xbd/0x1e0 [ 611.306708] ext4_es_insert_extent+0x27e/0x640 [ 611.311320] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 611.317153] ext4_map_blocks+0xc3f/0x1b20 [ 611.321675] ? ext4_issue_zeroout+0x170/0x170 [ 611.326198] ? kasan_check_write+0x14/0x20 [ 611.330450] ? __brelse+0x95/0xb0 [ 611.334043] ext4_getblk+0xc4/0x510 [ 611.337681] ? ext4_iomap_begin+0xf70/0xf70 [ 611.342340] ? ext4_free_inode+0x1470/0x1470 [ 611.347836] ext4_bread+0x8f/0x230 [ 611.351395] ? ext4_getblk+0x510/0x510 [ 611.355366] ext4_append+0x155/0x370 [ 611.359292] ext4_mkdir+0x61b/0xdf0 [ 611.363164] ? ext4_init_dot_dotdot+0x520/0x520 [ 611.368406] ? selinux_inode_mkdir+0x23/0x30 [ 611.372835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 611.378477] ? security_inode_mkdir+0xe4/0x120 [ 611.383086] vfs_mkdir+0x42e/0x690 [ 611.386746] do_mkdirat+0x234/0x2a0 [ 611.390394] ? __ia32_sys_mknod+0xb0/0xb0 [ 611.394939] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 611.399714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.405351] ? do_syscall_64+0x26/0x620 15:46:06 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 611.409341] ? lockdep_hardirqs_on+0x415/0x5d0 [ 611.414041] __x64_sys_mkdir+0x5c/0x80 [ 611.417946] do_syscall_64+0xfd/0x620 [ 611.422123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.427331] RIP: 0033:0x45a367 [ 611.430544] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.449462] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 611.457187] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045a367 [ 611.464478] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 611.471766] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 611.479048] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f8a9b1196d4 [ 611.486331] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:16 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0176711"}, 0x16) 15:46:16 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) 15:46:16 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:16 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:16 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:16 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 15:46:16 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) [ 621.535700] FAULT_INJECTION: forcing a failure. [ 621.535700] name failslab, interval 1, probability 0, space 0, times 0 [ 621.557818] CPU: 0 PID: 15035 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 621.565659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.575028] Call Trace: [ 621.577640] dump_stack+0x197/0x210 [ 621.581299] should_fail.cold+0xa/0x1b 15:46:16 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 621.585268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.590390] ? lock_downgrade+0x880/0x880 [ 621.594564] __should_failslab+0x121/0x190 [ 621.598823] should_failslab+0x9/0x14 [ 621.602643] __kmalloc_track_caller+0x2de/0x750 [ 621.607329] ? mntput+0x74/0xa0 [ 621.610622] ? strndup_user+0x77/0xd0 [ 621.614443] memdup_user+0x26/0xb0 [ 621.618001] strndup_user+0x77/0xd0 [ 621.621647] ksys_mount+0x3c/0x150 [ 621.625212] __x64_sys_mount+0xbe/0x150 [ 621.629205] do_syscall_64+0xfd/0x620 15:46:16 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 15:46:16 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017"}, 0x14) [ 621.633022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.638216] RIP: 0033:0x45d99a [ 621.641428] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 621.660342] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 621.668067] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 621.675355] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 15:46:16 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, &(0x7f0000000240)=""/215, 0xd7) [ 621.682643] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 621.689927] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 621.697303] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:16 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x19, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:16 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:16 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 621.845826] FAULT_INJECTION: forcing a failure. [ 621.845826] name failslab, interval 1, probability 0, space 0, times 0 [ 621.864493] CPU: 0 PID: 15058 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 621.872357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.881729] Call Trace: [ 621.884352] dump_stack+0x197/0x210 [ 621.888010] should_fail.cold+0xa/0x1b [ 621.891932] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.897052] ? lock_downgrade+0x880/0x880 [ 621.901353] __should_failslab+0x121/0x190 [ 621.905606] should_failslab+0x9/0x14 [ 621.909420] kmem_cache_alloc_trace+0x2cc/0x760 [ 621.914103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 621.919664] ? _copy_from_user+0xdd/0x150 [ 621.923974] copy_mount_options+0x5c/0x3a0 [ 621.928236] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 621.933808] ksys_mount+0xa7/0x150 [ 621.937372] __x64_sys_mount+0xbe/0x150 [ 621.941368] do_syscall_64+0xfd/0x620 [ 621.945365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.950565] RIP: 0033:0x45d99a [ 621.953770] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 621.972691] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 621.980422] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 621.987700] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 621.995002] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 622.002631] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 622.009909] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:16 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:17 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 622.155805] FAULT_INJECTION: forcing a failure. [ 622.155805] name failslab, interval 1, probability 0, space 0, times 0 [ 622.167379] CPU: 1 PID: 15067 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 622.175199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.184562] Call Trace: [ 622.187171] dump_stack+0x197/0x210 [ 622.190826] should_fail.cold+0xa/0x1b [ 622.194731] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.199852] ? lock_downgrade+0x880/0x880 [ 622.204032] __should_failslab+0x121/0x190 [ 622.208297] should_failslab+0x9/0x14 [ 622.212120] __kmalloc_track_caller+0x2de/0x750 [ 622.216806] ? mntput+0x74/0xa0 [ 622.220110] ? strndup_user+0x77/0xd0 [ 622.223934] memdup_user+0x26/0xb0 [ 622.227503] strndup_user+0x77/0xd0 [ 622.231156] ksys_mount+0x3c/0x150 [ 622.234724] __x64_sys_mount+0xbe/0x150 [ 622.238731] do_syscall_64+0xfd/0x620 [ 622.242991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.248189] RIP: 0033:0x45d99a [ 622.251395] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 622.270664] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 622.278395] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 622.285684] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 622.292980] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 15:46:17 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:17 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 622.300263] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 622.307545] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:17 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x21, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:17 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 622.477669] FAULT_INJECTION: forcing a failure. [ 622.477669] name failslab, interval 1, probability 0, space 0, times 0 [ 622.495235] CPU: 0 PID: 15079 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 622.503068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.512952] Call Trace: [ 622.515574] dump_stack+0x197/0x210 [ 622.519302] should_fail.cold+0xa/0x1b [ 622.523210] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.528343] ? lock_downgrade+0x880/0x880 [ 622.532535] __should_failslab+0x121/0x190 [ 622.536791] should_failslab+0x9/0x14 [ 622.540603] __kmalloc_track_caller+0x2de/0x750 [ 622.545290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 622.550839] ? strndup_user+0x77/0xd0 [ 622.554656] memdup_user+0x26/0xb0 [ 622.558207] strndup_user+0x77/0xd0 [ 622.561849] ksys_mount+0x7b/0x150 [ 622.565405] __x64_sys_mount+0xbe/0x150 [ 622.569394] do_syscall_64+0xfd/0x620 [ 622.573214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.578415] RIP: 0033:0x45d99a [ 622.581618] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 622.601305] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 622.609024] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 622.616309] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 622.623596] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 622.630871] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 622.638152] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:27 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:46:27 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x22, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:27 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) 15:46:27 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:27 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:27 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017"}, 0x14) 15:46:27 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) [ 632.415256] FAULT_INJECTION: forcing a failure. [ 632.415256] name failslab, interval 1, probability 0, space 0, times 0 [ 632.457502] CPU: 0 PID: 15088 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 632.465338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.474701] Call Trace: [ 632.477310] dump_stack+0x197/0x210 [ 632.480959] should_fail.cold+0xa/0x1b [ 632.484884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 632.490015] ? lock_downgrade+0x880/0x880 [ 632.494200] __should_failslab+0x121/0x190 [ 632.498452] should_failslab+0x9/0x14 [ 632.502286] kmem_cache_alloc+0x2ae/0x700 [ 632.506453] ? find_held_lock+0x35/0x130 [ 632.510532] ? fs_reclaim_acquire+0x20/0x20 [ 632.514878] getname_flags+0xd6/0x5b0 [ 632.518698] user_path_at_empty+0x2f/0x50 [ 632.522878] do_mount+0x150/0x2bc0 [ 632.526449] ? rcu_read_lock_sched_held+0x110/0x130 [ 632.531500] ? copy_mount_string+0x40/0x40 [ 632.535752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.541311] ? _copy_from_user+0xdd/0x150 [ 632.545484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.551210] ? copy_mount_options+0x280/0x3a0 [ 632.555730] ksys_mount+0xdb/0x150 [ 632.559380] __x64_sys_mount+0xbe/0x150 [ 632.563378] do_syscall_64+0xfd/0x620 [ 632.567193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.572389] RIP: 0033:0x45d99a [ 632.575594] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 632.594591] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:46:27 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x23, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 632.602309] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 632.609586] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 632.616860] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 632.624140] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 632.631415] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:27 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:27 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) 15:46:27 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:27 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) [ 632.828777] FAULT_INJECTION: forcing a failure. [ 632.828777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 632.840634] CPU: 1 PID: 15107 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 632.848448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.857826] Call Trace: [ 632.860470] dump_stack+0x197/0x210 [ 632.864132] should_fail.cold+0xa/0x1b [ 632.868044] ? kernel_text_address+0x73/0xf0 [ 632.872521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 632.877665] ? mark_held_locks+0x100/0x100 [ 632.881986] __alloc_pages_nodemask+0x1ee/0x750 [ 632.886700] ? __alloc_pages_slowpath+0x2870/0x2870 [ 632.891742] ? find_held_lock+0x35/0x130 [ 632.895848] cache_grow_begin+0x91/0x8c0 [ 632.899937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.905495] ? check_preemption_disabled+0x48/0x290 [ 632.910536] kmem_cache_alloc+0x63b/0x700 [ 632.914705] getname_flags+0xd6/0x5b0 [ 632.918529] user_path_at_empty+0x2f/0x50 [ 632.922697] do_mount+0x150/0x2bc0 [ 632.926284] ? rcu_read_lock_sched_held+0x110/0x130 [ 632.931318] ? copy_mount_string+0x40/0x40 [ 632.935568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.941121] ? _copy_from_user+0xdd/0x150 [ 632.945300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.951303] ? copy_mount_options+0x280/0x3a0 [ 632.955828] ksys_mount+0xdb/0x150 [ 632.959419] __x64_sys_mount+0xbe/0x150 [ 632.963441] do_syscall_64+0xfd/0x620 [ 632.967264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.972473] RIP: 0033:0x45d99a [ 632.975679] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 632.994594] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 633.002318] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 633.009603] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 633.016973] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 633.024251] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 633.031533] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:37 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:46:37 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:37 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:46:37 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:37 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:37 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017"}, 0x14) [ 642.650543] FAULT_INJECTION: forcing a failure. [ 642.650543] name failslab, interval 1, probability 0, space 0, times 0 [ 642.687059] CPU: 0 PID: 15113 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 15:46:37 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 642.694901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.704269] Call Trace: [ 642.706878] dump_stack+0x197/0x210 [ 642.710533] should_fail.cold+0xa/0x1b [ 642.714450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 642.719683] ? lock_downgrade+0x880/0x880 [ 642.723875] __should_failslab+0x121/0x190 [ 642.728129] should_failslab+0x9/0x14 [ 642.731950] __kmalloc_track_caller+0x2de/0x750 [ 642.736637] ? kstrdup_const+0x66/0x80 [ 642.740547] kstrdup+0x3a/0x70 [ 642.743760] kstrdup_const+0x66/0x80 [ 642.747490] alloc_vfsmnt+0xba/0x780 [ 642.751233] vfs_kern_mount.part.0+0x2a/0x410 [ 642.755759] do_mount+0x53e/0x2bc0 [ 642.759330] ? copy_mount_string+0x40/0x40 [ 642.763576] ? _copy_from_user+0xdd/0x150 [ 642.767746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.773300] ? copy_mount_options+0x280/0x3a0 [ 642.777823] ksys_mount+0xdb/0x150 [ 642.781385] __x64_sys_mount+0xbe/0x150 [ 642.785378] do_syscall_64+0xfd/0x620 [ 642.789199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.794429] RIP: 0033:0x45d99a 15:46:37 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 642.797634] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 642.816553] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 642.824284] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 642.831663] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 642.838960] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 15:46:37 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:46:37 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) [ 642.846241] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 642.853519] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:37 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:46:37 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:37 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 642.991865] FAULT_INJECTION: forcing a failure. [ 642.991865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 643.004769] CPU: 0 PID: 15142 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 643.012595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.021991] Call Trace: [ 643.024601] dump_stack+0x197/0x210 [ 643.028259] should_fail.cold+0xa/0x1b [ 643.032183] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 643.037312] ? __might_sleep+0x95/0x190 [ 643.041315] __alloc_pages_nodemask+0x1ee/0x750 [ 643.045998] ? check_preemption_disabled+0x48/0x290 [ 643.051032] ? __alloc_pages_slowpath+0x2870/0x2870 [ 643.056250] ? rcu_read_lock_sched_held+0x110/0x130 [ 643.061287] ? __alloc_pages_nodemask+0x632/0x750 [ 643.066141] ? rcu_read_lock_sched_held+0x110/0x130 [ 643.071173] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 643.076719] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 643.082283] alloc_pages_current+0x107/0x210 [ 643.086714] get_zeroed_page+0x14/0x50 [ 643.090630] selinux_sb_copy_data+0x2a/0x4a0 [ 643.095064] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 643.100629] security_sb_copy_data+0x6b/0xb0 [ 643.105062] mount_fs+0x230/0x31f [ 643.108564] vfs_kern_mount.part.0+0x6f/0x410 [ 643.113087] do_mount+0x53e/0x2bc0 [ 643.116652] ? copy_mount_string+0x40/0x40 [ 643.120901] ? _copy_from_user+0xdd/0x150 [ 643.125069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.130636] ? copy_mount_options+0x280/0x3a0 [ 643.135301] ksys_mount+0xdb/0x150 [ 643.138859] __x64_sys_mount+0xbe/0x150 [ 643.142849] do_syscall_64+0xfd/0x620 [ 643.146699] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.151934] RIP: 0033:0x45d99a [ 643.155152] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 643.174073] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 643.181801] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a 15:46:38 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) 15:46:38 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 643.189080] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 643.196357] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 643.203643] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 643.210924] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:38 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x31, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:38 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:48 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab01767"}, 0x15) 15:46:48 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) 15:46:48 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x32, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:48 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:48 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:48 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e3599"}, 0xd) [ 653.533414] FAULT_INJECTION: forcing a failure. [ 653.533414] name failslab, interval 1, probability 0, space 0, times 0 [ 653.557458] CPU: 0 PID: 15163 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 653.565379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.574744] Call Trace: [ 653.577358] dump_stack+0x197/0x210 15:46:48 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) [ 653.581015] should_fail.cold+0xa/0x1b [ 653.584930] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 653.590065] ? lock_downgrade+0x880/0x880 [ 653.594236] __should_failslab+0x121/0x190 [ 653.598490] should_failslab+0x9/0x14 [ 653.602313] __kmalloc_track_caller+0x2de/0x750 [ 653.607008] ? kstrdup_const+0x66/0x80 [ 653.610922] kstrdup+0x3a/0x70 [ 653.614132] kstrdup_const+0x66/0x80 [ 653.617862] alloc_vfsmnt+0xba/0x780 [ 653.621604] vfs_kern_mount.part.0+0x2a/0x410 [ 653.626120] do_mount+0x53e/0x2bc0 [ 653.629685] ? copy_mount_string+0x40/0x40 [ 653.633934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.639492] ? copy_mount_options+0x280/0x3a0 [ 653.644011] ksys_mount+0xdb/0x150 [ 653.647570] __x64_sys_mount+0xbe/0x150 [ 653.651563] do_syscall_64+0xfd/0x620 [ 653.655383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.660579] RIP: 0033:0x45d99a [ 653.663778] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:46:48 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x33, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 653.683000] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 653.690733] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 653.698024] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 653.705311] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 653.712603] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 653.719892] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:48 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0) read(r0, 0x0, 0x0) 15:46:48 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x35, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:48 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:48 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0) read(r0, 0x0, 0x0) [ 653.937528] FAULT_INJECTION: forcing a failure. [ 653.937528] name failslab, interval 1, probability 0, space 0, times 0 [ 653.960459] CPU: 1 PID: 15183 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 653.971418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.981238] Call Trace: [ 653.983886] dump_stack+0x197/0x210 [ 653.996339] should_fail.cold+0xa/0x1b [ 654.000252] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 654.007027] ? lock_downgrade+0x880/0x880 [ 654.021306] ? ns_test_super+0x50/0x50 [ 654.025572] __should_failslab+0x121/0x190 [ 654.029842] should_failslab+0x9/0x14 [ 654.034032] kmem_cache_alloc_trace+0x2cc/0x760 [ 654.039527] ? do_raw_spin_unlock+0x181/0x270 [ 654.044572] ? ns_test_super+0x50/0x50 [ 654.048477] sget_userns+0x11b/0xd30 [ 654.052209] ? ns_test_super+0x50/0x50 [ 654.056200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.064187] ? set_bdev_super+0x120/0x120 [ 654.068440] ? set_bdev_super+0x120/0x120 [ 654.072738] ? ns_test_super+0x50/0x50 [ 654.077541] sget+0x10c/0x150 [ 654.080671] mount_bdev+0xff/0x3c0 [ 654.084535] ? msdos_mount+0x40/0x40 [ 654.088296] msdos_mount+0x35/0x40 [ 654.091952] mount_fs+0xa8/0x31f [ 654.095525] vfs_kern_mount.part.0+0x6f/0x410 [ 654.100134] do_mount+0x53e/0x2bc0 [ 654.103716] ? copy_mount_string+0x40/0x40 [ 654.107969] ? _copy_from_user+0xdd/0x150 [ 654.112136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.117874] ? copy_mount_options+0x280/0x3a0 [ 654.122436] ksys_mount+0xdb/0x150 [ 654.126608] __x64_sys_mount+0xbe/0x150 [ 654.133846] do_syscall_64+0xfd/0x620 [ 654.137782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.143075] RIP: 0033:0x45d99a [ 654.146282] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 654.165556] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 654.173378] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 654.180747] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 654.188647] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 654.196106] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 654.203571] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:58 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab01767"}, 0x15) 15:46:58 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x36, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:58 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0) read(r0, 0x0, 0x0) 15:46:58 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:58 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) unlinkat(r4, 0x0, 0x200) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 663.755381] FAULT_INJECTION: forcing a failure. [ 663.755381] name failslab, interval 1, probability 0, space 0, times 0 [ 663.813649] CPU: 0 PID: 15194 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 663.822319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.833002] Call Trace: [ 663.835651] dump_stack+0x197/0x210 [ 663.839311] should_fail.cold+0xa/0x1b [ 663.845866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 663.851079] ? lock_downgrade+0x880/0x880 [ 663.855268] __should_failslab+0x121/0x190 [ 663.859520] should_failslab+0x9/0x14 [ 663.863334] kmem_cache_alloc+0x2ae/0x700 [ 663.867692] ? trace_hardirqs_on+0x67/0x220 [ 663.876905] getname_kernel+0x53/0x370 [ 663.880811] kern_path+0x20/0x40 [ 663.884219] lookup_bdev.part.0+0x7b/0x1b0 [ 663.888469] ? bd_acquire+0x2c0/0x2c0 [ 663.892389] ? __free_pages+0x72/0xb0 [ 663.896213] blkdev_get_by_path+0x81/0x130 [ 663.900467] mount_bdev+0x5d/0x3c0 [ 663.904018] ? msdos_mount+0x40/0x40 [ 663.907753] msdos_mount+0x35/0x40 [ 663.911396] mount_fs+0xa8/0x31f [ 663.914790] vfs_kern_mount.part.0+0x6f/0x410 [ 663.919393] do_mount+0x53e/0x2bc0 [ 663.922960] ? copy_mount_string+0x40/0x40 [ 663.927221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.933130] ? copy_mount_options+0x280/0x3a0 [ 663.937649] ksys_mount+0xdb/0x150 [ 663.941212] __x64_sys_mount+0xbe/0x150 [ 663.945216] do_syscall_64+0xfd/0x620 [ 663.949042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.955282] RIP: 0033:0x45d99a [ 663.958488] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 663.979853] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 663.987598] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 663.994893] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 664.002263] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 664.015017] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 664.022308] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:46:59 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:46:59 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(0xffffffffffffffff, 0x0, 0x0) 15:46:59 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x37, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:46:59 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r3}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:46:59 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:46:59 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(0xffffffffffffffff, 0x0, 0x0) 15:46:59 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x38, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 664.416238] FAULT_INJECTION: forcing a failure. [ 664.416238] name failslab, interval 1, probability 0, space 0, times 0 [ 664.469959] CPU: 1 PID: 15209 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 664.478117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.487658] Call Trace: [ 664.490355] dump_stack+0x197/0x210 [ 664.494000] should_fail.cold+0xa/0x1b [ 664.497890] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 664.511315] ? lock_downgrade+0x880/0x880 [ 664.515664] __should_failslab+0x121/0x190 [ 664.522676] should_failslab+0x9/0x14 [ 664.526475] kmem_cache_alloc+0x2ae/0x700 [ 664.530712] ? trace_hardirqs_on+0x67/0x220 [ 664.535308] getname_kernel+0x53/0x370 [ 664.539457] kern_path+0x20/0x40 [ 664.542832] lookup_bdev.part.0+0x7b/0x1b0 [ 664.547185] ? bd_acquire+0x2c0/0x2c0 [ 664.551008] ? __free_pages+0x72/0xb0 [ 664.554910] blkdev_get_by_path+0x81/0x130 [ 664.559148] mount_bdev+0x5d/0x3c0 [ 664.562686] ? msdos_mount+0x40/0x40 [ 664.566759] msdos_mount+0x35/0x40 [ 664.570302] mount_fs+0xa8/0x31f [ 664.573665] vfs_kern_mount.part.0+0x6f/0x410 [ 664.578179] do_mount+0x53e/0x2bc0 [ 664.581758] ? copy_mount_string+0x40/0x40 [ 664.586719] ? _copy_from_user+0xdd/0x150 [ 664.591130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.596984] ? copy_mount_options+0x280/0x3a0 [ 664.603236] ksys_mount+0xdb/0x150 [ 664.606810] __x64_sys_mount+0xbe/0x150 [ 664.610892] do_syscall_64+0xfd/0x620 [ 664.614706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.619886] RIP: 0033:0x45d99a [ 664.623253] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 664.642157] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 664.649878] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 664.657229] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 664.664882] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 664.672145] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 664.680211] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:08 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab01767"}, 0x15) 15:47:08 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:47:08 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r2}, 0xc) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:47:08 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(0xffffffffffffffff, 0x0, 0x0) 15:47:08 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x39, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:08 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 674.001131] FAULT_INJECTION: forcing a failure. [ 674.001131] name failslab, interval 1, probability 0, space 0, times 0 [ 674.019049] CPU: 0 PID: 15226 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 674.027156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.036523] Call Trace: [ 674.039142] dump_stack+0x197/0x210 [ 674.042804] should_fail.cold+0xa/0x1b 15:47:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 674.046720] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 674.052390] ? lock_downgrade+0x880/0x880 [ 674.056565] ? ns_test_super+0x50/0x50 [ 674.060492] __should_failslab+0x121/0x190 [ 674.064747] should_failslab+0x9/0x14 [ 674.070127] kmem_cache_alloc_trace+0x2cc/0x760 [ 674.075001] ? do_raw_spin_unlock+0x181/0x270 [ 674.079784] ? ns_test_super+0x50/0x50 [ 674.083703] sget_userns+0x11b/0xd30 [ 674.087444] ? ns_test_super+0x50/0x50 [ 674.091693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.097244] ? set_bdev_super+0x120/0x120 15:47:09 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab017"}, 0x14) 15:47:09 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) [ 674.101432] ? set_bdev_super+0x120/0x120 [ 674.105603] ? ns_test_super+0x50/0x50 [ 674.109526] sget+0x10c/0x150 [ 674.112763] mount_bdev+0xff/0x3c0 [ 674.116318] ? msdos_mount+0x40/0x40 [ 674.120079] msdos_mount+0x35/0x40 [ 674.123641] mount_fs+0xa8/0x31f [ 674.127126] vfs_kern_mount.part.0+0x6f/0x410 [ 674.131647] do_mount+0x53e/0x2bc0 [ 674.135214] ? copy_mount_string+0x40/0x40 [ 674.139466] ? _copy_from_user+0xdd/0x150 [ 674.143723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.150716] ? copy_mount_options+0x280/0x3a0 [ 674.155539] ksys_mount+0xdb/0x150 [ 674.159820] __x64_sys_mount+0xbe/0x150 [ 674.164015] do_syscall_64+0xfd/0x620 [ 674.168368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.173846] RIP: 0033:0x45d99a [ 674.177844] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:47:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:09 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:47:09 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r2}, 0xc) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:47:09 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0"}, 0x13) [ 674.198454] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 674.207309] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 674.215534] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 674.223183] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 674.230463] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 674.237770] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:09 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3"}, 0x8) 15:47:09 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:47:09 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:47:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:09 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x223) [ 674.418281] FAULT_INJECTION: forcing a failure. [ 674.418281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 674.430668] CPU: 1 PID: 15256 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 674.438654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.448242] Call Trace: [ 674.450862] dump_stack+0x197/0x210 [ 674.454519] should_fail.cold+0xa/0x1b [ 674.458450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 674.463813] ? mark_held_locks+0x100/0x100 [ 674.468085] ? avc_has_perm_noaudit+0x3b6/0x570 [ 674.472898] __alloc_pages_nodemask+0x1ee/0x750 [ 674.477600] ? __alloc_pages_slowpath+0x2870/0x2870 [ 674.485974] cache_grow_begin+0x91/0x8c0 [ 674.490053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.495603] ? check_preemption_disabled+0x48/0x290 [ 674.500637] kmem_cache_alloc_trace+0x685/0x760 [ 674.506250] ? ns_test_super+0x50/0x50 [ 674.510429] sget_userns+0x11b/0xd30 [ 674.515215] ? ns_test_super+0x50/0x50 [ 674.519397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.526169] ? set_bdev_super+0x120/0x120 [ 674.530945] ? set_bdev_super+0x120/0x120 [ 674.539968] ? ns_test_super+0x50/0x50 [ 674.543965] sget+0x10c/0x150 [ 674.547272] mount_bdev+0xff/0x3c0 [ 674.552138] ? msdos_mount+0x40/0x40 [ 674.555993] msdos_mount+0x35/0x40 [ 674.559613] mount_fs+0xa8/0x31f [ 674.563119] vfs_kern_mount.part.0+0x6f/0x410 [ 674.567657] do_mount+0x53e/0x2bc0 [ 674.571677] ? copy_mount_string+0x40/0x40 [ 674.575949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.581537] ? copy_mount_options+0x280/0x3a0 [ 674.586419] ksys_mount+0xdb/0x150 [ 674.590021] __x64_sys_mount+0xbe/0x150 [ 674.594015] do_syscall_64+0xfd/0x620 [ 674.597924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.603141] RIP: 0033:0x45d99a [ 674.606348] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 674.625262] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 674.633161] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 674.640457] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 674.648009] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 674.655290] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 674.662751] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:09 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:47:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x42, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x43, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 674.868621] FAULT_INJECTION: forcing a failure. [ 674.868621] name failslab, interval 1, probability 0, space 0, times 0 [ 674.886719] CPU: 1 PID: 15271 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 674.901325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.914343] Call Trace: 15:47:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x46, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 674.916976] dump_stack+0x197/0x210 [ 674.920831] should_fail.cold+0xa/0x1b [ 674.925189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 674.933557] ? lock_downgrade+0x880/0x880 [ 674.937904] __should_failslab+0x121/0x190 [ 674.942186] should_failslab+0x9/0x14 [ 674.946027] __kmalloc+0x2e2/0x750 [ 674.949766] ? __lockdep_init_map+0x10c/0x5b0 [ 674.954283] ? prealloc_shrinker+0xdf/0x340 [ 674.958828] prealloc_shrinker+0xdf/0x340 [ 674.963076] sget_userns+0x7ec/0xd30 [ 674.970740] ? ns_test_super+0x50/0x50 [ 674.974763] ? set_bdev_super+0x120/0x120 [ 674.978924] ? set_bdev_super+0x120/0x120 [ 674.983082] ? ns_test_super+0x50/0x50 [ 674.986979] sget+0x10c/0x150 [ 674.990102] mount_bdev+0xff/0x3c0 [ 674.994191] ? msdos_mount+0x40/0x40 [ 674.998706] msdos_mount+0x35/0x40 [ 675.009418] mount_fs+0xa8/0x31f [ 675.014894] vfs_kern_mount.part.0+0x6f/0x410 [ 675.019679] do_mount+0x53e/0x2bc0 [ 675.023282] ? copy_mount_string+0x40/0x40 [ 675.032402] ? _copy_from_user+0xdd/0x150 [ 675.038403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.044830] ? copy_mount_options+0x280/0x3a0 [ 675.049351] ksys_mount+0xdb/0x150 [ 675.052912] __x64_sys_mount+0xbe/0x150 [ 675.057437] do_syscall_64+0xfd/0x620 [ 675.062400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.068662] RIP: 0033:0x45d99a [ 675.072484] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 675.091774] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 675.099632] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 675.107888] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 15:47:10 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r2}, 0xc) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 675.116389] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 675.125774] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 675.135608] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:19 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0"}, 0x13) 15:47:19 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'rx'}, 0x3) 15:47:19 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:19 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:47:19 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x2302) 15:47:19 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast, r2}, 0xc) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 684.885010] FAULT_INJECTION: forcing a failure. [ 684.885010] name failslab, interval 1, probability 0, space 0, times 0 [ 684.923912] CPU: 1 PID: 15286 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 684.932189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.941562] Call Trace: [ 684.944875] dump_stack+0x197/0x210 [ 684.948537] should_fail.cold+0xa/0x1b [ 684.953346] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 684.958590] ? lock_downgrade+0x880/0x880 [ 684.963216] __should_failslab+0x121/0x190 [ 684.969031] should_failslab+0x9/0x14 [ 684.973294] kmem_cache_alloc_trace+0x2cc/0x760 [ 684.991914] ? kasan_unpoison_shadow+0x35/0x50 [ 684.996532] ? kasan_kmalloc+0xce/0xf0 [ 685.016509] __memcg_init_list_lru_node+0x8a/0x1e0 [ 685.025822] __list_lru_init+0x402/0x720 [ 685.029901] sget_userns+0x81b/0xd30 [ 685.033625] ? ns_test_super+0x50/0x50 [ 685.037532] ? set_bdev_super+0x120/0x120 [ 685.041691] ? set_bdev_super+0x120/0x120 [ 685.046027] ? ns_test_super+0x50/0x50 [ 685.049922] sget+0x10c/0x150 [ 685.053044] mount_bdev+0xff/0x3c0 [ 685.056596] ? msdos_mount+0x40/0x40 [ 685.060324] msdos_mount+0x35/0x40 [ 685.063904] mount_fs+0xa8/0x31f [ 685.067514] vfs_kern_mount.part.0+0x6f/0x410 [ 685.072823] do_mount+0x53e/0x2bc0 [ 685.076484] ? copy_mount_string+0x40/0x40 [ 685.081636] ? _copy_from_user+0xdd/0x150 [ 685.086010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.091562] ? copy_mount_options+0x280/0x3a0 [ 685.096075] ksys_mount+0xdb/0x150 [ 685.099632] __x64_sys_mount+0xbe/0x150 [ 685.104102] do_syscall_64+0xfd/0x620 [ 685.108312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.113695] RIP: 0033:0x45d99a [ 685.117202] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:47:20 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x49, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 685.137000] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 685.145187] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 685.152554] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 685.160153] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 685.168177] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 685.176214] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:20 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:20 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 685.322250] FAULT_INJECTION: forcing a failure. [ 685.322250] name failslab, interval 1, probability 0, space 0, times 0 [ 685.341516] CPU: 1 PID: 15304 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 685.349376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.358948] Call Trace: [ 685.361565] dump_stack+0x197/0x210 [ 685.365242] should_fail.cold+0xa/0x1b [ 685.369330] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 685.374907] ? lock_downgrade+0x880/0x880 [ 685.380480] __should_failslab+0x121/0x190 [ 685.384999] should_failslab+0x9/0x14 [ 685.388999] kmem_cache_alloc_node_trace+0x274/0x720 [ 685.394218] __kmalloc_node+0x3d/0x80 [ 685.398039] kvmalloc_node+0x68/0x100 [ 685.401860] __list_lru_init+0x4d9/0x720 [ 685.405940] sget_userns+0x81b/0xd30 [ 685.409692] ? ns_test_super+0x50/0x50 [ 685.413599] ? set_bdev_super+0x120/0x120 [ 685.418026] ? set_bdev_super+0x120/0x120 [ 685.422447] ? ns_test_super+0x50/0x50 [ 685.426359] sget+0x10c/0x150 [ 685.430044] mount_bdev+0xff/0x3c0 [ 685.434132] ? msdos_mount+0x40/0x40 [ 685.437951] msdos_mount+0x35/0x40 [ 685.442046] mount_fs+0xa8/0x31f [ 685.445524] vfs_kern_mount.part.0+0x6f/0x410 [ 685.450045] do_mount+0x53e/0x2bc0 [ 685.453623] ? copy_mount_string+0x40/0x40 [ 685.457977] ? _copy_from_user+0xdd/0x150 [ 685.462279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.468026] ? copy_mount_options+0x280/0x3a0 [ 685.472645] ksys_mount+0xdb/0x150 [ 685.476208] __x64_sys_mount+0xbe/0x150 [ 685.480220] do_syscall_64+0xfd/0x620 [ 685.484057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.489337] RIP: 0033:0x45d99a [ 685.493053] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 685.513415] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:47:20 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 685.521520] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 685.529156] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 685.536909] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 685.544217] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 685.552180] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:20 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:47:20 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 685.664800] FAULT_INJECTION: forcing a failure. [ 685.664800] name failslab, interval 1, probability 0, space 0, times 0 [ 685.696094] CPU: 0 PID: 15311 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 685.704746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.714392] Call Trace: [ 685.717007] dump_stack+0x197/0x210 [ 685.720868] should_fail.cold+0xa/0x1b [ 685.725046] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 685.730517] ? lock_downgrade+0x880/0x880 [ 685.734705] __should_failslab+0x121/0x190 [ 685.738985] should_failslab+0x9/0x14 [ 685.742805] __kmalloc+0x2e2/0x750 [ 685.747337] ? __lockdep_init_map+0x10c/0x5b0 [ 685.751855] ? prealloc_shrinker+0xdf/0x340 [ 685.756291] prealloc_shrinker+0xdf/0x340 [ 685.760462] sget_userns+0x7ec/0xd30 [ 685.764193] ? ns_test_super+0x50/0x50 [ 685.768388] ? set_bdev_super+0x120/0x120 [ 685.773352] ? set_bdev_super+0x120/0x120 [ 685.777915] ? ns_test_super+0x50/0x50 [ 685.781806] sget+0x10c/0x150 [ 685.785109] mount_bdev+0xff/0x3c0 [ 685.788666] ? msdos_mount+0x40/0x40 [ 685.792396] msdos_mount+0x35/0x40 [ 685.796179] mount_fs+0xa8/0x31f [ 685.799653] vfs_kern_mount.part.0+0x6f/0x410 [ 685.804170] do_mount+0x53e/0x2bc0 [ 685.807733] ? copy_mount_string+0x40/0x40 [ 685.817199] ? copy_mount_options+0x1ea/0x3a0 [ 685.825968] ? copy_mount_options+0x1f3/0x3a0 [ 685.830925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.837085] ? copy_mount_options+0x280/0x3a0 [ 685.843789] ksys_mount+0xdb/0x150 [ 685.847354] __x64_sys_mount+0xbe/0x150 [ 685.851353] do_syscall_64+0xfd/0x620 [ 685.856058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.863706] RIP: 0033:0x45d99a [ 685.866912] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 685.901303] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 685.915145] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 685.923411] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 685.931127] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 685.938584] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 685.946042] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:30 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fab0"}, 0x13) 15:47:30 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:47:30 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x23020000) 15:47:30 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:47:30 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:30 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 695.156491] FAULT_INJECTION: forcing a failure. [ 695.156491] name failslab, interval 1, probability 0, space 0, times 0 [ 695.184732] CPU: 1 PID: 15324 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 695.192669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.202126] Call Trace: 15:47:30 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1fa"}, 0x12) [ 695.205199] dump_stack+0x197/0x210 [ 695.209144] should_fail.cold+0xa/0x1b [ 695.213086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.218531] ? lock_downgrade+0x880/0x880 [ 695.222995] __should_failslab+0x121/0x190 [ 695.227254] should_failslab+0x9/0x14 [ 695.231077] kmem_cache_alloc_trace+0x2cc/0x760 [ 695.236390] ? kasan_unpoison_shadow+0x35/0x50 [ 695.241337] ? kasan_kmalloc+0xce/0xf0 [ 695.245250] __memcg_init_list_lru_node+0x8a/0x1e0 [ 695.250200] __list_lru_init+0x402/0x720 15:47:30 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cbb1"}, 0x11) [ 695.254376] sget_userns+0x81b/0xd30 [ 695.258286] ? ns_test_super+0x50/0x50 [ 695.262214] ? set_bdev_super+0x120/0x120 [ 695.266384] ? set_bdev_super+0x120/0x120 [ 695.270541] ? ns_test_super+0x50/0x50 [ 695.274440] sget+0x10c/0x150 [ 695.277563] mount_bdev+0xff/0x3c0 [ 695.281124] ? msdos_mount+0x40/0x40 [ 695.284855] msdos_mount+0x35/0x40 [ 695.288408] mount_fs+0xa8/0x31f [ 695.291806] vfs_kern_mount.part.0+0x6f/0x410 [ 695.296330] do_mount+0x53e/0x2bc0 [ 695.299901] ? copy_mount_string+0x40/0x40 15:47:30 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) [ 695.304159] ? _copy_from_user+0xdd/0x150 [ 695.308325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.313883] ? copy_mount_options+0x280/0x3a0 [ 695.318410] ksys_mount+0xdb/0x150 [ 695.321976] __x64_sys_mount+0xbe/0x150 [ 695.325977] do_syscall_64+0xfd/0x620 [ 695.329800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.335008] RIP: 0033:0x45d99a [ 695.338218] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:47:30 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:30 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75"}, 0xf) [ 695.357135] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 695.364863] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 695.372161] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 695.379448] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 695.386737] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 695.394019] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:30 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:47:30 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 695.568111] FAULT_INJECTION: forcing a failure. [ 695.568111] name failslab, interval 1, probability 0, space 0, times 0 [ 695.588091] CPU: 1 PID: 15344 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 695.595921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.605285] Call Trace: [ 695.607893] dump_stack+0x197/0x210 [ 695.611545] should_fail.cold+0xa/0x1b [ 695.615459] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.620580] ? lock_downgrade+0x880/0x880 [ 695.624750] __should_failslab+0x121/0x190 [ 695.628999] should_failslab+0x9/0x14 [ 695.632810] kmem_cache_alloc_trace+0x2cc/0x760 [ 695.637496] ? kasan_unpoison_shadow+0x35/0x50 [ 695.642097] ? kasan_kmalloc+0xce/0xf0 [ 695.646000] __memcg_init_list_lru_node+0x8a/0x1e0 [ 695.650955] __list_lru_init+0x402/0x720 [ 695.655034] sget_userns+0x81b/0xd30 [ 695.658755] ? ns_test_super+0x50/0x50 [ 695.662657] ? set_bdev_super+0x120/0x120 [ 695.666819] ? set_bdev_super+0x120/0x120 [ 695.670975] ? ns_test_super+0x50/0x50 [ 695.674867] sget+0x10c/0x150 [ 695.677985] mount_bdev+0xff/0x3c0 [ 695.681534] ? msdos_mount+0x40/0x40 [ 695.685271] msdos_mount+0x35/0x40 [ 695.688936] mount_fs+0xa8/0x31f [ 695.692326] vfs_kern_mount.part.0+0x6f/0x410 [ 695.696838] do_mount+0x53e/0x2bc0 [ 695.700474] ? retint_kernel+0x2d/0x2d [ 695.704383] ? copy_mount_string+0x40/0x40 [ 695.708648] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 695.714203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.719759] ? copy_mount_options+0x280/0x3a0 [ 695.724275] ksys_mount+0xdb/0x150 [ 695.727845] __x64_sys_mount+0xbe/0x150 [ 695.731865] do_syscall_64+0xfd/0x620 [ 695.735688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.740939] RIP: 0033:0x45d99a [ 695.744145] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 695.763063] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 695.770779] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 695.778058] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 695.785332] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 695.792605] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 695.799880] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:40 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:47:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x2, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:40 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:47:40 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x7ffffffff000) 15:47:40 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:47:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x5, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 705.356474] FAULT_INJECTION: forcing a failure. [ 705.356474] name failslab, interval 1, probability 0, space 0, times 0 [ 705.394954] CPU: 0 PID: 15353 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 705.402795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.412171] Call Trace: [ 705.414784] dump_stack+0x197/0x210 [ 705.418435] should_fail.cold+0xa/0x1b [ 705.422353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 705.427475] ? lock_downgrade+0x880/0x880 [ 705.431657] __should_failslab+0x121/0x190 [ 705.435913] should_failslab+0x9/0x14 [ 705.439728] kmem_cache_alloc_trace+0x2cc/0x760 [ 705.444419] ? kasan_unpoison_shadow+0x35/0x50 [ 705.449016] ? kasan_kmalloc+0xce/0xf0 [ 705.452927] __memcg_init_list_lru_node+0x8a/0x1e0 [ 705.457874] __list_lru_init+0x402/0x720 [ 705.461954] sget_userns+0x81b/0xd30 [ 705.465680] ? ns_test_super+0x50/0x50 [ 705.469584] ? set_bdev_super+0x120/0x120 [ 705.473748] ? set_bdev_super+0x120/0x120 [ 705.477908] ? ns_test_super+0x50/0x50 [ 705.481821] sget+0x10c/0x150 [ 705.484960] mount_bdev+0xff/0x3c0 [ 705.488518] ? msdos_mount+0x40/0x40 [ 705.492249] msdos_mount+0x35/0x40 [ 705.495803] mount_fs+0xa8/0x31f [ 705.499188] vfs_kern_mount.part.0+0x6f/0x410 [ 705.503715] do_mount+0x53e/0x2bc0 [ 705.507279] ? copy_mount_string+0x40/0x40 [ 705.511531] ? _copy_from_user+0xdd/0x150 [ 705.515694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.521249] ? copy_mount_options+0x280/0x3a0 [ 705.525853] ksys_mount+0xdb/0x150 [ 705.529585] __x64_sys_mount+0xbe/0x150 [ 705.533579] do_syscall_64+0xfd/0x620 [ 705.537409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.542647] RIP: 0033:0x45d99a 15:47:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x500, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 705.545874] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 705.564794] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 705.573222] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 705.580647] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 705.587937] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 705.596111] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 15:47:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x3f00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 705.603481] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:40 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 705.780941] FAULT_INJECTION: forcing a failure. [ 705.780941] name failslab, interval 1, probability 0, space 0, times 0 [ 705.792315] CPU: 0 PID: 15374 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 705.800124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.809490] Call Trace: [ 705.812097] dump_stack+0x197/0x210 [ 705.815752] should_fail.cold+0xa/0x1b [ 705.819664] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 705.824803] ? lock_downgrade+0x880/0x880 [ 705.828980] __should_failslab+0x121/0x190 [ 705.833234] should_failslab+0x9/0x14 [ 705.837132] kmem_cache_alloc_trace+0x2cc/0x760 [ 705.841818] ? kasan_unpoison_shadow+0x35/0x50 [ 705.846432] ? kasan_kmalloc+0xce/0xf0 [ 705.850351] __memcg_init_list_lru_node+0x8a/0x1e0 [ 705.855308] __list_lru_init+0x402/0x720 [ 705.859386] sget_userns+0x81b/0xd30 [ 705.863113] ? ns_test_super+0x50/0x50 [ 705.867015] ? set_bdev_super+0x120/0x120 [ 705.871173] ? set_bdev_super+0x120/0x120 [ 705.875353] ? ns_test_super+0x50/0x50 [ 705.879260] sget+0x10c/0x150 [ 705.882384] mount_bdev+0xff/0x3c0 [ 705.885936] ? msdos_mount+0x40/0x40 [ 705.889667] msdos_mount+0x35/0x40 [ 705.893223] mount_fs+0xa8/0x31f [ 705.896625] vfs_kern_mount.part.0+0x6f/0x410 [ 705.901157] do_mount+0x53e/0x2bc0 [ 705.904745] ? copy_mount_string+0x40/0x40 [ 705.909009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.915778] ? copy_mount_options+0x280/0x3a0 [ 705.920294] ksys_mount+0xdb/0x150 [ 705.923854] __x64_sys_mount+0xbe/0x150 [ 705.927844] do_syscall_64+0xfd/0x620 [ 705.931664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.936885] RIP: 0033:0x45d99a [ 705.940088] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 705.958999] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 705.966745] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 705.974026] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 15:47:40 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75"}, 0xf) 15:47:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x1000000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 705.981302] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 705.988577] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 705.995862] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x2000000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:50 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:47:50 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0xf0ffffff7f0000) 15:47:50 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:47:50 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:47:50 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x5000000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 715.592208] FAULT_INJECTION: forcing a failure. [ 715.592208] name failslab, interval 1, probability 0, space 0, times 0 [ 715.615109] CPU: 1 PID: 15390 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 715.623040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.632411] Call Trace: [ 715.635026] dump_stack+0x197/0x210 15:47:50 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x2302000000000000) [ 715.639135] should_fail.cold+0xa/0x1b [ 715.643068] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 715.648209] ? lock_downgrade+0x880/0x880 [ 715.652492] __should_failslab+0x121/0x190 [ 715.656861] should_failslab+0x9/0x14 [ 715.660831] kmem_cache_alloc_trace+0x2cc/0x760 [ 715.666145] ? kasan_unpoison_shadow+0x35/0x50 [ 715.670762] ? kasan_kmalloc+0xce/0xf0 [ 715.674688] __memcg_init_list_lru_node+0x8a/0x1e0 [ 715.680093] __list_lru_init+0x402/0x720 [ 715.684344] sget_userns+0x81b/0xd30 [ 715.688084] ? ns_test_super+0x50/0x50 [ 715.691999] ? set_bdev_super+0x120/0x120 [ 715.696169] ? set_bdev_super+0x120/0x120 [ 715.700343] ? ns_test_super+0x50/0x50 [ 715.704253] sget+0x10c/0x150 [ 715.707470] mount_bdev+0xff/0x3c0 [ 715.711043] ? msdos_mount+0x40/0x40 [ 715.721144] msdos_mount+0x35/0x40 [ 715.724731] mount_fs+0xa8/0x31f [ 715.728136] vfs_kern_mount.part.0+0x6f/0x410 [ 715.732686] do_mount+0x53e/0x2bc0 [ 715.736401] ? copy_mount_string+0x40/0x40 [ 715.740789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.746359] ? copy_mount_options+0x280/0x3a0 [ 715.750887] ksys_mount+0xdb/0x150 [ 715.754584] __x64_sys_mount+0xbe/0x150 [ 715.758582] do_syscall_64+0xfd/0x620 [ 715.762587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.767804] RIP: 0033:0x45d99a [ 715.771017] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:47:50 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x3f000000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 715.790177] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 715.798038] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 715.805416] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 715.812709] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 715.820222] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 715.827524] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:47:50 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, r3, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000002c0)={0x5, 0x5, 0x2, 0x10001, 'syz0\x00'}) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x12002040}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r3, 0x100, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) ioctl$TCSETAW(r4, 0x5407, &(0x7f00000000c0)={0xb7d, 0xd, 0x7f, 0x1, 0x1a, "571ae0bfeb35b867"}) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000000)={0x6, 0x4, 0x20, "c6530e09bbf56d6a1c8d7088f718bf072067d12f41f696ded157872789a87661d85f69a48095a4521ac736c69458f4a3dafc6ada49b1d424f453f958", 0x18, "31de8106ea38eb4d04bb49bc080007cfe6d97cb9f41631ef776d354e3210ac9802dcf977f7d51ef2076cf81642a14e5a00e700", 0x10}) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r5, 0x0, 0x0) 15:47:50 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 715.996678] FAULT_INJECTION: forcing a failure. [ 715.996678] name failslab, interval 1, probability 0, space 0, times 0 [ 716.016447] CPU: 0 PID: 15407 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 716.024375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.034063] Call Trace: [ 716.036685] dump_stack+0x197/0x210 [ 716.040383] should_fail.cold+0xa/0x1b [ 716.044306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 716.049435] ? lock_downgrade+0x880/0x880 [ 716.053619] __should_failslab+0x121/0x190 [ 716.057983] should_failslab+0x9/0x14 [ 716.061822] kmem_cache_alloc_trace+0x2cc/0x760 [ 716.066707] ? kasan_unpoison_shadow+0x35/0x50 [ 716.071358] __memcg_init_list_lru_node+0x8a/0x1e0 [ 716.076327] __list_lru_init+0x402/0x720 [ 716.080441] sget_userns+0x81b/0xd30 [ 716.084183] ? ns_test_super+0x50/0x50 [ 716.088095] ? set_bdev_super+0x120/0x120 [ 716.092264] ? set_bdev_super+0x120/0x120 [ 716.096565] ? ns_test_super+0x50/0x50 [ 716.100472] sget+0x10c/0x150 [ 716.103678] mount_bdev+0xff/0x3c0 [ 716.107307] ? msdos_mount+0x40/0x40 [ 716.111046] msdos_mount+0x35/0x40 [ 716.114610] mount_fs+0xa8/0x31f [ 716.118008] vfs_kern_mount.part.0+0x6f/0x410 [ 716.122785] do_mount+0x53e/0x2bc0 [ 716.126644] ? copy_mount_string+0x40/0x40 [ 716.130923] ? _copy_from_user+0xdd/0x150 [ 716.135308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.140878] ? copy_mount_options+0x280/0x3a0 [ 716.145408] ksys_mount+0xdb/0x150 [ 716.149000] __x64_sys_mount+0xbe/0x150 [ 716.153183] do_syscall_64+0xfd/0x620 [ 716.157010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.162306] RIP: 0033:0x45d99a [ 716.165817] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 716.185342] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:47:51 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0xf5ffffff, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:47:51 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75"}, 0xf) 15:47:51 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x40) read(r0, 0x0, 0x0) [ 716.193605] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 716.200988] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 716.208787] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 716.216162] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 716.223537] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:48:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x101000) read(r0, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x30}, 0x10) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x543000, 0x8, 0x4, 0x0, 0x5, {}, {0x9, 0x0, 0x1, 0x2, 0x1e, 0x2, "41c99216"}, 0x3, 0x6, @offset=0x1, 0x5, 0x0, 0xffffffffffffffff}) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000140)) dup3(r1, r0, 0x100000) 15:48:00 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:00 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0xfffffff5, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:00 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:48:00 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000000c0)={r1, 0x1, 0x6, @random="163ee6cb8d26"}, 0x10) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r2, 0x0, 0xffffffffffffff93) [ 725.840975] FAULT_INJECTION: forcing a failure. [ 725.840975] name failslab, interval 1, probability 0, space 0, times 0 [ 725.880912] CPU: 0 PID: 15418 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 15:48:00 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) [ 725.888777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.898184] Call Trace: [ 725.900796] dump_stack+0x197/0x210 [ 725.904459] should_fail.cold+0xa/0x1b [ 725.908373] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 725.913498] ? lock_downgrade+0x880/0x880 [ 725.917676] __should_failslab+0x121/0x190 [ 725.921925] should_failslab+0x9/0x14 [ 725.925925] kmem_cache_alloc_trace+0x2cc/0x760 [ 725.930614] ? kasan_unpoison_shadow+0x35/0x50 [ 725.935215] ? kasan_kmalloc+0xce/0xf0 15:48:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0025050000ff040001000100000014000600455999637c22cabc0000"], 0x30}, 0x1, 0x0, 0x0, 0x20000004}, 0x3c1c2fe148b79aa3) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2000, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000140)="3f423c126a9f40a030f47484499d6ce8bb81596b3767adae98d0943d6e8905c71cdcc425ba5002904860afce3ac32814d815d6475795e7da55c7b5740fa0a7629b15d0ebcb7f47edb575188cf7b336b696ec770aa6a4470e5d7c87319da9b92840a9177e1f6cba5d9d011553b1c343e2d448e278f8e4827b8f25b3d35733174374be40aca49ca1afe1c1046b89b20e38a2ca699008f123dbed906d7f78675dedd831cbf22dbb4801b083c9952d2f3891c7d69a891499ac2a32a5b2135f589382621b4821f7845d822513829d1896532f438c33cb2ed9d7b850e741e6b82203f6a9c3103c9816ef57e38bb2f2fa24", 0xee) [ 725.939127] __memcg_init_list_lru_node+0x8a/0x1e0 [ 725.944088] __list_lru_init+0x402/0x720 [ 725.948169] sget_userns+0x81b/0xd30 [ 725.951896] ? ns_test_super+0x50/0x50 [ 725.955805] ? set_bdev_super+0x120/0x120 [ 725.959970] ? set_bdev_super+0x120/0x120 [ 725.964133] ? ns_test_super+0x50/0x50 [ 725.968041] sget+0x10c/0x150 [ 725.971165] mount_bdev+0xff/0x3c0 [ 725.974720] ? msdos_mount+0x40/0x40 [ 725.978452] msdos_mount+0x35/0x40 [ 725.982029] mount_fs+0xa8/0x31f [ 725.985416] vfs_kern_mount.part.0+0x6f/0x410 15:48:00 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) [ 725.989935] do_mount+0x53e/0x2bc0 [ 725.993499] ? copy_mount_string+0x40/0x40 [ 725.997812] ? _copy_from_user+0xdd/0x150 [ 726.002004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.007561] ? copy_mount_options+0x280/0x3a0 [ 726.012501] ksys_mount+0xdb/0x150 [ 726.016071] __x64_sys_mount+0xbe/0x150 [ 726.020064] do_syscall_64+0xfd/0x620 [ 726.023885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.029119] RIP: 0033:0x45d99a [ 726.029135] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 726.029143] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 726.029158] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 726.029167] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 726.029176] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 726.029184] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 726.029192] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:01 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:01 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:48:01 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x2, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:01 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)) read(r0, 0x0, 0x0) [ 726.484813] FAULT_INJECTION: forcing a failure. [ 726.484813] name failslab, interval 1, probability 0, space 0, times 0 15:48:01 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000000)="e6c9d9a810870bb05a774eaba383d291bd2c98b12a6cd1d6d45a809623248873ef139ade8ff40030ec4566987cb661459d634d8bea8bacb98de7fc2b41612ca018135347d49109cd811289f6957d8144dc45c1fc4e2d56b4b6ffa8e649f6e1af2f2a12d29f584f1ff9f6e2ea3e5e269c05e73c0fa4b87d93e08961d3af92587f17e09b6cecbfa8c2c0e426a423e45567d93c7e77955acde844468bf5857c4a8f9cf1c0fea8e51c6630c30ef60961436378a1b4988ef0b8b607adfdb95aec85de8b25ed435e68032c3338de1dfc6a7176a2645d574551dd51b4d79250d49b3b9540306a67d5e9f287ad4c35d14c989169370ddd73ea081e3547138eb67ecd83d1") 15:48:01 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x5, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 726.532639] CPU: 1 PID: 15451 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 726.540504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.549877] Call Trace: [ 726.552538] dump_stack+0x197/0x210 [ 726.556204] should_fail.cold+0xa/0x1b [ 726.560559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 726.565711] ? lock_downgrade+0x880/0x880 [ 726.569888] __should_failslab+0x121/0x190 [ 726.574141] should_failslab+0x9/0x14 [ 726.577957] kmem_cache_alloc_trace+0x2cc/0x760 [ 726.582643] ? kasan_unpoison_shadow+0x35/0x50 [ 726.588461] ? kasan_kmalloc+0xce/0xf0 [ 726.592372] __memcg_init_list_lru_node+0x8a/0x1e0 [ 726.597328] __list_lru_init+0x402/0x720 [ 726.601417] sget_userns+0x81b/0xd30 [ 726.605182] ? ns_test_super+0x50/0x50 [ 726.609089] ? set_bdev_super+0x120/0x120 [ 726.613277] ? set_bdev_super+0x120/0x120 [ 726.617436] ? ns_test_super+0x50/0x50 [ 726.621365] sget+0x10c/0x150 [ 726.624488] mount_bdev+0xff/0x3c0 [ 726.628041] ? msdos_mount+0x40/0x40 [ 726.632652] msdos_mount+0x35/0x40 [ 726.636220] mount_fs+0xa8/0x31f [ 726.639631] vfs_kern_mount.part.0+0x6f/0x410 [ 726.644150] do_mount+0x53e/0x2bc0 [ 726.648669] ? copy_mount_string+0x40/0x40 [ 726.653009] ? _copy_from_user+0xdd/0x150 [ 726.657196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.663119] ? copy_mount_options+0x280/0x3a0 [ 726.668088] ksys_mount+0xdb/0x150 [ 726.668107] __x64_sys_mount+0xbe/0x150 [ 726.668128] do_syscall_64+0xfd/0x620 [ 726.668148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.668160] RIP: 0033:0x45d99a [ 726.668175] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 726.668183] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 726.668195] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 726.668208] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 726.668216] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 726.668223] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 726.748125] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:01 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:48:01 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) read(r0, 0x0, 0x0) 15:48:01 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x500, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:01 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:01 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x14b6a48d9c7ad776) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) r1 = socket$isdn_base(0x22, 0x3, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0xffff, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/xfrm_stat\x00') ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000140)=0x5) [ 726.966730] FAULT_INJECTION: forcing a failure. [ 726.966730] name failslab, interval 1, probability 0, space 0, times 0 [ 726.996473] CPU: 0 PID: 15471 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 727.004497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.014734] Call Trace: [ 727.018054] dump_stack+0x197/0x210 [ 727.021708] should_fail.cold+0xa/0x1b [ 727.025615] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 727.030736] ? lock_downgrade+0x880/0x880 [ 727.034995] __should_failslab+0x121/0x190 [ 727.039334] should_failslab+0x9/0x14 [ 727.043149] kmem_cache_alloc_trace+0x2cc/0x760 [ 727.047830] ? kasan_unpoison_shadow+0x35/0x50 [ 727.052531] ? kasan_kmalloc+0xce/0xf0 [ 727.056455] __memcg_init_list_lru_node+0x8a/0x1e0 [ 727.062359] __list_lru_init+0x402/0x720 [ 727.066436] sget_userns+0x81b/0xd30 [ 727.070172] ? ns_test_super+0x50/0x50 [ 727.074267] ? set_bdev_super+0x120/0x120 [ 727.078443] ? set_bdev_super+0x120/0x120 [ 727.082811] ? ns_test_super+0x50/0x50 [ 727.087085] sget+0x10c/0x150 [ 727.090360] mount_bdev+0xff/0x3c0 [ 727.093915] ? msdos_mount+0x40/0x40 [ 727.097658] msdos_mount+0x35/0x40 [ 727.101235] mount_fs+0xa8/0x31f [ 727.104657] vfs_kern_mount.part.0+0x6f/0x410 [ 727.109380] do_mount+0x53e/0x2bc0 [ 727.112942] ? retint_kernel+0x2d/0x2d [ 727.116863] ? copy_mount_string+0x40/0x40 [ 727.121143] ? copy_mount_options+0x1ea/0x3a0 [ 727.125737] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 727.130679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.136334] ? copy_mount_options+0x280/0x3a0 [ 727.141285] ksys_mount+0xdb/0x150 [ 727.144861] __x64_sys_mount+0xbe/0x150 [ 727.148851] do_syscall_64+0xfd/0x620 [ 727.152966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.158563] RIP: 0033:0x45d99a [ 727.162105] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 727.181448] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 727.189164] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 727.196448] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 727.203739] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 727.211030] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 727.218310] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:48:11 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x3f00, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:11 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75"}, 0xf) 15:48:11 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r1, 0x0, 0x0) 15:48:11 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:11 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 736.744980] FAULT_INJECTION: forcing a failure. [ 736.744980] name failslab, interval 1, probability 0, space 0, times 0 15:48:11 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:11 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) read(r0, 0x0, 0x0) [ 736.818127] CPU: 1 PID: 15483 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 736.825972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.835536] Call Trace: [ 736.838504] dump_stack+0x197/0x210 [ 736.842946] should_fail.cold+0xa/0x1b [ 736.846869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 736.852452] ? lock_downgrade+0x880/0x880 [ 736.856635] __should_failslab+0x121/0x190 [ 736.860895] should_failslab+0x9/0x14 [ 736.864743] kmem_cache_alloc_node_trace+0x274/0x720 [ 736.869947] ? kmem_cache_alloc_trace+0x348/0x760 [ 736.875603] ? kasan_unpoison_shadow+0x35/0x50 [ 736.880209] __kmalloc_node+0x3d/0x80 [ 736.884030] kvmalloc_node+0x68/0x100 [ 736.887851] __list_lru_init+0x4d9/0x720 [ 736.891926] sget_userns+0x81b/0xd30 [ 736.895654] ? ns_test_super+0x50/0x50 [ 736.899574] ? set_bdev_super+0x120/0x120 [ 736.903760] ? set_bdev_super+0x120/0x120 [ 736.907923] ? ns_test_super+0x50/0x50 [ 736.911829] sget+0x10c/0x150 [ 736.914959] mount_bdev+0xff/0x3c0 [ 736.918524] ? msdos_mount+0x40/0x40 [ 736.922264] msdos_mount+0x35/0x40 [ 736.925908] mount_fs+0xa8/0x31f [ 736.929302] vfs_kern_mount.part.0+0x6f/0x410 [ 736.933821] do_mount+0x53e/0x2bc0 [ 736.937383] ? copy_mount_string+0x40/0x40 [ 736.941628] ? _copy_from_user+0xdd/0x150 [ 736.945794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.951347] ? copy_mount_options+0x280/0x3a0 [ 736.955868] ksys_mount+0xdb/0x150 [ 736.959421] __x64_sys_mount+0xbe/0x150 [ 736.963414] do_syscall_64+0xfd/0x620 [ 736.967232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.972467] RIP: 0033:0x45d99a [ 736.975758] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 736.995824] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 737.003558] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a 15:48:11 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 737.010927] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 737.022550] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 737.029937] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 737.037224] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:12 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x2, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:12 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:12 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x222083) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) read(r0, 0x0, 0x0) [ 737.202587] FAULT_INJECTION: forcing a failure. [ 737.202587] name failslab, interval 1, probability 0, space 0, times 0 [ 737.235135] CPU: 1 PID: 15508 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 737.242979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.252444] Call Trace: [ 737.255154] dump_stack+0x197/0x210 [ 737.258800] should_fail.cold+0xa/0x1b [ 737.262708] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 737.267827] ? lock_downgrade+0x880/0x880 [ 737.272000] __should_failslab+0x121/0x190 [ 737.276256] should_failslab+0x9/0x14 [ 737.280078] kmem_cache_alloc_trace+0x2cc/0x760 [ 737.284760] ? kasan_unpoison_shadow+0x35/0x50 [ 737.289355] ? kasan_kmalloc+0xce/0xf0 [ 737.293275] __memcg_init_list_lru_node+0x8a/0x1e0 [ 737.298228] __list_lru_init+0x402/0x720 [ 737.302393] sget_userns+0x81b/0xd30 [ 737.306117] ? ns_test_super+0x50/0x50 [ 737.310035] ? set_bdev_super+0x120/0x120 [ 737.314203] ? set_bdev_super+0x120/0x120 [ 737.318362] ? ns_test_super+0x50/0x50 [ 737.322262] sget+0x10c/0x150 [ 737.325381] mount_bdev+0xff/0x3c0 [ 737.328934] ? msdos_mount+0x40/0x40 [ 737.332692] msdos_mount+0x35/0x40 [ 737.336242] mount_fs+0xa8/0x31f [ 737.339626] vfs_kern_mount.part.0+0x6f/0x410 [ 737.344147] do_mount+0x53e/0x2bc0 [ 737.347705] ? copy_mount_string+0x40/0x40 [ 737.351952] ? _copy_from_user+0xdd/0x150 [ 737.356288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.361841] ? copy_mount_options+0x280/0x3a0 [ 737.366357] ksys_mount+0xdb/0x150 [ 737.369923] __x64_sys_mount+0xbe/0x150 [ 737.373912] do_syscall_64+0xfd/0x620 [ 737.377728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.382925] RIP: 0033:0x45d99a [ 737.386125] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 737.405126] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 737.412843] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 737.420117] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 737.427391] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 737.434666] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 737.442024] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:21 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:21 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:48:21 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x380, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) 15:48:21 executing program 1 (fault-call:2 fault-nth:0): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:48:21 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:21 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 746.968166] FAULT_INJECTION: forcing a failure. [ 746.968166] name failslab, interval 1, probability 0, space 0, times 0 [ 746.998550] FAULT_INJECTION: forcing a failure. [ 746.998550] name failslab, interval 1, probability 0, space 0, times 0 15:48:21 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8600, 0x0) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000120}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, 0x28}, 0x1, 0x0, 0x0, 0x50}, 0x1) [ 747.046370] CPU: 0 PID: 15521 Comm: syz-executor.1 Not tainted 4.19.95-syzkaller #0 [ 747.054215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.063582] Call Trace: [ 747.066193] dump_stack+0x197/0x210 [ 747.069855] should_fail.cold+0xa/0x1b [ 747.073764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 747.078883] ? lock_downgrade+0x880/0x880 [ 747.083065] __should_failslab+0x121/0x190 [ 747.087315] should_failslab+0x9/0x14 [ 747.091137] kmem_cache_alloc_node+0x26c/0x710 [ 747.095744] __alloc_skb+0xd5/0x5f0 [ 747.099388] ? skb_trim+0x190/0x190 [ 747.103024] ? __fget+0x340/0x540 [ 747.106497] vhci_write+0xc4/0x470 [ 747.110057] __vfs_write+0x587/0x810 [ 747.113784] ? kernel_read+0x120/0x120 [ 747.117689] ? __inode_security_revalidate+0xda/0x120 [ 747.122891] ? selinux_file_permission+0x92/0x550 [ 747.127758] ? security_file_permission+0x89/0x230 [ 747.132702] ? rw_verify_area+0x118/0x360 [ 747.136863] vfs_write+0x20c/0x560 [ 747.140419] ksys_write+0x14f/0x2d0 [ 747.144064] ? __ia32_sys_read+0xb0/0xb0 [ 747.148135] ? do_syscall_64+0x26/0x620 [ 747.152117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.157492] ? do_syscall_64+0x26/0x620 [ 747.161486] __x64_sys_write+0x73/0xb0 [ 747.165391] do_syscall_64+0xfd/0x620 [ 747.169207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.174403] RIP: 0033:0x45af49 [ 747.177609] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.196539] RSP: 002b:00007fa3832b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 747.204263] RAX: ffffffffffffffda RBX: 00007fa3832b0c90 RCX: 000000000045af49 [ 747.211559] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 747.218837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 747.226117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3832b16d4 [ 747.233409] R13: 00000000004cd298 R14: 00000000004e8a00 R15: 0000000000000004 [ 747.240732] CPU: 1 PID: 15517 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 747.248566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.257940] Call Trace: [ 747.260818] dump_stack+0x197/0x210 [ 747.264475] should_fail.cold+0xa/0x1b [ 747.268404] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 747.273528] ? lock_downgrade+0x880/0x880 [ 747.277706] __should_failslab+0x121/0x190 [ 747.281972] should_failslab+0x9/0x14 [ 747.285957] kmem_cache_alloc_node_trace+0x274/0x720 [ 747.291178] ? kmem_cache_alloc_trace+0x348/0x760 [ 747.296049] ? kasan_unpoison_shadow+0x35/0x50 [ 747.300694] __kmalloc_node+0x3d/0x80 [ 747.304541] kvmalloc_node+0x68/0x100 [ 747.308364] __list_lru_init+0x4d9/0x720 [ 747.312446] sget_userns+0x81b/0xd30 [ 747.316187] ? ns_test_super+0x50/0x50 [ 747.320390] ? set_bdev_super+0x120/0x120 [ 747.324562] ? set_bdev_super+0x120/0x120 [ 747.328726] ? ns_test_super+0x50/0x50 [ 747.332624] sget+0x10c/0x150 [ 747.335749] mount_bdev+0xff/0x3c0 [ 747.339302] ? msdos_mount+0x40/0x40 [ 747.343035] msdos_mount+0x35/0x40 [ 747.346593] mount_fs+0xa8/0x31f [ 747.349984] vfs_kern_mount.part.0+0x6f/0x410 [ 747.355449] do_mount+0x53e/0x2bc0 [ 747.359010] ? copy_mount_string+0x40/0x40 [ 747.363261] ? _copy_from_user+0xdd/0x150 [ 747.367428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.373088] ? copy_mount_options+0x280/0x3a0 [ 747.377776] ksys_mount+0xdb/0x150 [ 747.381332] __x64_sys_mount+0xbe/0x150 [ 747.385325] do_syscall_64+0xfd/0x620 [ 747.389140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.394335] RIP: 0033:0x45d99a [ 747.397535] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 747.417053] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 747.424852] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 747.432135] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 747.439411] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 15:48:22 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x500, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:22 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x20000) read(r0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x9) [ 747.446693] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 747.453969] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:22 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x3f00, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:22 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:22 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) read(r0, 0x0, 0x0) [ 747.605256] FAULT_INJECTION: forcing a failure. [ 747.605256] name failslab, interval 1, probability 0, space 0, times 0 [ 747.628924] CPU: 0 PID: 15539 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 747.636767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.646306] Call Trace: [ 747.648929] dump_stack+0x197/0x210 15:48:22 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x1000000, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 747.652581] should_fail.cold+0xa/0x1b [ 747.656496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 747.661628] ? lock_downgrade+0x880/0x880 [ 747.665798] __should_failslab+0x121/0x190 [ 747.670315] should_failslab+0x9/0x14 [ 747.674135] kmem_cache_alloc_trace+0x2cc/0x760 [ 747.678837] __memcg_init_list_lru_node+0x8a/0x1e0 [ 747.683788] __list_lru_init+0x402/0x720 [ 747.687868] sget_userns+0x81b/0xd30 [ 747.692641] ? ns_test_super+0x50/0x50 [ 747.696546] ? set_bdev_super+0x120/0x120 [ 747.700710] ? set_bdev_super+0x120/0x120 [ 747.704874] ? ns_test_super+0x50/0x50 [ 747.708766] sget+0x10c/0x150 [ 747.711887] mount_bdev+0xff/0x3c0 [ 747.715437] ? msdos_mount+0x40/0x40 [ 747.719162] msdos_mount+0x35/0x40 [ 747.722711] mount_fs+0xa8/0x31f [ 747.726095] vfs_kern_mount.part.0+0x6f/0x410 [ 747.730607] do_mount+0x53e/0x2bc0 [ 747.734165] ? copy_mount_string+0x40/0x40 [ 747.738427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.743992] ? copy_mount_options+0x280/0x3a0 [ 747.748521] ksys_mount+0xdb/0x150 [ 747.752084] __x64_sys_mount+0xbe/0x150 [ 747.756083] do_syscall_64+0xfd/0x620 [ 747.759903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.765100] RIP: 0033:0x45d99a [ 747.768304] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 747.789338] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 747.797242] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 747.804523] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 747.812243] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 747.819529] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 747.826809] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:32 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040), 0x1) 15:48:32 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:48:32 executing program 1 (fault-call:2 fault-nth:1): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:48:32 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x2000000, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:32 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r1) read(r0, 0x0, 0x0) 15:48:32 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 757.211350] FAULT_INJECTION: forcing a failure. [ 757.211350] name failslab, interval 1, probability 0, space 0, times 0 [ 757.242949] CPU: 1 PID: 15550 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 757.250830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.260739] Call Trace: [ 757.263352] dump_stack+0x197/0x210 [ 757.267023] should_fail.cold+0xa/0x1b [ 757.270968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 757.276191] ? lock_downgrade+0x880/0x880 [ 757.280374] __should_failslab+0x121/0x190 [ 757.284818] should_failslab+0x9/0x14 [ 757.288652] kmem_cache_alloc_trace+0x2cc/0x760 [ 757.293350] ? kasan_unpoison_shadow+0x35/0x50 [ 757.297953] ? kasan_kmalloc+0xce/0xf0 [ 757.301489] FAULT_INJECTION: forcing a failure. [ 757.301489] name failslab, interval 1, probability 0, space 0, times 0 [ 757.301865] __memcg_init_list_lru_node+0x8a/0x1e0 [ 757.301890] __list_lru_init+0x402/0x720 [ 757.322077] sget_userns+0x81b/0xd30 [ 757.325820] ? ns_test_super+0x50/0x50 [ 757.329732] ? set_bdev_super+0x120/0x120 [ 757.333901] ? set_bdev_super+0x120/0x120 [ 757.338059] ? ns_test_super+0x50/0x50 [ 757.341963] sget+0x10c/0x150 [ 757.345081] mount_bdev+0xff/0x3c0 [ 757.348626] ? msdos_mount+0x40/0x40 [ 757.352354] msdos_mount+0x35/0x40 [ 757.355899] mount_fs+0xa8/0x31f [ 757.359272] vfs_kern_mount.part.0+0x6f/0x410 [ 757.363778] do_mount+0x53e/0x2bc0 [ 757.367344] ? copy_mount_string+0x40/0x40 [ 757.371624] ? _copy_from_user+0xdd/0x150 [ 757.375787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.381337] ? copy_mount_options+0x280/0x3a0 [ 757.385865] ksys_mount+0xdb/0x150 [ 757.389428] __x64_sys_mount+0xbe/0x150 [ 757.393419] do_syscall_64+0xfd/0x620 [ 757.397245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.402445] RIP: 0033:0x45d99a 15:48:32 executing program 2: r0 = socket(0x3, 0x4, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r2, 0x0, 0x200) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="090700000000000000001fffffff0c009900ffffffff030000400c00990400800200030000000c009900ff030000000000000c00990004000000000800010002000000"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x24004090}, 0xffffff43, &(0x7f0000000080)={&(0x7f0000000240)={0x98, r3, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY={0x48, 0x50, [@NL80211_KEY_TYPE={0x8, 0x7, 0x1}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_SEQ={0xe, 0x4, "213de7071adaedeb66c7"}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "af14ff6875"}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "72f24bba7e2cfc3b38b0de7364"}, @NL80211_ATTR_KEY_TYPE={0x2d1, 0x37, 0x1}, @NL80211_ATTR_KEY_SEQ={0xd, 0xa, "f9818512543b8a15d8"}, @NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x2d}}, @NL80211_ATTR_KEY={0x0, 0x50, [@NL80211_KEY_DATA_WEP104={0x0, 0x1, "d5611c5ea2883dc4d58513222f"}, @NL80211_KEY_DATA_WEP40={0x0, 0x1, "be3666bdd3"}, @NL80211_KEY_MODE={0x0, 0x9, 0x1}, @NL80211_KEY_IDX={0x0, 0x2, 0x3}, @NL80211_KEY_SEQ={0x0, 0x4, "98"}, @NL80211_KEY_IDX={0x0, 0x2, 0x3}, @NL80211_KEY_DEFAULT_MGMT, @NL80211_KEY_TYPE={0x0, 0x7, 0x1}]}, @NL80211_ATTR_KEY_CIPHER={0x0, 0x9, 0xfac01}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008040}, 0x1dbd2a6574d4cbcc) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) sendto$isdn(r0, &(0x7f0000000140)={0xc8, 0x6, "745e0415d8091f1188f210dc52b183c4007ce85cad73d4768642877108faa29db8aa642bc30cee284dadb0ac06f85005c1608cabc1730e03b443778ed9762806a4dc701b63dfbbb235302f1db16c880b79a76ecc55256aa0d589f263f3507cf32654e8a9442833b3dd8155f03e8c8b4daac219"}, 0x7b, 0x2400c0c0, &(0x7f00000001c0)={0x22, 0x0, 0x6, 0x95, 0x1}, 0x6) read(r4, 0x0, 0x0) r5 = socket(0x400000000000010, 0x802, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r6, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="090700000000000000001fffffff0c009900ffffffff030000400c00990400800200030000000c009900ff030000000000000c00990004000000000800010002000000"], 0x4c}}, 0x0) r8 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, 0x0, 0xffffff5c) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r13}]}, 0x4c}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000108}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x70, r7, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'lo\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}, @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0xa32b592e980e1ace}, 0x40000) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000000)=0x84, 0x4) [ 757.406342] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 757.425959] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 757.434121] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 757.442102] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 757.449497] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 757.456767] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 757.464045] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 757.471352] CPU: 0 PID: 15555 Comm: syz-executor.1 Not tainted 4.19.95-syzkaller #0 [ 757.479172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.488549] Call Trace: [ 757.491179] dump_stack+0x197/0x210 [ 757.494018] nla_parse: 11 callbacks suppressed [ 757.494027] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 757.494828] should_fail.cold+0xa/0x1b [ 757.494850] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 757.506851] IPv6: ADDRCONF(NETDEV_UP): veth131: link is not ready [ 757.508121] ? lock_downgrade+0x880/0x880 [ 757.508152] __should_failslab+0x121/0x190 [ 757.531759] should_failslab+0x9/0x14 [ 757.535575] kmem_cache_alloc_node_trace+0x274/0x720 [ 757.540737] ? __alloc_skb+0xd5/0x5f0 [ 757.544558] __kmalloc_node_track_caller+0x3d/0x80 [ 757.549513] __kmalloc_reserve.isra.0+0x40/0xf0 [ 757.554199] __alloc_skb+0x10b/0x5f0 [ 757.557929] ? skb_trim+0x190/0x190 [ 757.561585] ? __fget+0x340/0x540 [ 757.565059] vhci_write+0xc4/0x470 [ 757.568646] __vfs_write+0x587/0x810 [ 757.572376] ? kernel_read+0x120/0x120 [ 757.576281] ? __inode_security_revalidate+0xda/0x120 [ 757.581503] ? selinux_file_permission+0x92/0x550 [ 757.586362] ? security_file_permission+0x89/0x230 [ 757.591304] ? rw_verify_area+0x118/0x360 [ 757.595476] vfs_write+0x20c/0x560 [ 757.599029] ksys_write+0x14f/0x2d0 [ 757.602685] ? __ia32_sys_read+0xb0/0xb0 [ 757.606771] ? do_syscall_64+0x26/0x620 [ 757.610766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.616162] ? do_syscall_64+0x26/0x620 [ 757.620160] __x64_sys_write+0x73/0xb0 [ 757.624068] do_syscall_64+0xfd/0x620 [ 757.627892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.633093] RIP: 0033:0x45af49 [ 757.636295] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.655302] RSP: 002b:00007fa3832b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:48:32 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5000000, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:32 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:48:32 executing program 0 (fault-call:2 fault-nth:0): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) [ 757.663298] RAX: ffffffffffffffda RBX: 00007fa3832b0c90 RCX: 000000000045af49 [ 757.670582] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 757.677946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 757.685235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3832b16d4 [ 757.692513] R13: 00000000004cd298 R14: 00000000004e8a00 R15: 0000000000000004 [ 757.700603] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 757.745376] FAULT_INJECTION: forcing a failure. [ 757.745376] name failslab, interval 1, probability 0, space 0, times 0 [ 757.757075] CPU: 0 PID: 15572 Comm: syz-executor.0 Not tainted 4.19.95-syzkaller #0 [ 757.764899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.772411] IPv6: ADDRCONF(NETDEV_UP): veth133: link is not ready [ 757.774265] Call Trace: [ 757.774292] dump_stack+0x197/0x210 [ 757.774318] should_fail.cold+0xa/0x1b [ 757.774340] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 757.795788] ? lock_downgrade+0x880/0x880 [ 757.800577] __should_failslab+0x121/0x190 [ 757.804841] should_failslab+0x9/0x14 [ 757.808671] kmem_cache_alloc_node+0x26c/0x710 [ 757.813290] __alloc_skb+0xd5/0x5f0 [ 757.816964] ? skb_trim+0x190/0x190 [ 757.820615] ? __fget+0x340/0x540 [ 757.824106] vhci_write+0xc4/0x470 [ 757.827667] __vfs_write+0x587/0x810 [ 757.831744] ? kernel_read+0x120/0x120 [ 757.835647] ? __inode_security_revalidate+0xda/0x120 [ 757.840852] ? selinux_file_permission+0x92/0x550 [ 757.845733] ? security_file_permission+0x89/0x230 [ 757.850679] ? rw_verify_area+0x118/0x360 [ 757.854865] vfs_write+0x20c/0x560 [ 757.858438] ksys_write+0x14f/0x2d0 [ 757.862086] ? __ia32_sys_read+0xb0/0xb0 [ 757.866168] ? do_syscall_64+0x26/0x620 [ 757.871026] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.876399] ? do_syscall_64+0x26/0x620 [ 757.880391] __x64_sys_write+0x73/0xb0 [ 757.884296] do_syscall_64+0xfd/0x620 [ 757.888117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.893406] RIP: 0033:0x45af49 [ 757.896616] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.915525] RSP: 002b:00007f2965832c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 757.923266] RAX: ffffffffffffffda RBX: 00007f2965832c90 RCX: 000000000045af49 [ 757.930813] RDX: 0000000000000002 RSI: 0000000020000040 RDI: 0000000000000003 [ 757.938118] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:48:32 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 757.946074] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29658336d4 [ 757.953460] R13: 00000000004cd298 R14: 00000000004e8a00 R15: 0000000000000004 [ 757.986371] FAULT_INJECTION: forcing a failure. [ 757.986371] name failslab, interval 1, probability 0, space 0, times 0 [ 758.000436] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 758.029046] CPU: 0 PID: 15574 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 758.032379] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 758.036880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.036887] Call Trace: [ 758.036912] dump_stack+0x197/0x210 [ 758.036936] should_fail.cold+0xa/0x1b [ 758.036961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.070456] ? lock_downgrade+0x880/0x880 [ 758.074634] __should_failslab+0x121/0x190 [ 758.078889] should_failslab+0x9/0x14 [ 758.082719] kmem_cache_alloc_trace+0x2cc/0x760 [ 758.086063] IPv6: ADDRCONF(NETDEV_UP): veth135: link is not ready [ 758.087405] ? kasan_unpoison_shadow+0x35/0x50 [ 758.087423] ? kasan_kmalloc+0xce/0xf0 [ 758.087448] __memcg_init_list_lru_node+0x8a/0x1e0 [ 758.087468] __list_lru_init+0x402/0x720 [ 758.111741] sget_userns+0x81b/0xd30 [ 758.115470] ? ns_test_super+0x50/0x50 [ 758.119373] ? set_bdev_super+0x120/0x120 [ 758.123793] ? set_bdev_super+0x120/0x120 [ 758.127957] ? ns_test_super+0x50/0x50 [ 758.131857] sget+0x10c/0x150 [ 758.134978] mount_bdev+0xff/0x3c0 [ 758.138525] ? msdos_mount+0x40/0x40 [ 758.142253] msdos_mount+0x35/0x40 [ 758.145811] mount_fs+0xa8/0x31f [ 758.149196] vfs_kern_mount.part.0+0x6f/0x410 [ 758.153709] do_mount+0x53e/0x2bc0 [ 758.157269] ? copy_mount_string+0x40/0x40 [ 758.161523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.167162] ? copy_mount_options+0x280/0x3a0 [ 758.171678] ksys_mount+0xdb/0x150 [ 758.175340] __x64_sys_mount+0xbe/0x150 [ 758.179342] do_syscall_64+0xfd/0x620 [ 758.183156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.188405] RIP: 0033:0x45d99a [ 758.191625] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 758.210976] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 758.218707] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 758.225993] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 758.234064] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 15:48:32 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x3f000000, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 758.241588] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 758.249140] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0xf5ffffff, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:33 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 758.373130] FAULT_INJECTION: forcing a failure. [ 758.373130] name failslab, interval 1, probability 0, space 0, times 0 [ 758.385320] CPU: 0 PID: 15584 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 758.393146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.402512] Call Trace: [ 758.405126] dump_stack+0x197/0x210 [ 758.408864] should_fail.cold+0xa/0x1b [ 758.412780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.417904] ? lock_downgrade+0x880/0x880 [ 758.422077] __should_failslab+0x121/0x190 [ 758.426327] should_failslab+0x9/0x14 [ 758.430138] kmem_cache_alloc_trace+0x2cc/0x760 [ 758.434819] ? kasan_unpoison_shadow+0x35/0x50 [ 758.439531] ? kasan_kmalloc+0xce/0xf0 [ 758.443550] __memcg_init_list_lru_node+0x8a/0x1e0 [ 758.448509] __list_lru_init+0x402/0x720 [ 758.452590] sget_userns+0x81b/0xd30 [ 758.456326] ? ns_test_super+0x50/0x50 [ 758.460238] ? set_bdev_super+0x120/0x120 [ 758.464423] ? set_bdev_super+0x120/0x120 [ 758.468595] ? ns_test_super+0x50/0x50 [ 758.472854] sget+0x10c/0x150 [ 758.476073] mount_bdev+0xff/0x3c0 [ 758.479727] ? msdos_mount+0x40/0x40 [ 758.485130] msdos_mount+0x35/0x40 [ 758.488695] mount_fs+0xa8/0x31f [ 758.492095] vfs_kern_mount.part.0+0x6f/0x410 [ 758.496615] do_mount+0x53e/0x2bc0 [ 758.500184] ? copy_mount_string+0x40/0x40 [ 758.504462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.510029] ? copy_mount_options+0x280/0x3a0 [ 758.514547] ksys_mount+0xdb/0x150 [ 758.518111] __x64_sys_mount+0xbe/0x150 [ 758.522105] do_syscall_64+0xfd/0x620 [ 758.526015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.531217] RIP: 0033:0x45d99a [ 758.534422] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 758.553339] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 758.561182] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 758.568468] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 758.575758] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 758.583049] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 758.590335] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:42 executing program 1 (fault-call:2 fault-nth:2): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:48:42 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000840)=0x7) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000880)={'team0\x00', r2}) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) signalfd4(r4, &(0x7f0000000080)={0x8000}, 0x8, 0x800) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000000)=0x10001) read(r0, 0x0, 0x0) 15:48:42 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0xfffffff5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:42 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:48:42 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:42 executing program 0 (fault-call:2 fault-nth:1): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) [ 768.088127] FAULT_INJECTION: forcing a failure. [ 768.088127] name failslab, interval 1, probability 0, space 0, times 0 [ 768.109571] CPU: 0 PID: 15594 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 768.117414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.126789] Call Trace: [ 768.129404] dump_stack+0x197/0x210 [ 768.133053] should_fail.cold+0xa/0x1b [ 768.136976] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.142104] ? lock_downgrade+0x880/0x880 [ 768.146292] __should_failslab+0x121/0x190 [ 768.150557] should_failslab+0x9/0x14 [ 768.154372] kmem_cache_alloc_trace+0x2cc/0x760 [ 768.159069] ? kasan_unpoison_shadow+0x35/0x50 [ 768.163695] ? kasan_kmalloc+0xce/0xf0 [ 768.167612] __memcg_init_list_lru_node+0x8a/0x1e0 [ 768.172569] __list_lru_init+0x402/0x720 [ 768.176786] sget_userns+0x81b/0xd30 [ 768.180516] ? ns_test_super+0x50/0x50 [ 768.184424] ? set_bdev_super+0x120/0x120 [ 768.188596] ? set_bdev_super+0x120/0x120 [ 768.192765] ? ns_test_super+0x50/0x50 [ 768.196666] sget+0x10c/0x150 [ 768.199794] mount_bdev+0xff/0x3c0 [ 768.203346] ? msdos_mount+0x40/0x40 [ 768.207074] msdos_mount+0x35/0x40 [ 768.210629] mount_fs+0xa8/0x31f [ 768.214143] vfs_kern_mount.part.0+0x6f/0x410 [ 768.218788] do_mount+0x53e/0x2bc0 [ 768.222357] ? copy_mount_string+0x40/0x40 [ 768.226617] ? _copy_from_user+0xdd/0x150 [ 768.230800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.236361] ? copy_mount_options+0x280/0x3a0 [ 768.240877] ksys_mount+0xdb/0x150 [ 768.244441] __x64_sys_mount+0xbe/0x150 [ 768.248437] do_syscall_64+0xfd/0x620 [ 768.252269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.257496] RIP: 0033:0x45d99a [ 768.261843] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 768.280885] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:48:43 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:48:43 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x40000) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) read(r0, 0x0, 0x29a) [ 768.288616] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 768.295909] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 768.303204] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 768.310496] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 768.317791] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 768.333181] FAULT_INJECTION: forcing a failure. 15:48:43 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:43 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 768.333181] name failslab, interval 1, probability 0, space 0, times 0 15:48:43 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x7fffffff, 0xe, 0x4, 0x400000, 0x5, {}, {0x3, 0x8, 0x8, 0x40, 0x1, 0x3, '\x00\x00\x008'}, 0x8, 0x3, @userptr=0x40000741, 0xfff, 0x0, r1}) connect$caif(r2, &(0x7f0000000080), 0x18) [ 768.390718] CPU: 0 PID: 15603 Comm: syz-executor.0 Not tainted 4.19.95-syzkaller #0 [ 768.398791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.408169] Call Trace: [ 768.410783] dump_stack+0x197/0x210 [ 768.414442] should_fail.cold+0xa/0x1b [ 768.418362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.424029] ? lock_downgrade+0x880/0x880 [ 768.428233] __should_failslab+0x121/0x190 [ 768.432513] should_failslab+0x9/0x14 [ 768.436339] kmem_cache_alloc_node_trace+0x274/0x720 [ 768.441463] ? __alloc_skb+0xd5/0x5f0 [ 768.445297] __kmalloc_node_track_caller+0x3d/0x80 [ 768.450255] __kmalloc_reserve.isra.0+0x40/0xf0 [ 768.454946] __alloc_skb+0x10b/0x5f0 [ 768.458681] ? skb_trim+0x190/0x190 [ 768.462597] ? __fget+0x340/0x540 [ 768.466076] vhci_write+0xc4/0x470 [ 768.469644] __vfs_write+0x587/0x810 [ 768.473384] ? kernel_read+0x120/0x120 [ 768.478034] ? __inode_security_revalidate+0xda/0x120 [ 768.483367] ? selinux_file_permission+0x92/0x550 [ 768.488252] ? security_file_permission+0x89/0x230 [ 768.493215] ? rw_verify_area+0x118/0x360 [ 768.500959] vfs_write+0x20c/0x560 [ 768.504722] ksys_write+0x14f/0x2d0 [ 768.508400] ? __ia32_sys_read+0xb0/0xb0 [ 768.512489] ? do_syscall_64+0x26/0x620 [ 768.516481] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.521862] ? do_syscall_64+0x26/0x620 [ 768.525860] __x64_sys_write+0x73/0xb0 [ 768.529770] do_syscall_64+0xfd/0x620 [ 768.533602] entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:48:43 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 768.538808] RIP: 0033:0x45af49 [ 768.542019] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.560947] RSP: 002b:00007f2965832c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 768.568676] RAX: ffffffffffffffda RBX: 00007f2965832c90 RCX: 000000000045af49 [ 768.575991] RDX: 0000000000000002 RSI: 0000000020000040 RDI: 0000000000000003 [ 768.583383] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:48:43 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:43 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 768.590778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29658336d4 [ 768.598071] R13: 00000000004cd298 R14: 00000000004e8a00 R15: 0000000000000004 15:48:43 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:43 executing program 0 (fault-call:2 fault-nth:2): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:48:43 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="06100010", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000200)=0x1c) read(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') r4 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000240)={0x7, 0x4, 0x4, 0x100000, 0x9, {}, {0x2, 0x1, 0x7f, 0x5, 0x9, 0x5, "e333d7f4"}, 0x5, 0x2, @userptr=0x5, 0x6ef, 0x0, r4}) sendmsg$NLBL_MGMT_C_PROTOCOLS(r5, &(0x7f0000000180)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r3, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c1}, 0x4000) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) [ 768.700598] FAULT_INJECTION: forcing a failure. [ 768.700598] name failslab, interval 1, probability 0, space 0, times 0 [ 768.723065] CPU: 0 PID: 15624 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 768.730908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.740281] Call Trace: [ 768.742892] dump_stack+0x197/0x210 [ 768.746554] should_fail.cold+0xa/0x1b [ 768.750474] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.755701] ? lock_downgrade+0x880/0x880 [ 768.760317] __should_failslab+0x121/0x190 [ 768.764569] should_failslab+0x9/0x14 [ 768.768381] kmem_cache_alloc_trace+0x2cc/0x760 [ 768.773062] ? kasan_unpoison_shadow+0x35/0x50 [ 768.777655] ? kasan_kmalloc+0xce/0xf0 [ 768.781565] __memcg_init_list_lru_node+0x8a/0x1e0 [ 768.786528] __list_lru_init+0x402/0x720 [ 768.790606] sget_userns+0x81b/0xd30 [ 768.794329] ? ns_test_super+0x50/0x50 [ 768.798255] ? set_bdev_super+0x120/0x120 [ 768.802432] ? set_bdev_super+0x120/0x120 [ 768.806604] ? ns_test_super+0x50/0x50 [ 768.810508] sget+0x10c/0x150 [ 768.814595] mount_bdev+0xff/0x3c0 [ 768.818155] ? msdos_mount+0x40/0x40 [ 768.821889] msdos_mount+0x35/0x40 [ 768.825458] mount_fs+0xa8/0x31f [ 768.828859] vfs_kern_mount.part.0+0x6f/0x410 [ 768.833381] do_mount+0x53e/0x2bc0 [ 768.837080] ? copy_mount_string+0x40/0x40 [ 768.841531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.847169] ? copy_mount_options+0x280/0x3a0 [ 768.851689] ksys_mount+0xdb/0x150 [ 768.855424] __x64_sys_mount+0xbe/0x150 [ 768.859415] do_syscall_64+0xfd/0x620 [ 768.863230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.868429] RIP: 0033:0x45d99a [ 768.871634] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 768.890552] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 768.898279] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 768.905582] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 768.912869] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 768.920501] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 768.927795] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:43 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:53 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x2, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:48:53 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) ioctl$SNDCTL_DSP_POST(r1, 0x5008, 0x0) read(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r2, 0x304, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x30000041) 15:48:53 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:53 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:53 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 778.943601] FAULT_INJECTION: forcing a failure. [ 778.943601] name failslab, interval 1, probability 0, space 0, times 0 [ 778.970024] CPU: 1 PID: 15650 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 778.977949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.987322] Call Trace: [ 778.989934] dump_stack+0x197/0x210 [ 778.993589] should_fail.cold+0xa/0x1b [ 778.997496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.002619] ? lock_downgrade+0x880/0x880 [ 779.006797] __should_failslab+0x121/0x190 [ 779.011045] should_failslab+0x9/0x14 [ 779.014861] kmem_cache_alloc_trace+0x2cc/0x760 [ 779.019543] ? kasan_unpoison_shadow+0x35/0x50 [ 779.024136] ? kasan_kmalloc+0xce/0xf0 [ 779.028056] __memcg_init_list_lru_node+0x8a/0x1e0 [ 779.033018] __list_lru_init+0x402/0x720 [ 779.037111] sget_userns+0x81b/0xd30 [ 779.040850] ? ns_test_super+0x50/0x50 [ 779.044766] ? set_bdev_super+0x120/0x120 [ 779.049109] ? set_bdev_super+0x120/0x120 [ 779.053273] ? ns_test_super+0x50/0x50 [ 779.057177] sget+0x10c/0x150 [ 779.060303] mount_bdev+0xff/0x3c0 [ 779.063882] ? msdos_mount+0x40/0x40 [ 779.067613] msdos_mount+0x35/0x40 [ 779.071168] mount_fs+0xa8/0x31f [ 779.074574] vfs_kern_mount.part.0+0x6f/0x410 [ 779.079101] do_mount+0x53e/0x2bc0 [ 779.082664] ? copy_mount_string+0x40/0x40 [ 779.086921] ? copy_mount_options+0x1f8/0x3a0 [ 779.091432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.096986] ? copy_mount_options+0x280/0x3a0 [ 779.101507] ksys_mount+0xdb/0x150 [ 779.105069] __x64_sys_mount+0xbe/0x150 [ 779.109069] do_syscall_64+0xfd/0x620 [ 779.112905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.118122] RIP: 0033:0x45d99a [ 779.121343] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:48:54 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x68cac6, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000cc0)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e24, 0x9, @mcast1, 0x5}}, 0x4, 0x8}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000440)=@assoc_value={r7, 0xae}, &(0x7f0000000200)=0x8) fstatfs(r1, &(0x7f0000000240)=""/211) r8 = accept4$ax25(r1, &(0x7f0000000140)={{}, [@netrom, @null, @rose, @default, @netrom, @null, @null]}, &(0x7f00000000c0)=0x48, 0x80000) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r10, 0x0, 0x200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r11, 0x8010743f, &(0x7f0000000200)) r12 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r12, 0x0, 0x200) r13 = ioctl$TUNGETDEVNETNS(r12, 0x54e3, 0x0) ioctl$FIDEDUPERANGE(r10, 0xc0189436, &(0x7f0000000480)={0x8001, 0x2, 0x8, 0x0, 0x0, [{{r3}, 0x7}, {{r2}, 0x8}, {{r8}, 0xfff}, {{r5}, 0xdc0}, {{r9}, 0xb796}, {{r11}, 0x2}, {{r2}, 0xff}, {{r13}, 0x80}]}) unlinkat(r9, 0x0, 0x200) accept4$tipc(r9, 0x0, &(0x7f0000000000), 0x400) 15:48:54 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x800) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) dup3(r1, r2, 0x80000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002bbd7000fedbdf25030000001c00040005000300050000000500030002000000050003000300106f"], 0x30}, 0x1, 0x0, 0x0, 0x24fc662c04740f4}, 0x4) io_setup(0x8, &(0x7f0000000000)=0x0) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r5, 0x0}]) io_submit(r4, 0x1, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x6030, r0, &(0x7f00000001c0)="d8fce3d1baf01fe95cef371258ca707046aee16109fee5714a8510d07fc73c59e1cef1265d15172d4aae8ffdaf7b0550beb3d89dd2af5d481c135c07f43b715a4111c6cf344e96265d88a034657d48bf7e8ab1d0383a6adbf7a8b3f01666bcc2b452e1bcd630ca15f914ac492cb8af283d9ca6661eb1fb7e9a8e8c1eaafc2f5d95c8f0bafacbc77689ea8c116094c1ecdd2afd1b1496a8649437ae7d534ded767bb673e63fe4b566de16eeaa7346d55f104a599de496d133c22377c986cde8c3061176e928086296b2c9fb", 0xcb, 0x1f, 0x0, 0x1}]) 15:48:54 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 779.140266] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 779.147991] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 779.155279] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 779.162576] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 779.169869] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 779.177153] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:48:54 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:48:54 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:48:54 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:48:54 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x200000) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400200) read(r0, 0x0, 0xffffffffffffff5c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x9, 0x4, 0x8, {0x4, 0x8}, 0x80, 0x20}) [ 779.605518] FAULT_INJECTION: forcing a failure. [ 779.605518] name failslab, interval 1, probability 0, space 0, times 0 [ 779.644639] CPU: 1 PID: 15676 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 779.652482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.662712] Call Trace: [ 779.665327] dump_stack+0x197/0x210 [ 779.668975] should_fail.cold+0xa/0x1b [ 779.672883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.678126] ? lock_downgrade+0x880/0x880 [ 779.682320] __should_failslab+0x121/0x190 [ 779.686595] should_failslab+0x9/0x14 [ 779.690412] kmem_cache_alloc_trace+0x2cc/0x760 [ 779.695110] __memcg_init_list_lru_node+0x8a/0x1e0 [ 779.700066] __list_lru_init+0x402/0x720 [ 779.704146] sget_userns+0x81b/0xd30 [ 779.707882] ? ns_test_super+0x50/0x50 [ 779.711786] ? set_bdev_super+0x120/0x120 [ 779.715947] ? set_bdev_super+0x120/0x120 [ 779.720108] ? ns_test_super+0x50/0x50 [ 779.724006] sget+0x10c/0x150 [ 779.727128] mount_bdev+0xff/0x3c0 [ 779.730681] ? msdos_mount+0x40/0x40 [ 779.734407] msdos_mount+0x35/0x40 [ 779.737956] mount_fs+0xa8/0x31f [ 779.741345] vfs_kern_mount.part.0+0x6f/0x410 [ 779.745855] do_mount+0x53e/0x2bc0 [ 779.749414] ? copy_mount_string+0x40/0x40 [ 779.753663] ? _copy_from_user+0xdd/0x150 [ 779.757823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.763369] ? copy_mount_options+0x280/0x3a0 [ 779.767878] ksys_mount+0xdb/0x150 [ 779.771430] __x64_sys_mount+0xbe/0x150 [ 779.775419] do_syscall_64+0xfd/0x620 [ 779.779234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.784428] RIP: 0033:0x45d99a [ 779.787629] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 779.806546] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 779.814264] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 779.821542] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 779.828822] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 779.836103] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 779.843498] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:04 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0xfdef) 15:49:04 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:04 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x1014c0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) fcntl$setown(r1, 0x8, r2) 15:49:04 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:04 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:04 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x2, 'r'}, 0x2) 15:49:04 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 789.840495] FAULT_INJECTION: forcing a failure. [ 789.840495] name failslab, interval 1, probability 0, space 0, times 0 [ 789.876681] CPU: 0 PID: 15687 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 15:49:04 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) [ 789.884625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.893990] Call Trace: [ 789.896609] dump_stack+0x197/0x210 [ 789.900271] should_fail.cold+0xa/0x1b [ 789.904201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 789.909331] ? lock_downgrade+0x880/0x880 [ 789.913512] __should_failslab+0x121/0x190 [ 789.917776] should_failslab+0x9/0x14 [ 789.921606] __kmalloc+0x2e2/0x750 [ 789.925166] ? __list_lru_init+0xd5/0x720 [ 789.929339] __list_lru_init+0xd5/0x720 [ 789.933334] sget_userns+0x84a/0xd30 [ 789.937066] ? ns_test_super+0x50/0x50 15:49:04 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x4200c1) read(r0, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) ftruncate(r0, 0xfffffffffffffff9) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001180)='/dev/qat_adf_ctl\x00', 0xa000, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000cc0)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000011c0)={r4, 0xc7}, 0x8) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000040)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r5, 0x0, 0x200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r6, 0x8010743f, &(0x7f0000000200)) read$fb(r6, &(0x7f00000000c0)=""/4096, 0x1000) pipe(&(0x7f0000000080)) ioctl$FICLONE(r0, 0x40049409, r5) 15:49:04 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 789.940974] ? set_bdev_super+0x120/0x120 [ 789.945138] ? set_bdev_super+0x120/0x120 [ 789.949302] ? ns_test_super+0x50/0x50 [ 789.953203] sget+0x10c/0x150 [ 789.956352] mount_bdev+0xff/0x3c0 [ 789.959908] ? msdos_mount+0x40/0x40 [ 789.963647] msdos_mount+0x35/0x40 [ 789.967198] mount_fs+0xa8/0x31f [ 789.970585] vfs_kern_mount.part.0+0x6f/0x410 [ 789.975104] do_mount+0x53e/0x2bc0 [ 789.978668] ? copy_mount_string+0x40/0x40 [ 789.982921] ? _copy_from_user+0xdd/0x150 15:49:04 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 789.987080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.992639] ? copy_mount_options+0x280/0x3a0 [ 789.997157] ksys_mount+0xdb/0x150 [ 790.000724] __x64_sys_mount+0xbe/0x150 [ 790.004717] do_syscall_64+0xfd/0x620 [ 790.008537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.013730] RIP: 0033:0x45d99a [ 790.016929] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:49:04 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 790.035842] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 790.043571] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 790.050857] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 790.058135] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 790.065420] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 790.074782] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:14 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x20000050) 15:49:14 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:14 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:14 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x309240) read(r0, 0x0, 0x0) 15:49:14 executing program 5: read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:14 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0xfdef) [ 800.087319] FAULT_INJECTION: forcing a failure. [ 800.087319] name failslab, interval 1, probability 0, space 0, times 0 15:49:15 executing program 5: read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:15 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 800.130937] CPU: 0 PID: 15715 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 800.138782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 800.148156] Call Trace: [ 800.150768] dump_stack+0x197/0x210 [ 800.154429] should_fail.cold+0xa/0x1b [ 800.158448] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 800.163580] ? lock_downgrade+0x880/0x880 [ 800.167761] __should_failslab+0x121/0x190 [ 800.172023] should_failslab+0x9/0x14 [ 800.175846] kmem_cache_alloc_trace+0x2cc/0x760 [ 800.180549] __memcg_init_list_lru_node+0x8a/0x1e0 [ 800.185503] __list_lru_init+0x402/0x720 [ 800.189591] sget_userns+0x81b/0xd30 [ 800.193326] ? ns_test_super+0x50/0x50 [ 800.197243] ? set_bdev_super+0x120/0x120 [ 800.201410] ? set_bdev_super+0x120/0x120 [ 800.205580] ? ns_test_super+0x50/0x50 [ 800.209576] sget+0x10c/0x150 [ 800.212706] mount_bdev+0xff/0x3c0 [ 800.216278] ? msdos_mount+0x40/0x40 [ 800.220042] msdos_mount+0x35/0x40 [ 800.223602] mount_fs+0xa8/0x31f [ 800.227005] vfs_kern_mount.part.0+0x6f/0x410 15:49:15 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 800.231537] do_mount+0x53e/0x2bc0 [ 800.235103] ? copy_mount_string+0x40/0x40 [ 800.239461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 800.245023] ? copy_mount_options+0x280/0x3a0 [ 800.249579] ksys_mount+0xdb/0x150 [ 800.253143] __x64_sys_mount+0xbe/0x150 [ 800.257141] do_syscall_64+0xfd/0x620 [ 800.260963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 800.266157] RIP: 0033:0x45d99a 15:49:15 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 800.269361] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 800.288457] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 800.296186] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 800.303476] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 800.310760] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 800.318049] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 800.325328] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:15 executing program 5: read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:15 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 800.511381] FAULT_INJECTION: forcing a failure. [ 800.511381] name failslab, interval 1, probability 0, space 0, times 0 [ 800.528995] CPU: 0 PID: 15743 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 800.536845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 800.546237] Call Trace: [ 800.548847] dump_stack+0x197/0x210 [ 800.552494] should_fail.cold+0xa/0x1b [ 800.556402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 800.561521] ? lock_downgrade+0x880/0x880 [ 800.565691] __should_failslab+0x121/0x190 [ 800.569945] should_failslab+0x9/0x14 [ 800.573759] kmem_cache_alloc_trace+0x2cc/0x760 [ 800.578456] ? kasan_unpoison_shadow+0x35/0x50 [ 800.583055] ? kasan_kmalloc+0xce/0xf0 [ 800.587067] __memcg_init_list_lru_node+0x8a/0x1e0 [ 800.592022] __list_lru_init+0x402/0x720 [ 800.596100] sget_userns+0x84a/0xd30 [ 800.599826] ? ns_test_super+0x50/0x50 [ 800.603727] ? set_bdev_super+0x120/0x120 [ 800.607890] ? set_bdev_super+0x120/0x120 [ 800.612045] ? ns_test_super+0x50/0x50 [ 800.615938] sget+0x10c/0x150 [ 800.619055] mount_bdev+0xff/0x3c0 [ 800.622600] ? msdos_mount+0x40/0x40 [ 800.626332] msdos_mount+0x35/0x40 [ 800.629878] mount_fs+0xa8/0x31f [ 800.633268] vfs_kern_mount.part.0+0x6f/0x410 [ 800.637781] do_mount+0x53e/0x2bc0 [ 800.641327] ? retint_kernel+0x2d/0x2d [ 800.645233] ? copy_mount_string+0x40/0x40 [ 800.649484] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 800.655033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 800.660588] ? copy_mount_options+0x280/0x3a0 [ 800.665102] ksys_mount+0xdb/0x150 [ 800.668662] __x64_sys_mount+0xbe/0x150 [ 800.672650] do_syscall_64+0xfd/0x620 [ 800.676462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 800.681656] RIP: 0033:0x45d99a [ 800.684857] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 800.703790] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 800.711503] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 800.718778] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 800.726052] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 800.733328] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 800.740604] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:25 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0xfffffdef) 15:49:25 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:25 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:25 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x60080, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000100)={{0x0, 0x1, 0x9, 0x3, 0x1}, 0x9, 0x8}) read(r0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4000, 0x0) r3 = creat(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x206080, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000300)={0x7, &(0x7f00000002c0)=[{}, {}, {0x0}, {}, {}, {}, {}]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) prctl$PR_SVE_SET_VL(0x32, 0x1027b) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000340)={r4}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000080)={r4}) 15:49:25 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:25 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x20000042) [ 810.956854] FAULT_INJECTION: forcing a failure. [ 810.956854] name failslab, interval 1, probability 0, space 0, times 0 [ 810.979117] CPU: 0 PID: 15753 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 810.986964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.996331] Call Trace: [ 810.998947] dump_stack+0x197/0x210 [ 811.002601] should_fail.cold+0xa/0x1b [ 811.006513] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 811.011642] ? lock_downgrade+0x880/0x880 [ 811.015824] __should_failslab+0x121/0x190 [ 811.020077] should_failslab+0x9/0x14 [ 811.023888] kmem_cache_alloc_trace+0x2cc/0x760 [ 811.028567] ? kasan_unpoison_shadow+0x35/0x50 [ 811.033164] ? kasan_kmalloc+0xce/0xf0 [ 811.037073] __memcg_init_list_lru_node+0x8a/0x1e0 [ 811.042019] __list_lru_init+0x402/0x720 [ 811.046095] sget_userns+0x84a/0xd30 [ 811.049826] ? ns_test_super+0x50/0x50 [ 811.053731] ? set_bdev_super+0x120/0x120 [ 811.057890] ? set_bdev_super+0x120/0x120 [ 811.062046] ? ns_test_super+0x50/0x50 [ 811.065947] sget+0x10c/0x150 [ 811.069069] mount_bdev+0xff/0x3c0 [ 811.072623] ? msdos_mount+0x40/0x40 [ 811.076352] msdos_mount+0x35/0x40 [ 811.079905] mount_fs+0xa8/0x31f [ 811.083292] vfs_kern_mount.part.0+0x6f/0x410 [ 811.087845] do_mount+0x53e/0x2bc0 [ 811.091412] ? copy_mount_string+0x40/0x40 [ 811.095673] ? _copy_from_user+0xdd/0x150 [ 811.099845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.105409] ? copy_mount_options+0x280/0x3a0 [ 811.109936] ksys_mount+0xdb/0x150 [ 811.113497] __x64_sys_mount+0xbe/0x150 [ 811.118360] do_syscall_64+0xfd/0x620 [ 811.122179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.127381] RIP: 0033:0x45d99a [ 811.130583] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 811.149615] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:49:26 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:26 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:26 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x240800) read(r0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) fchmod(r0, 0x22) membarrier(0x23, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) [ 811.157338] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 811.164621] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 811.171921] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 811.179287] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 811.186563] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:26 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:26 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:26 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 811.355804] FAULT_INJECTION: forcing a failure. [ 811.355804] name failslab, interval 1, probability 0, space 0, times 0 [ 811.391311] CPU: 0 PID: 15769 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 811.399173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.408581] Call Trace: [ 811.411198] dump_stack+0x197/0x210 [ 811.414856] should_fail.cold+0xa/0x1b [ 811.418772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 811.423891] ? lock_downgrade+0x880/0x880 [ 811.428061] __should_failslab+0x121/0x190 [ 811.432310] should_failslab+0x9/0x14 [ 811.436118] kmem_cache_alloc_trace+0x2cc/0x760 [ 811.440822] ? kasan_unpoison_shadow+0x35/0x50 [ 811.445419] ? kasan_kmalloc+0xce/0xf0 [ 811.449321] __memcg_init_list_lru_node+0x8a/0x1e0 [ 811.454265] __list_lru_init+0x402/0x720 [ 811.458337] sget_userns+0x84a/0xd30 [ 811.462061] ? ns_test_super+0x50/0x50 [ 811.465963] ? set_bdev_super+0x120/0x120 [ 811.470123] ? set_bdev_super+0x120/0x120 [ 811.474397] ? ns_test_super+0x50/0x50 [ 811.478308] sget+0x10c/0x150 [ 811.481434] mount_bdev+0xff/0x3c0 [ 811.484985] ? msdos_mount+0x40/0x40 [ 811.488724] msdos_mount+0x35/0x40 [ 811.492289] mount_fs+0xa8/0x31f [ 811.495848] vfs_kern_mount.part.0+0x6f/0x410 [ 811.500369] do_mount+0x53e/0x2bc0 [ 811.503933] ? copy_mount_string+0x40/0x40 [ 811.508187] ? _copy_from_user+0xdd/0x150 [ 811.512349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.517899] ? copy_mount_options+0x280/0x3a0 [ 811.522412] ksys_mount+0xdb/0x150 [ 811.525984] __x64_sys_mount+0xbe/0x150 [ 811.529980] do_syscall_64+0xfd/0x620 [ 811.533796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.539254] RIP: 0033:0x45d99a [ 811.542455] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 811.561361] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 811.569084] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 811.576360] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 811.583637] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 811.590912] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 811.598186] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:36 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0xfffffffffffffdef) 15:49:36 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0xfffffffffffffd77) 15:49:36 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:36 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:36 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:36 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0xfffffdef) [ 821.193234] FAULT_INJECTION: forcing a failure. [ 821.193234] name failslab, interval 1, probability 0, space 0, times 0 [ 821.221845] CPU: 0 PID: 15782 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 821.229947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.239315] Call Trace: 15:49:36 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 821.241923] dump_stack+0x197/0x210 [ 821.245595] should_fail.cold+0xa/0x1b [ 821.249510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 821.254634] ? lock_downgrade+0x880/0x880 [ 821.258813] __should_failslab+0x121/0x190 [ 821.263070] should_failslab+0x9/0x14 [ 821.266901] kmem_cache_alloc_trace+0x2cc/0x760 [ 821.271643] ? kasan_unpoison_shadow+0x35/0x50 [ 821.276247] ? kasan_kmalloc+0xce/0xf0 [ 821.280163] __memcg_init_list_lru_node+0x8a/0x1e0 [ 821.285119] __list_lru_init+0x402/0x720 [ 821.289205] sget_userns+0x84a/0xd30 [ 821.292941] ? ns_test_super+0x50/0x50 [ 821.296851] ? set_bdev_super+0x120/0x120 [ 821.301016] ? set_bdev_super+0x120/0x120 [ 821.305185] ? ns_test_super+0x50/0x50 [ 821.309084] sget+0x10c/0x150 [ 821.312206] mount_bdev+0xff/0x3c0 [ 821.315757] ? msdos_mount+0x40/0x40 [ 821.319490] msdos_mount+0x35/0x40 [ 821.323042] mount_fs+0xa8/0x31f [ 821.326431] vfs_kern_mount.part.0+0x6f/0x410 [ 821.330949] do_mount+0x53e/0x2bc0 [ 821.334517] ? copy_mount_string+0x40/0x40 [ 821.338769] ? _copy_from_user+0xdd/0x150 15:49:36 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 821.342937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.348492] ? copy_mount_options+0x280/0x3a0 [ 821.353016] ksys_mount+0xdb/0x150 [ 821.356589] __x64_sys_mount+0xbe/0x150 [ 821.360587] do_syscall_64+0xfd/0x620 [ 821.364405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.369606] RIP: 0033:0x45d99a [ 821.372816] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:49:36 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0xfffffffffffffdef) [ 821.391732] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 821.399458] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 821.406738] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 821.414028] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 821.421315] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 821.428594] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:36 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:36 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:36 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 821.600066] FAULT_INJECTION: forcing a failure. [ 821.600066] name failslab, interval 1, probability 0, space 0, times 0 [ 821.629064] CPU: 0 PID: 15806 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 821.636903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.646268] Call Trace: [ 821.648875] dump_stack+0x197/0x210 [ 821.652534] should_fail.cold+0xa/0x1b [ 821.656457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 821.661601] ? lock_downgrade+0x880/0x880 [ 821.665790] __should_failslab+0x121/0x190 [ 821.670044] should_failslab+0x9/0x14 [ 821.673860] kmem_cache_alloc_trace+0x2cc/0x760 [ 821.678545] ? kasan_unpoison_shadow+0x35/0x50 [ 821.683143] ? kasan_kmalloc+0xce/0xf0 [ 821.687084] __memcg_init_list_lru_node+0x8a/0x1e0 [ 821.692049] __list_lru_init+0x402/0x720 [ 821.696137] sget_userns+0x84a/0xd30 [ 821.700303] ? ns_test_super+0x50/0x50 [ 821.704320] ? set_bdev_super+0x120/0x120 [ 821.708484] ? set_bdev_super+0x120/0x120 [ 821.712644] ? ns_test_super+0x50/0x50 [ 821.716540] sget+0x10c/0x150 [ 821.719669] mount_bdev+0xff/0x3c0 [ 821.723238] ? msdos_mount+0x40/0x40 [ 821.726983] msdos_mount+0x35/0x40 [ 821.730538] mount_fs+0xa8/0x31f [ 821.733946] vfs_kern_mount.part.0+0x6f/0x410 [ 821.738464] do_mount+0x53e/0x2bc0 [ 821.742082] ? copy_mount_string+0x40/0x40 [ 821.746332] ? _copy_from_user+0xdd/0x150 [ 821.750506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.756056] ? copy_mount_options+0x280/0x3a0 [ 821.760582] ksys_mount+0xdb/0x150 [ 821.764149] __x64_sys_mount+0xbe/0x150 [ 821.768143] do_syscall_64+0xfd/0x620 [ 821.771963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.777158] RIP: 0033:0x45d99a [ 821.780365] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 821.799275] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 821.807025] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 821.814308] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 821.821591] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 821.828872] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 821.836149] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:46 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0xc0902) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) connect$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x17, 0xff, 0x30, 0x9, 0x1}, 0x10) write$vhci(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="047278e80600f2e3ff023e35998a75cb258c8650c2a47ce7975545a8f0a96322fb62694e5df891c4aeb95260bac4fdedf19ce712215119b87241e27566818f04490f86359c8c2d0625e20463b5e2c4e7f12e3f849adea28be2ee21cce176dac3e12d028c6b610ce90ffe5e94c7ebbca3d7373a89005281f8427021b3326a649f212783117a970605daf392950fe475ba719b46a6b207b54e3fdeebcab01a3a9759488bc6e432a5e790a33062f0d69cdc42b8189dd09ad6be66c78d586c9cdebcb4a2982ca58d12146b859241"], 0x3) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0x1ff, 0x9e, 0x9, 0x0, 0x10, "bd47d45e89d1e60b"}) 15:49:46 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:46 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:46 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:46 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(0xffffffffffffffff, 0x0, 0xfffffffffffffd42) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000200)) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0x80) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x14842, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x1c0000, r1}) 15:49:46 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xc6c5b8d32349ba22, 0x0) mq_timedsend(r1, &(0x7f0000000140)="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", 0x1000, 0x6, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x7, &(0x7f00000000c0)=0x5, 0x4) [ 832.079600] FAULT_INJECTION: forcing a failure. [ 832.079600] name failslab, interval 1, probability 0, space 0, times 0 [ 832.097427] CPU: 0 PID: 15812 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 832.105264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.114627] Call Trace: [ 832.117239] dump_stack+0x197/0x210 [ 832.120895] should_fail.cold+0xa/0x1b [ 832.124804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.129919] ? lock_downgrade+0x880/0x880 [ 832.134091] __should_failslab+0x121/0x190 [ 832.138346] should_failslab+0x9/0x14 [ 832.142166] kmem_cache_alloc_trace+0x2cc/0x760 [ 832.146859] ? kasan_unpoison_shadow+0x35/0x50 [ 832.151459] ? kasan_kmalloc+0xce/0xf0 [ 832.155502] __memcg_init_list_lru_node+0x8a/0x1e0 [ 832.160465] __list_lru_init+0x402/0x720 [ 832.164549] sget_userns+0x84a/0xd30 [ 832.168288] ? ns_test_super+0x50/0x50 [ 832.172192] ? set_bdev_super+0x120/0x120 [ 832.176354] ? set_bdev_super+0x120/0x120 [ 832.180516] ? ns_test_super+0x50/0x50 [ 832.184412] sget+0x10c/0x150 [ 832.187532] mount_bdev+0xff/0x3c0 [ 832.191081] ? msdos_mount+0x40/0x40 [ 832.194811] msdos_mount+0x35/0x40 [ 832.198366] mount_fs+0xa8/0x31f [ 832.201757] vfs_kern_mount.part.0+0x6f/0x410 [ 832.206277] do_mount+0x53e/0x2bc0 [ 832.209834] ? copy_mount_string+0x40/0x40 [ 832.214090] ? copy_mount_options+0x1f8/0x3a0 [ 832.218592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.224136] ? copy_mount_options+0x280/0x3a0 [ 832.228649] ksys_mount+0xdb/0x150 [ 832.232202] __x64_sys_mount+0xbe/0x150 [ 832.236187] do_syscall_64+0xfd/0x620 [ 832.240000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.245195] RIP: 0033:0x45d99a [ 832.248398] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 832.267306] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:49:47 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:47 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) clock_gettime(0x2, &(0x7f0000000080)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x400}, 0x16, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000040)=0x1) read(r0, 0x0, 0x0) [ 832.275040] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 832.282417] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 832.289690] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 832.296970] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 832.304263] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:47 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:47 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 832.418576] Unknown ioctl 1074026289 [ 832.424426] Unknown ioctl 1074026289 [ 832.435824] FAULT_INJECTION: forcing a failure. [ 832.435824] name failslab, interval 1, probability 0, space 0, times 0 [ 832.459719] CPU: 1 PID: 15839 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 832.467558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.476930] Call Trace: [ 832.479550] dump_stack+0x197/0x210 [ 832.483213] should_fail.cold+0xa/0x1b [ 832.487122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.492249] ? lock_downgrade+0x880/0x880 [ 832.496425] __should_failslab+0x121/0x190 [ 832.500680] should_failslab+0x9/0x14 [ 832.504502] kmem_cache_alloc_trace+0x2cc/0x760 [ 832.509185] ? kasan_unpoison_shadow+0x35/0x50 [ 832.513779] ? kasan_kmalloc+0xce/0xf0 [ 832.517685] __memcg_init_list_lru_node+0x8a/0x1e0 [ 832.522642] __list_lru_init+0x402/0x720 [ 832.526730] sget_userns+0x84a/0xd30 [ 832.530456] ? ns_test_super+0x50/0x50 [ 832.534356] ? set_bdev_super+0x120/0x120 [ 832.538522] ? set_bdev_super+0x120/0x120 [ 832.542680] ? ns_test_super+0x50/0x50 [ 832.546582] sget+0x10c/0x150 [ 832.549701] mount_bdev+0xff/0x3c0 [ 832.553253] ? msdos_mount+0x40/0x40 [ 832.558026] msdos_mount+0x35/0x40 [ 832.561586] mount_fs+0xa8/0x31f [ 832.564973] vfs_kern_mount.part.0+0x6f/0x410 [ 832.569494] do_mount+0x53e/0x2bc0 [ 832.573056] ? copy_mount_string+0x40/0x40 [ 832.577303] ? copy_mount_options+0x1d9/0x3a0 [ 832.581811] ? copy_mount_options+0x1e5/0x3a0 [ 832.586319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.591870] ? copy_mount_options+0x280/0x3a0 [ 832.596383] ksys_mount+0xdb/0x150 [ 832.599945] __x64_sys_mount+0xbe/0x150 [ 832.603934] do_syscall_64+0xfd/0x620 [ 832.607796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.612993] RIP: 0033:0x45d99a 15:49:47 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000400)='/dev/media#\x00', 0xff, 0x100) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000440)={{0xa, 0x4e23, 0x64, @mcast2, 0x8000}, {0xa, 0x4e21, 0x5, @ipv4={[], [], @loopback}, 0x7f}, 0x3, [0x0, 0x1f, 0x1000, 0x7, 0x4, 0x8085, 0x7fffffff]}, 0x5c) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r1, 0x0, 0x0) [ 832.616194] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 832.635102] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 832.642818] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 832.650094] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 832.657375] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 15:49:47 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 832.664656] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 832.671936] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:57 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000200)=@HCI_EVENT_PKT={0x4, "6b72d22bf00fcc799b1e4e3967de6abcdb5e1d43cf6f023d8f6b20b4fd208f42be9e47d0cf35f2f7ad22dd80153faa5c93a3bceaed15d4d80b8aa3ca6418dd036cba20b7bc7fa17e43c83cf913c6749c6fd94f7c325c9e3f168e5bf48df577c51d418fca3a54b61750a22e0be6304d7089c999889555a974e37e1dd2a5e1799fe4a9d268f4395f041991097acc12ea3d875928a52c26fb9858ab1b5a0380f65a9fd5f609bfa79875b8b6606d54dcbeef6ca46049b77589052899ce8e171df6803affda0684f828d93505"}, 0xe4) 15:49:57 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000080)={0x2, 0x1800000}) read(r0, 0x0, 0xfffffffffffffe94) 15:49:57 executing program 4 (fault-call:0 fault-nth:83): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:49:57 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:57 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:49:57 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) write$vhci(r3, &(0x7f0000000140)=@HCI_EVENT_PKT={0x4, "3acdccff3de00f2bb14ad406ee60b0"}, 0x10) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x40, 0x0) r5 = getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r7, 0x0, 0x200) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000400)=0x0) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r10}, 0x2c, {'group_id', 0x3d, r11}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c40)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002d40)=0xe8) r13 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r13, 0x0, 0x482, 0x0, 0xffffff5c) r14 = getpid() sched_setscheduler(r14, 0x5, &(0x7f0000000380)) r15 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r15, 0x8914, &(0x7f0000000040)) r16 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r16, 0x8914, &(0x7f0000000040)) r17 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r17, 0x0, 0x482, 0x0, 0xffffff5c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r18, 0x8010743f, &(0x7f0000000200)) r19 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r19, 0x0, 0x200) sendmsg$netlink(r4, &(0x7f0000006900)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8400}, 0xc, &(0x7f0000006800)=[{&(0x7f0000006940)={0x1708, 0x18, 0x300, 0x70bd2a, 0x25dfdbfb, "", [@nested={0xea, 0x4d, 0x0, 0x1, [@generic="43a79e647f4e8899b09955a46d073e9ce01a215dd083af2c390482638c2d3fae5a74a0ff8d76e4f6d932d2dc6c2261eda7322292b83739cf06ac1a254926027e69d950d97ca1d78b8ee9b60e894c9bca59075befe6db77643cfc277e9b783026a73849670e629e7b83724f30eb877a1dc5f639a810537e43f81e85bca98594f89fbbf21325cb9b2384b0c20fb12ce0947172f951fee49a621586a821ac67147dfcd6f0614be7bdcd459e6ca870568c6106bc729eddb1994aabf2c0b183210ecdda06ce3319a1086cdb79a0d9652efc153314459c5ecf9f13deef", @typed={0x4, 0xb}, @typed={0x8, 0x61, 0x0, 0x0, @pid=r5}]}, @typed={0x8, 0x18, 0x0, 0x0, @pid=r6}, @nested={0x12e0, 0x20, 0x0, 0x1, [@generic="ce9699b25e95223aeedbfea2e66b74e359857907781c9553bd2d524c57586ee0034fc12cbaa9caf9082c80161bf1198c0da9cfc931ac1a6385853cb9c71cfef4efa7636af74c5e315e684dda834f5e739f3b88879d5c91cc0453e279391554b8e9f8bd952a76bfbf415c97a68b73d42495270081ae4160d327696a4334894681c915a27e192f4a567c15e5553bf91827c42f32ea376ad6f9ec7e71c412c656c2f096c5d084bc0ac5ead325675797493fa1814dd99143b05b25cfb1dcb7508455be07dbc08b3e8f7d2aa61cde1f0775211b6585ef4ac55a38555a2fadc9273017ff810c87a21f67efc97e02d88b61ad1623f16ba4c74cb2fdfb", @generic="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", @generic="a867032cbe3496b6f6e9bf5d347eb4648747be428565da65957b0bb2f6d3132112f50ab87f58d85714fba7a559ba34c6bddb16b18fc4c8add02cdadcc79b42de49a686cb214495439c6946a8a1c3aa507f076c739f21d15d7a9375c9c0e81cd83721ed75dfa527dec9584fd242987b35703f1267a4ba02b735cf449d687f5f196b11f504359d1c7e3056129b56ec4ad56e231f76c975ffd2845d7dc3c1c940fd940c2ab4e8f8b45eae6ac084365e85e82b481ac747546e55bd3a454c138365c3bd175a639c8117221f750cdbfc14fb0b8533a41c410d132707c5f7", @typed={0x8, 0x2e, 0x0, 0x0, @u32=0xfff}, @typed={0xec, 0x1b, 0x0, 0x0, @binary="5ad8ff02bca7e74b3131ae6c6e445cb36beff1d7beec2648ad5d34d1441e0a4189cb42518bb4da74641a6ffeafb259eaef1e5df3926f584a67c46d447b5fcfc16bda8d2bcad8464e4b2f1a4b9c14ad93504d719bbe9c9995d889e2788fe7d0a29a49bb321b3187e655d3aa2ba732c2412c463a0a876173631a3d1cb79ebf8eefae3d840d75d3f1a3cc07ee7d3beaf14771e87d6f5651d33a988b4b7d3fb784b9681383dcb29a442392cc48a8d978284408d5a4aedb0bee8fe20694f6d4e71a3c6d9c20a4a06bc3b2b4ebd236eadd66ee4910c95b8294d500a8c3ecd0c5e104597fe7f2f0cf8035b5"}, @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@local}]}, @generic, @generic="c0de79af95c48e68e07ca75a3d5918b49684e6b8dc41606f2e4b43e960319b7834fe9137093fd328dbe0ed8c466ecebece0609525ff6026afb9cc774e4ea6ccea9559bf080284576727ffdb4f0b2d97944b264fa3f48b9f4a3a572f2d44320450d8b947767039cc196be792e85d190ffcec86f97a3794529da3984913caecef4231a4e2b99577d1c9a96f40eb2ba359408f7b9d333ae08545bcbb62b0b16cc233884bf4da0f75906bad0e1c1db20cb6209d62e2d31a1b09631ee1a05530b9e0ec8bdc187122ddc04c1acbbd59d3f6a0eb0349bd911aad51a58a5d5ed20adab8cb2902974eda5ca05dd61094ff63717f4d6d33cc6", @nested={0x227, 0x7c, 0x0, 0x1, [@generic="5b9f", @generic="24a8ee4de7e2d184291b49f92a1f6461dadddf56af35eafc17789f64c719e9a975f39bc40bb0626608d53d777449f99cbc3de3f06ae9f415940c662663ec381b0227dabedd60f2771febd62f8e44fd12df4cd1c682abe5b684d80db278466f0ce28b79eaa20f13b64e87ae1036e449809db0b0f9f567039839c65a5b422054247118dd6099d8e836ea279dec5116adbd83e3be4289de1153de7425102233c2911981f9386ea768cbd89e671995d3435ce735d0e3e9325fc9917ebb151d3cf25fb418f683415c964c", @generic="e549d24422fa76471920794b7a638ceda793bdaa6fcbb476dd09d6e1bfdf671e940921e77a47273e55515ba0c0d4b0a02a77b286d60a6035", @typed={0x8, 0x1c, 0x0, 0x0, @u32=0x8000}, @typed={0x5, 0x36, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x6, 0x0, 0x0, @ipv6=@rand_addr="9b7e7f769c5fb1db76446b6155246a64"}, @generic="db013f54992cea9f1c2e7cd4df9c26c3db03dba4ff95df970e07f392d66eb5b1422a0523109c8da3365fff4b4d42faa736e6f874e8eaffe30ec81c53c071d88cdae3f44906088528614b73b31a7482d8fc604ccd2056f64742ec062de6c95a31c186930105b8ee69c2872d01dad2769ddde1993c0ff9e474a5294baa5f84f766a26360e49a217e89dd8dd395d8fa42d1bdc5edd2fa968a5b0097fede7a7792e2b01487fe359820f59f4c90dd1dd409d2a8bf02ecd5ac8b5618c96f8772a12ef825321c7ce19f12aa01a6dfb778baf766108fd5bb6f302e8e94c1d6f06f93b84ca29db354f70874391ab5a8d179fba8ea70fed340760f92744057988924"]}, @typed={0x8, 0x5, 0x0, 0x0, @pid=r8}]}, 0x1708}, {&(0x7f0000001a80)={0x11b8, 0x31, 0xaa0192f190ed025e, 0x70bd27, 0x25dfdbff, "", [@typed={0x8, 0x46, 0x0, 0x0, @uid=r10}, @nested={0x1010, 0x43, 0x0, 0x1, [@typed={0x1004, 0x13, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x6d, 0x0, 0x0, @ipv4=@local}]}, @generic="3d96e3f94fc47e57ec5552393aba1995678c4b9b4b68099b4d99ccb089adfd95a98b46beff17cfe4621787911eb838f3d6c792974064b6b319667fdb607090c2a7764e6a903fb068d0bf579f09fab03f5c0ff29d244b87e8cc71736f71642681407f0ade5654fb734e605fabbf56fad469bee3f97d9b26e659c40326e009a6a2b77fcdb53a11d8234f91cc81d5d3307b8029257ef5c313b2dd974faf1d70572e41716b490cdc1d10ecb63e9b7e636acc2365852583b8d8bc70303ad4", @generic="1ccf305718a4f3ada188d186c834426dd74b4dba0c785b681a524fdb5358986dfd1dc506fe37d2f92e7d64d659039c9edf962d771162e69ac7b9d144d9db3cb557e22d5965ead464c6eda1584a5e1b026f743a41f2905e135da65615d3e7c05c9d1487403d7b2617a09820ed5e5e2f7a85b75901f5e8ac755ca4c81ddc7b88486298e7ca187ddee07e8c62b8de957884e4ffdee440fd827c8fef80d8c6483d9f41402257533573fcdc5d29906ba8c8cb4944571aaa40ed90bfd893908b7a62817c", @typed={0x8, 0x15, 0x0, 0x0, @u32=0x81}, @typed={0x8, 0x70, 0x0, 0x0, @fd=r1}]}, 0x11b8}, {&(0x7f0000002d80)={0x24f8, 0x25, 0xf10d987967877131, 0x70bd27, 0x25dfdbfb, "", [@generic="fce30633a820d8ce2f0e7de8595ed7c479d7d70b34e113148cbc0905479d4284bbcd0130a423cfe73b0cf3f1d17890b87d5a0253142bfcba1d7b39df4c595bf0d3bf81c725a60a99a78dfad85adb9351df3015ab69fa0b64da937f6bbeb73953c82fb3c172a11665fc5a6b7e13a941d492aec28ca20fa485d0d13043be0d172c3b04229e57a9aa9e88c4787343f783f751574ae7c034c27ae3d7", @generic="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", @typed={0x8, 0x13, 0x0, 0x0, @uid=r12}, @generic="252d51f33507134c9cf1e2dc3f37f2d8b53e38ceec86f3b1e0b08de519ef1d3ca906341ab6d5bf3357f47873beb8ca2292574d22bef4c0e49e5bb322892d63b18abc640670bb5b3e2bed4df6194c63940eefe88cd7bada953535b06a8b6074678000db7a38cb5d1a0aed204b1863a3e1d6db14983fd16fb83126669b7c1d7af97b240464c6133061ed09902a1f010c414ccd9646a6ce12fb0137efd1f265a12b1d1bad4088a8bc88b620a655f9b141a34c4b933a48a019a96bea53aeb297b242c806596a69f0f61cd7f6fac30d07d341dae9b93438cf7f6862e7e7ed071d7f7cabd7e51c7f8a", @generic="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", @nested={0x360, 0x23, 0x0, 0x1, [@generic="25c5312ac192e3ff870702df6d72a3f4cd0502b440a7ff9f56bdbbea5814dd996f6fa070ad85476e6ff8953079e382d5633f6271a1a138", @generic="b486dc1742b952960bdac0f96570a9bf710f1b8a6cd49a54dbdf72861ec74351c7e9358c092873fef4dca1daddc67ce6c65ba067689fd5ebd2c71e66f6c4e0960f844c8cddb3ff50e57b69bf8c9ef542f79e7fd02c9af69c33e5e417df7223e489a5656920bf95ab41abf4de4c9cdae189f981268bb25cba656035683e13eff81d53b2e81fa15c8d8ce5d9b135fe2a25bb7db6f7df052f33d1b18c1032e9a35f7250fed2359223869ee37378ee702cec3a4df195f5c934cd61308c74e93dba5bc4219d", @typed={0xc, 0x5e, 0x0, 0x0, @u64=0xfffffffffffffff7}, @generic="5a18172e38993ccc0868d15c29767ed2b41cb69ad7f392a8b8f4d69422aaa89f29d65606e1888c83717aa4132aba14f981f683e54324b714dece48415ef02e374b38d5ad6d0873c6fbdc4cdd85def831acb271e2b9d705ba47146273851f6f05cf538a2542769afd66e5d5a860633afe717e883ccc5575f0a9cfb057a866f68cc0a263512d4f78ccd3956a7dc75c3243ec6841b2881073c71b2abb985038d331e19e862813e2cf", @generic="30e0b8a3c137f89514d427f08883df65a5a625517be496fb969fe71d03d2c36e5325615b7f61519a682aba44d57b56eaf48dc702bfa5224b00f8310a4a60fd81c2512f83a29c7dcb1c9a2fc3c5517b0bec6cda073173e3a00548059b4458fe8a2b80f3274566d42064be91b5243fdaa08b8e3249ed7fbc24b22f9dc1bf99c9c98e60716aa003aeb618a387d93899188eb6e93266785ab9986d12518842b6f4a68daae0dc2753fc7d63963f5008facdfebbb95028d3c536af66b289b9775b7803feba8863b9df7570c438aa8ae509f6fc164e8be3389e3ed3ef29dd05a945b45d568c6eeb1f4822cc7c234b92bf228c45a585073431cd98c847", @generic="d8b718e313f12459604630d67b2802f1a94cd27854d14820439722cb5d323b1eb46819efeaf23202057a347b77ff5f73bbf915bb0cd3f68df575fe857f4c419ab7f85fdf9059f7e8c2555163f7f4d77da72542877a4477ba35fe57e32b51036ed6b449985f9e54faa88d016f86dffa3b9a6f7eba08e278d32c7499a5d2f1cec49ec79e4cf18a6167dc10065b0826a88c31ec86041680f66634d4d010e6a4187016f2f4dcb053", @typed={0xe, 0x2a, 0x0, 0x0, @str='/dev/vhci\x00'}]}]}, 0x24f8}, {&(0x7f0000005280)={0x1c, 0x2d, 0x100, 0x70bd2b, 0x25dfdbff, "", [@nested={0xc, 0x4c, 0x0, 0x1, [@typed={0x8, 0x4c, 0x0, 0x0, @fd=r13}]}]}, 0x1c}, {&(0x7f00000052c0)={0x1144, 0x19, 0x4, 0x70bd27, 0x25dfdbfd, "", [@nested={0x1076, 0x4b, 0x0, 0x1, [@generic="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", @typed={0x8, 0x74, 0x0, 0x0, @pid=r14}, @generic="b3f558dab9e6a86b32cf3aaaa24f23482d95dbfdb6488f546a6257b5fac81bec64685eeeef80599f9f2d37357770ffe4af8f77f937ed0afb1c5c47f607656726e20440ed63840ddb47f520", @generic="6b9c8f9821b32b7776f7d8409b55d14bc28601e620f8bc875d7e0faa0c64cc"]}, @typed={0x8, 0x69, 0x0, 0x0, @fd=r15}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @typed={0x9d, 0x67, 0x0, 0x0, @binary="4d78b02927e540b8fce351f8c0b77165e8011bb1831bd2720bb00ecbf12a7b8fd992b3174a4d15452fac4482c3c9e3f0ed73a9f1e81701dc9f45edaa29d2e5613f9c531e83ddc27dcc73ba21b80107fa33288ed4145417234ca1f97caf6425ca4f12d13df8f74dec90885272b43213f75a8c393f90bcec1fded29897fddc96185fd8b4051c4e667232431104017daff135f1f6b175afd57b34"}, @typed={0x8, 0x11, 0x0, 0x0, @u32=0x7}]}, 0x1144}, {&(0x7f0000006440)={0x3c0, 0x38, 0x100, 0x70bd25, 0x25dfdbfb, "", [@typed={0xd1, 0x3f, 0x0, 0x0, @binary="71e19ccc18adaebc517c6853d80096382eaeee5848cba414f1559be867e4e60f84cd366d1ed922e8d1a2b1b642b373c289027b742798d27d8900b352d1cfa68520e80ee168810464869b9a9985fdf3b0a6ef6f8c4d622196c2ded87bb5e45b70e3da2666c7dd2ee0cdce92786c20cd1076b07661bb1eb52c2d34c68c6d16347c1a29b5754188f6554b9ea01dfded50b9782d1483cb3413cb541074de35fc55f27a2b956e3a167289df77fe8a9ab94cc029b682041890d5acf3df85188d48dcaa9024952bd894f6fba03bf06fc7"}, @typed={0x8, 0x16, 0x0, 0x0, @fd=r2}, @nested={0x21d, 0x85, 0x0, 0x1, [@generic="67ec69efebcaa48c0b7994528ed15ed8b9952ff2a0ba7694ab850aa6dc11bd51817019c39da8c5bf042b10e4e29e155f48fa78f059c33ec17e5a6d69b0bca2760ff219001d66d080260413b852936462f05bb84a236d46e43531088902228ec64668d301557fdcf15d3b5eb8bd62354ac8c0e684c2f1b98a0512f60d9ad557da71d412c048d18412d8e54c711be51ead47837e1b66d3460fb5dbaddf25ce14051d405b625be2b1599281b70cbd04881f189ed4d44a9f1f33d90004f5cf9f4e71e913a03f8f71c41b7e983652c267ecfe44ab35d72b92214a053bff7fd841c4b4e167608753a1629e93", @generic="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", @generic="4565aedbe95e818a3cc8e2eb95e8014d9dc63410e80f3d464da5a931be4bd465f1e01dfd3d6161ea7d235dc3b1d854b9d26df7"]}, @generic="e023394cd09656f601337913374fd61384eb81afa151c278c49536b32b3e9f79a2a0e0d3b222edb94ed60ae8897b8790bf8d2d43d92f17371c0cae28cec81035196e97fc9415887520d5043ffe8aac1b914c2f33faa260063775eb4ec5d7775d62e29bb4b1fe7078367082305af14958b1dcb8de9c84b4084bf94c2eda817545c7361762477909828634182dd95430efdebe3010eabb67d0213ee64c7fa3b6c34d2ea96ebbafc6b5", @typed={0x8, 0x7, 0x0, 0x0, @ipv4=@empty}, @typed={0x4, 0x44}]}, 0x3c0}], 0x6, &(0x7f0000006880)=[@rights={{0x1c, 0x1, 0x1, [r2, r0, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r3, r16, r17, r3, r18, r2, r3, r19]}}], 0x68, 0x1}, 0x1) 15:49:57 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{0xdd}, 0x2, 0x6, 0x8, {0x39, 0x80}, 0xf9, 0xfffffffe}) [ 842.960687] FAULT_INJECTION: forcing a failure. [ 842.960687] name failslab, interval 1, probability 0, space 0, times 0 [ 843.013530] CPU: 0 PID: 15855 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 843.021373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.030737] Call Trace: [ 843.033349] dump_stack+0x197/0x210 [ 843.037012] should_fail.cold+0xa/0x1b [ 843.040925] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 843.046049] ? lock_downgrade+0x880/0x880 [ 843.050230] __should_failslab+0x121/0x190 [ 843.054490] should_failslab+0x9/0x14 [ 843.058309] kmem_cache_alloc_trace+0x2cc/0x760 [ 843.063004] ? kasan_unpoison_shadow+0x35/0x50 [ 843.067605] ? kasan_kmalloc+0xce/0xf0 [ 843.071514] __memcg_init_list_lru_node+0x8a/0x1e0 [ 843.076488] __list_lru_init+0x402/0x720 [ 843.080569] sget_userns+0x84a/0xd30 [ 843.084298] ? ns_test_super+0x50/0x50 [ 843.088205] ? set_bdev_super+0x120/0x120 [ 843.092378] ? set_bdev_super+0x120/0x120 [ 843.096544] ? ns_test_super+0x50/0x50 [ 843.100446] sget+0x10c/0x150 [ 843.103566] mount_bdev+0xff/0x3c0 [ 843.107120] ? msdos_mount+0x40/0x40 [ 843.110851] msdos_mount+0x35/0x40 [ 843.114405] mount_fs+0xa8/0x31f [ 843.117795] vfs_kern_mount.part.0+0x6f/0x410 [ 843.122315] do_mount+0x53e/0x2bc0 [ 843.125871] ? retint_kernel+0x2d/0x2d [ 843.129782] ? copy_mount_string+0x40/0x40 [ 843.134042] ? copy_mount_options+0x208/0x3a0 [ 843.138557] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 843.143418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.148971] ? copy_mount_options+0x280/0x3a0 [ 843.153492] ksys_mount+0xdb/0x150 [ 843.157054] __x64_sys_mount+0xbe/0x150 [ 843.161048] do_syscall_64+0xfd/0x620 [ 843.164864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.170061] RIP: 0033:0x45d99a [ 843.173268] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 843.192443] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 843.200267] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a 15:49:58 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:49:58 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffff, 0x4000) syz_open_pts(0xffffffffffffffff, 0x80000) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) fdatasync(r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x2, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) r4 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r4, 0x5, 0x3ff, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0, 0x4001}, {r4, 0x24c}, {r2, 0x2000}, {0xffffffffffffffff, 0x80ec}, {r3, 0x12448}], 0x5, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={0x1}, 0x8) 15:49:58 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:49:58 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 843.207564] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 843.214855] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 843.222144] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 843.229449] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:49:58 executing program 4 (fault-call:0 fault-nth:84): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 843.357121] FAULT_INJECTION: forcing a failure. [ 843.357121] name failslab, interval 1, probability 0, space 0, times 0 [ 843.380810] CPU: 0 PID: 15888 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 843.388668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.398042] Call Trace: [ 843.400661] dump_stack+0x197/0x210 [ 843.404313] should_fail.cold+0xa/0x1b [ 843.408222] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 843.413344] ? lock_downgrade+0x880/0x880 [ 843.417528] __should_failslab+0x121/0x190 [ 843.421780] should_failslab+0x9/0x14 [ 843.425592] kmem_cache_alloc_trace+0x2cc/0x760 [ 843.430275] ? kasan_unpoison_shadow+0x35/0x50 [ 843.434867] ? kasan_kmalloc+0xce/0xf0 [ 843.438773] __memcg_init_list_lru_node+0x8a/0x1e0 [ 843.443849] __list_lru_init+0x402/0x720 [ 843.447930] sget_userns+0x84a/0xd30 [ 843.451676] ? ns_test_super+0x50/0x50 [ 843.455600] ? set_bdev_super+0x120/0x120 [ 843.459773] ? set_bdev_super+0x120/0x120 [ 843.463934] ? ns_test_super+0x50/0x50 [ 843.467852] sget+0x10c/0x150 [ 843.470971] mount_bdev+0xff/0x3c0 [ 843.474522] ? msdos_mount+0x40/0x40 [ 843.478251] msdos_mount+0x35/0x40 [ 843.481801] mount_fs+0xa8/0x31f [ 843.485190] vfs_kern_mount.part.0+0x6f/0x410 [ 843.489703] do_mount+0x53e/0x2bc0 [ 843.493259] ? copy_mount_string+0x40/0x40 [ 843.498042] ? _copy_from_user+0xdd/0x150 [ 843.502333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.507898] ? copy_mount_options+0x280/0x3a0 [ 843.512419] ksys_mount+0xdb/0x150 [ 843.515984] __x64_sys_mount+0xbe/0x150 [ 843.519984] do_syscall_64+0xfd/0x620 [ 843.523803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.529002] RIP: 0033:0x45d99a [ 843.532205] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 843.551113] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 843.558829] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 843.566106] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 843.573383] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 843.580658] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 843.587929] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) ioprio_get$uid(0x3, r1) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r4 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r4, 0x5, 0x3ff, 0x0, 0x0) dup2(r4, 0xffffffffffffffff) write$vhci(r3, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="3a54468a4450d9197560fd6f9689f6b2cb593b1d255a42be"], 0x2) 15:50:08 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f00000011c0)={{0x9, 0x3, 0x0, 0x9, '\x00', 0x4d4}, 0x5, 0x20, 0x7, r1, 0x9, 0x1, 'syz1\x00', &(0x7f0000001140)=['*md5sum/\x00', '/dev/vhci\x00', ':\x00', '\x00', '\x00', 'vmnet0ppp1-\\ppp1+\x00', 'bdev\\keyring{\x00', ',\x00', '/dev/radio#\x00'], 0x45, [], [0x80, 0x4, 0xfbff, 0x8]}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x202) read(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r3, 0x0, 0x200) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000140)={[0x4, 0x5, 0x7, 0xffff0001, 0x80000000, 0x3, 0x80000001, 0x50, 0x7, 0xfffffffa, 0x9, 0xfffffff9, 0x2, 0x2, 0x2, 0x7f, 0x4, 0x4, 0xffffff80, 0x8, 0x1, 0x0, 0x7fffffff, 0x4, 0x80000000, 0x8, 0x0, 0x1000, 0x2d3, 0xc40, 0x1, 0x1, 0x7fdb, 0x8c13, 0xffffff9d, 0x3, 0x4, 0x3, 0x80000000, 0x4, 0x9, 0x3, 0x1, 0x80000001, 0xfffffeff, 0x1, 0x3b0b, 0x0, 0x10000, 0x40c4, 0x7, 0x2, 0xffffffc0, 0x200, 0x0, 0x6, 0x62f, 0x800, 0x8, 0x1, 0xfffffff8, 0xb89, 0x0, 0x40, 0x1, 0x800, 0x8, 0x80, 0x6, 0x8001, 0x4, 0x40, 0x6, 0x1021beec, 0x3f, 0x0, 0x800000, 0x299, 0x3, 0x6, 0x3, 0x540823b1, 0x8, 0x401, 0x5, 0x10000, 0x9, 0x200, 0x80, 0x20000, 0x6, 0x3ecd, 0x5, 0x4, 0x0, 0x7, 0x8, 0xffffffff, 0xf07, 0x4, 0x7, 0x6, 0x10000, 0x400, 0x20, 0x6, 0x1f, 0xaa9, 0x4, 0x7b, 0x5, 0x4, 0x967, 0x5, 0x1, 0x37, 0x7fffffff, 0x1, 0x9, 0x3, 0x64a7, 0x1ff, 0x7, 0x66c, 0x0, 0x7, 0x0, 0x8, 0x9, 0x1, 0x4, 0x200, 0x81, 0x20, 0x2, 0x0, 0x2ea9f6bd, 0xb5, 0x7, 0x2, 0x7, 0x5, 0x200, 0x0, 0x7, 0x80, 0xd8000000, 0x3ff, 0x5db2, 0x2, 0x81af, 0x2, 0x800, 0x3, 0x6375, 0x6fff22d0, 0x7, 0x7fffffff, 0x3ff, 0x5, 0x400, 0x80000001, 0x0, 0x2, 0xdae, 0x1f, 0xfffffffe, 0x100, 0xffffffff, 0x8, 0x3, 0x7, 0x1, 0x6, 0x2, 0x8, 0x4, 0x4, 0x1000, 0x258d, 0x6, 0x2, 0x2, 0x6, 0x1, 0x20, 0x5, 0x7, 0x1000, 0x9368, 0x0, 0x7, 0xf2f, 0x800, 0x8, 0x3f, 0x7, 0x5, 0x21303d12, 0x8, 0x13, 0x0, 0x5, 0x3ff, 0x1000000, 0x2, 0x9, 0x7fff, 0x9, 0x10001, 0x393, 0x10001, 0xfffffc00, 0x401, 0x1, 0xb50, 0x1570, 0x1f, 0x3, 0xf6d0, 0x4, 0x7, 0xffffffc1, 0x2, 0x5e4d, 0x8000, 0x6, 0xffff, 0xc4a, 0x1, 0x3, 0x6, 0x2, 0x101, 0x3ff, 0x4, 0x1000, 0xfff, 0x5, 0x1, 0xfff, 0x80, 0x0, 0x7, 0x8000, 0xfff, 0x0, 0x7fff, 0xbeeb, 0x7fff, 0x4, 0x3, 0x7fff, 0x1, 0x0, 0x2, 0x9, 0x5, 0xb36, 0x0, 0x401, 0x5, 0x7, 0x1, 0x8f2d, 0x200, 0x1, 0x0, 0x20, 0x330b, 0x0, 0x3, 0x36e4, 0x0, 0xffff1a8f, 0xd5b, 0xffffffff, 0x9, 0x5, 0x200, 0x9d, 0x90, 0x1, 0x8001, 0x200, 0x0, 0x5, 0x8, 0x1ff, 0x9, 0x20, 0x2, 0x3, 0x80000001, 0x8, 0x400, 0x8, 0x8, 0x9, 0x7, 0x10000, 0x8, 0xff, 0x1, 0x3, 0x1, 0x200, 0x6, 0x3, 0x9, 0xfffffffc, 0x7, 0x0, 0x0, 0x400, 0x8094, 0x7fff, 0x7, 0x8, 0x9, 0x5, 0x9, 0xcdc, 0x7, 0x9, 0x7, 0xe0bd, 0x5, 0x1, 0x785, 0x2, 0x2a, 0x7fff, 0x3, 0x8, 0x4, 0x9, 0xffff, 0x7, 0x6, 0x8, 0x4313, 0x5, 0x9, 0x4, 0x3ff, 0x1, 0x0, 0xb06, 0xfa0, 0x800, 0x5, 0x3f, 0x0, 0xfffffff8, 0x0, 0x5, 0xffffffff, 0x9, 0x1, 0xfffffffa, 0x1, 0x9, 0x3ff, 0xa600000, 0x7, 0x1ff, 0x9, 0x3, 0x3, 0x2, 0x8000, 0x5, 0x2, 0xf59, 0x0, 0xfff, 0x0, 0x575f2e88, 0xffffffff, 0x6, 0x7, 0x0, 0x3, 0x7, 0x5, 0x7, 0x10001, 0x1ff, 0x7, 0x7, 0x9, 0x80000001, 0x8, 0xffff0001, 0x3, 0x7, 0x1, 0x400, 0x800, 0x6, 0xfff, 0x49b, 0x9, 0x5, 0x6, 0x800, 0xc585, 0x8, 0x81, 0x80, 0x1ebdd36f, 0x3, 0x2, 0x81, 0x3, 0x3f, 0x2, 0x3, 0x1, 0xffff, 0xff, 0x3, 0x2, 0xbf3, 0x7f, 0x8, 0x3, 0x5, 0x6, 0xfffffff8, 0x1, 0x6, 0xfffffff9, 0x80000000, 0x0, 0x7, 0x6, 0x6, 0x9, 0xf4, 0xfd4, 0x1, 0xaa8c, 0x8, 0x7570, 0x6, 0x3, 0x2, 0x8, 0x9, 0x4, 0x361, 0xffffffe0, 0x5, 0x1, 0x9, 0x2, 0x1, 0x6, 0x0, 0x9, 0x7fff, 0x9, 0x4, 0xffff, 0x6, 0x2, 0x0, 0xc2a, 0x4, 0x2, 0x9, 0x2, 0x38, 0x2, 0x4, 0x7ff, 0x5cf3, 0x5, 0x4, 0x2, 0x8, 0x80000000, 0x4, 0x4, 0x9, 0x8, 0x101, 0x5, 0xffff, 0x2076, 0x1f4d, 0x3, 0x8000, 0x6, 0x7, 0x350e, 0x2, 0x1000, 0x8001, 0x200, 0x0, 0xfff, 0x9, 0x7, 0x3, 0x6, 0x6b, 0x25, 0x8, 0x3, 0x7, 0x8000, 0x2, 0xa1f, 0x0, 0x2, 0x6, 0x2, 0x7fff, 0xfffffffe, 0x8, 0x46f, 0x7, 0x5, 0x7fffffff, 0x1f, 0x8, 0x5, 0x480, 0x4, 0x5, 0x3, 0x4, 0xd2, 0xffffffff, 0x2, 0x7, 0x3, 0x2, 0x1, 0x4, 0x20, 0x20, 0x1, 0x81, 0x4, 0x9, 0x0, 0x4, 0xb753, 0x200, 0x8, 0xc4b, 0xfffffffb, 0x80, 0x0, 0xfffffc00, 0xcc9d, 0x200, 0x20, 0x9, 0x3, 0x3, 0x46, 0x8000, 0x10001, 0x332, 0x7ff, 0x10, 0x8, 0x3, 0x9, 0x200, 0x4, 0x200, 0x81, 0x5, 0xd235, 0x3, 0x401, 0x7fff, 0x44b, 0x8c, 0x3, 0xe1, 0x8001, 0x3ff, 0xf93b, 0xca, 0x65, 0xfffff000, 0x52b5, 0x7, 0x4, 0x6, 0x3, 0x4, 0x80, 0x5, 0x80000001, 0x100, 0x8001, 0x0, 0x10001, 0x1, 0x9, 0x6139, 0x80, 0x7f, 0x5, 0x4, 0x1, 0x9, 0x8, 0xffffffff, 0x2, 0x200, 0x7ff, 0x21810e45, 0x7b, 0x0, 0x101, 0x80000001, 0xff, 0x5, 0x9, 0x260c, 0x7, 0x6b, 0xfffffffc, 0x7, 0x7fffffff, 0x8, 0xff, 0x6, 0x64, 0x8e, 0x400, 0xcd1e, 0x7, 0x8000, 0x0, 0x69f, 0xffff02a2, 0x8, 0xffffffff, 0x2b, 0x8, 0x7fff, 0x7fffffff, 0x6, 0x9, 0x2, 0x4, 0x2, 0x80, 0x9, 0x400, 0x5, 0x1, 0x286, 0x6, 0x7, 0x74e, 0x0, 0x7, 0x5, 0x5, 0x199c, 0xfffffffe, 0xdef7, 0xb73, 0x6, 0x0, 0x29b0000, 0x4, 0x2, 0x9, 0x7, 0x5, 0x9, 0x100, 0x7, 0x2, 0x9d2, 0x7fffffff, 0x5, 0x67e5c9b9, 0x8, 0xe5, 0x9f53, 0x3f, 0xffffffff, 0x0, 0xbb5a, 0x101, 0x3, 0x9f3, 0x3, 0x3, 0x3f, 0xfffffff9, 0x7, 0x5, 0x6, 0x9, 0x7f, 0xffffffff, 0x484, 0x401, 0x4c8385cb, 0x1f, 0x7, 0x6e7ed726, 0x3ff, 0x5, 0x5, 0x4, 0xa1d, 0x6, 0x7f, 0x5, 0x3, 0xffff, 0x7f2b, 0x2, 0x3, 0xb2, 0x2, 0x2, 0x7, 0x401, 0x374d, 0x100, 0x0, 0x8, 0x1, 0x7f, 0x6b3, 0x45a9, 0x1, 0x7ff, 0x80, 0x8001, 0x4, 0x10001, 0x8, 0x8, 0xc7f, 0x5, 0xb67, 0x7, 0xfffffffb, 0x92e, 0x8, 0xfff, 0xfd, 0x8, 0x1, 0x0, 0xffffffff, 0x0, 0x2, 0x0, 0x1, 0x7, 0x1, 0x2, 0x0, 0xfff, 0x720, 0x80000001, 0x8, 0x0, 0x7, 0x1, 0x81, 0x9, 0x4, 0x8000, 0x4, 0x6, 0x80, 0x3, 0x1, 0x3ff, 0x4, 0x5, 0x68, 0x7fffffff, 0x3777, 0x4, 0x1000, 0x4, 0x7f, 0x6, 0xffff, 0xfffffffc, 0x100, 0x2, 0x5, 0x0, 0xffff, 0x80000001, 0x9, 0x800, 0x3, 0x8, 0x1, 0xe8c2, 0xffffffc1, 0x1, 0x10001, 0x2, 0x4, 0x3, 0x5, 0x8, 0x2, 0x4373, 0x14, 0x7, 0x8, 0x2, 0x0, 0x6, 0x4, 0x3, 0x0, 0x40, 0x0, 0x6, 0x5, 0xa9, 0x0, 0x99, 0x7, 0x1, 0x4, 0x6, 0x8, 0xe5e, 0x9, 0xe57, 0x7, 0x801, 0x1, 0xffff3b39, 0x9f54, 0x6, 0x3, 0x80, 0xcfab, 0xff, 0x1f, 0x200, 0x4, 0x4, 0x6, 0x5, 0x5, 0x5, 0x0, 0x4, 0x50d9, 0x9, 0x401, 0x9, 0xff, 0x56b, 0x1, 0x80, 0x3, 0x80000001, 0x265c000, 0x6b8a, 0x2, 0x7, 0x3fc, 0x0, 0x2, 0x7ff, 0x8, 0xfffffff9, 0xff, 0x2, 0x101, 0x2, 0x6, 0xa98, 0x2, 0xfffffffb, 0xba2, 0x0, 0x0, 0x80000000, 0x20, 0x0, 0x8, 0x9, 0x3, 0xfffffffa, 0xd126, 0x3ff, 0x400, 0x2, 0x5, 0x2, 0x7, 0x4, 0x0, 0x3ff, 0x1, 0x0, 0x5e, 0x6, 0x5, 0xd15, 0x6, 0x7, 0x6, 0x401, 0x59b, 0xfffffff8, 0x5, 0x3ff, 0x4, 0xec9c, 0x7, 0x9, 0x9, 0x81, 0x0, 0x8, 0x3, 0x8, 0xffff4a12, 0x0, 0x4, 0x200000, 0x5, 0x2, 0x2d90, 0x1000, 0xffff597e, 0x7, 0x9f6, 0x68da, 0x3, 0x100, 0x4, 0x7, 0x808f, 0xcf95, 0x10001, 0x4, 0x7, 0x7, 0x5, 0x81bc, 0x322dfcd9, 0x1, 0x9, 0xff, 0x4a9c74b8, 0x1, 0x9, 0xfffffffe, 0x0, 0xeebc, 0x116f7d7e, 0x5, 0x3, 0x0, 0x7c, 0x6, 0x100, 0x8, 0x6, 0x3, 0x2800, 0x8, 0x7fffffff, 0x3, 0xf5, 0x4, 0x1, 0x0, 0x10000, 0x7e5b, 0x9, 0xffffffc1, 0x8, 0x1, 0xfffffffb, 0x7e, 0x7, 0x3, 0xfffff001, 0x3, 0x39dbb68a, 0x40, 0x7, 0x4, 0xae, 0x6, 0xffff, 0x1, 0x0, 0xc0000, 0x7, 0xff, 0xfffffe00, 0x27b, 0x9, 0x5, 0x56, 0x1, 0x4, 0x0, 0x2, 0x200]}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) 15:50:08 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:08 executing program 4 (fault-call:0 fault-nth:85): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:50:08 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) unlinkat(r2, 0x0, 0x200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) bind$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x2710, @hyper}, 0x10) r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0xe) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, 0x0, 0xffffff5c) kcmp(r1, r4, 0x6, r5, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r6, 0x8010743f, &(0x7f0000000200)) write$vhci(r6, &(0x7f0000000180)=@HCI_ACLDATA_PKT={0x2, "78095a8231618a6640f25a401325649c5d735b30eae933998577d8e3bdb6dd067ff3e51483dd0a7f688c6e7b1425f37a7b7f22744b8450c554a9b2917933ea684bd980a2a8c99f1194fe1e94e4fbcf0bb1ec086cb6325e8ddbc4e7ae7e815f3ec64415def97a7eca30cc89ca541b251a0a1f6ee6597848c66dc7a51e7e1e0cdb1cd7de24a2f3f6eba1c300036637ba0f8854d5cba4bc286f8ed9bb246051195d5744c3083a992a9ce0dd178a3e0e64e3a52eac5452813e56a8d9de0b"}, 0xbd) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:50:08 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 853.242372] FAULT_INJECTION: forcing a failure. [ 853.242372] name failslab, interval 1, probability 0, space 0, times 0 [ 853.268394] CPU: 0 PID: 15896 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 853.276235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.285606] Call Trace: [ 853.288224] dump_stack+0x197/0x210 [ 853.292001] should_fail.cold+0xa/0x1b [ 853.295911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 853.301404] ? lock_downgrade+0x880/0x880 [ 853.305579] __should_failslab+0x121/0x190 [ 853.309969] should_failslab+0x9/0x14 [ 853.313798] kmem_cache_alloc_trace+0x2cc/0x760 [ 853.318505] __memcg_init_list_lru_node+0x8a/0x1e0 [ 853.323458] __list_lru_init+0x402/0x720 [ 853.327551] sget_userns+0x84a/0xd30 [ 853.331280] ? ns_test_super+0x50/0x50 [ 853.335202] ? set_bdev_super+0x120/0x120 [ 853.339399] ? set_bdev_super+0x120/0x120 [ 853.343565] ? ns_test_super+0x50/0x50 [ 853.347478] sget+0x10c/0x150 [ 853.350601] mount_bdev+0xff/0x3c0 [ 853.354156] ? msdos_mount+0x40/0x40 [ 853.357887] msdos_mount+0x35/0x40 [ 853.361442] mount_fs+0xa8/0x31f [ 853.364834] vfs_kern_mount.part.0+0x6f/0x410 [ 853.369351] do_mount+0x53e/0x2bc0 [ 853.372905] ? retint_kernel+0x2d/0x2d [ 853.376834] ? copy_mount_string+0x40/0x40 [ 853.381088] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 853.386639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.392212] ? copy_mount_options+0x280/0x3a0 [ 853.396727] ksys_mount+0xdb/0x150 [ 853.400353] __x64_sys_mount+0xbe/0x150 [ 853.404622] do_syscall_64+0xfd/0x620 [ 853.408444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.413638] RIP: 0033:0x45d99a [ 853.416844] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:50:08 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:08 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:50:08 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000200)={0x1, 0x20}, 0x2) r2 = socket$pppoe(0x18, 0x1, 0x0) setsockopt(r2, 0x5, 0x3ff, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000240)='vlan1\x00') unlinkat(r1, 0x0, 0x200) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x6, [@bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) prctl$PR_CAPBSET_READ(0x17, 0x19) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="047278e81046f4e3ff53774b5af8afeba4d49685a676c1cb5b754c386c7aa9e0fd60f7cd60d2f5f7905738c7ebb580d564679b7ea217e0e540cb04d675c34e60a8717429267c62be06328fa5ee6fa36fc5cf308bb1b0fdac3d7eaaae061104c08563c474f3d8362aa93bf2349a769648cdd32952f5879cda53ba591896acf839a0708a3af66ce83e54ae7cbbb01ac6402f2f9afa1697a11d5df341a5289ae6078bc4507a"], 0x10) 15:50:08 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000000)={0x0, 0x0, {0x8c, 0x0, 0xd41ecef74d339f15, 0x4, 0x5, 0x1, 0x2}}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x3f}}, 0x30) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000140)={0x0, 0x80, 0x101, 0xfff, [], [], [], 0x3, 0x6, 0x6, 0xff, "bf7e7e29e1aae39520c9c45db1a01bf2"}) read(r0, 0x0, 0x0) [ 853.436276] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 853.444090] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 853.451464] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 853.458750] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 853.466125] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 853.473422] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:08 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(0xffffffffffffffff, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:50:08 executing program 4 (fault-call:0 fault-nth:86): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:50:08 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) 15:50:08 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:08 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 853.660523] FAULT_INJECTION: forcing a failure. [ 853.660523] name failslab, interval 1, probability 0, space 0, times 0 [ 853.695425] CPU: 1 PID: 15920 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 853.703271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.712639] Call Trace: [ 853.715255] dump_stack+0x197/0x210 [ 853.718926] should_fail.cold+0xa/0x1b [ 853.722857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 853.728254] ? lock_downgrade+0x880/0x880 [ 853.732439] __should_failslab+0x121/0x190 [ 853.736698] should_failslab+0x9/0x14 [ 853.740519] kmem_cache_alloc_trace+0x2cc/0x760 [ 853.745204] ? kasan_unpoison_shadow+0x35/0x50 [ 853.749808] ? kasan_kmalloc+0xce/0xf0 [ 853.753719] __memcg_init_list_lru_node+0x8a/0x1e0 [ 853.758670] __list_lru_init+0x402/0x720 [ 853.762838] sget_userns+0x84a/0xd30 [ 853.766565] ? ns_test_super+0x50/0x50 [ 853.770475] ? set_bdev_super+0x120/0x120 [ 853.774640] ? set_bdev_super+0x120/0x120 [ 853.778799] ? ns_test_super+0x50/0x50 [ 853.782695] sget+0x10c/0x150 [ 853.785816] mount_bdev+0xff/0x3c0 [ 853.789362] ? msdos_mount+0x40/0x40 [ 853.793094] msdos_mount+0x35/0x40 [ 853.796646] mount_fs+0xa8/0x31f [ 853.800032] vfs_kern_mount.part.0+0x6f/0x410 [ 853.804542] do_mount+0x53e/0x2bc0 [ 853.808101] ? copy_mount_string+0x40/0x40 [ 853.812353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.817908] ? copy_mount_options+0x280/0x3a0 [ 853.822422] ksys_mount+0xdb/0x150 [ 853.825982] __x64_sys_mount+0xbe/0x150 [ 853.829972] do_syscall_64+0xfd/0x620 [ 853.834064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.839275] RIP: 0033:0x45d99a [ 853.842481] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 853.866343] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 853.874068] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 853.881345] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 853.889408] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 853.896688] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 853.903967] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:18 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x680802) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:50:18 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x28c500, 0x0) 15:50:18 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:18 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:50:18 executing program 4 (fault-call:0 fault-nth:87): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 863.436252] FAULT_INJECTION: forcing a failure. [ 863.436252] name failslab, interval 1, probability 0, space 0, times 0 [ 863.498689] CPU: 1 PID: 15936 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 863.506546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.516104] Call Trace: [ 863.518762] dump_stack+0x197/0x210 [ 863.522425] should_fail.cold+0xa/0x1b [ 863.526344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 863.531473] ? lock_downgrade+0x880/0x880 [ 863.535750] __should_failslab+0x121/0x190 [ 863.540010] should_failslab+0x9/0x14 [ 863.543833] kmem_cache_alloc_node_trace+0x274/0x720 [ 863.548953] ? kmem_cache_alloc_trace+0x348/0x760 [ 863.553817] ? kasan_unpoison_shadow+0x35/0x50 [ 863.558424] __kmalloc_node+0x3d/0x80 [ 863.562249] kvmalloc_node+0x68/0x100 [ 863.566077] __list_lru_init+0x4d9/0x720 [ 863.570275] sget_userns+0x84a/0xd30 [ 863.574298] ? ns_test_super+0x50/0x50 [ 863.578235] ? set_bdev_super+0x120/0x120 [ 863.582434] ? set_bdev_super+0x120/0x120 [ 863.586615] ? ns_test_super+0x50/0x50 [ 863.590530] sget+0x10c/0x150 [ 863.593695] mount_bdev+0xff/0x3c0 [ 863.597262] ? msdos_mount+0x40/0x40 [ 863.601011] msdos_mount+0x35/0x40 [ 863.604574] mount_fs+0xa8/0x31f [ 863.607973] vfs_kern_mount.part.0+0x6f/0x410 [ 863.612505] do_mount+0x53e/0x2bc0 [ 863.616169] ? copy_mount_string+0x40/0x40 [ 863.620427] ? _copy_from_user+0xdd/0x150 [ 863.624603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 863.630170] ? copy_mount_options+0x280/0x3a0 [ 863.634719] ksys_mount+0xdb/0x150 [ 863.638286] __x64_sys_mount+0xbe/0x150 [ 863.642290] do_syscall_64+0xfd/0x620 [ 863.646295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 863.651498] RIP: 0033:0x45d99a [ 863.654709] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 863.673753] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 863.681703] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 863.689005] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 863.696293] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 863.703688] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 863.710984] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:18 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 15:50:18 executing program 2: sync_file_range(0xffffffffffffffff, 0x0, 0xdb, 0x4) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x85ee03) read(r0, 0x0, 0x0) 15:50:18 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:50:18 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x20000) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) r3 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000004c0)={0x0, r3, 0x4, 0x7, 0x10001, 0x8}) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f00000000c0)={0x9, 0x1, 0x1, 0x9, 0x5, 0xc3}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d524f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r9, 0x4008af60, &(0x7f0000000480)={@my=0x0}) socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000280)={0x1f, {0x4, 0x10, 0x3, 0xd7, 0x85}, 0x2}, 0xa) r11 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r11, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f00000002c0)={0x7b, 0x0, [0x6efb, 0x2, 0x7, 0x4]}) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x10000, 0x0) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b40)=ANY=[@ANYBLOB="4800758d0f6ca882896b25ba0d983d30bb4928e000001000c92a", @ANYRES32=r12, @ANYBLOB="1bb72baf1437a40671f8defcb41aa8eb9b09a080a3d9cd3c048bb4280b4a473176fb4c7462965e4959603649eb115632c00c4f6738a3ab4eedb7c2778a6f6662ecf04dd2571a6de71aa031a9268da341ea4a9120beafa6a22f9260755e7d3099766fa66a9047a07aa6a89d9a0829669a81a94eaa23d2864a28", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="4c000000100081050000000000000000000000003fbd5807dfd1e9c76da5071ee07680041b0b2200fbb27d34d98bcd52829f6c51076d2deb74b504eb761362b8e5ca7078f98f68d52bc06f21de408ecf179a1a473a6090b2a3f22bd7e38198e72e954491b2a06cadf206992b9ba35f017881f68d74665b4172b1b33b544c5dbbf5b84b46cac665efbd", @ANYRES32, @ANYBLOB="0000000000000000240012000c0001006d6163766c616e00140002000600020000000000080001001000000008000500", @ANYRES32=r8, @ANYBLOB], 0x5}}, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)=r12) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:50:18 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:18 executing program 4 (fault-call:0 fault-nth:88): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 864.074894] FAULT_INJECTION: forcing a failure. [ 864.074894] name failslab, interval 1, probability 0, space 0, times 0 [ 864.089203] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:50:19 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:19 executing program 2: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x49, 0x3, 0x2}, 0x4}}, 0x18) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:50:19 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 864.137953] Unknown ioctl 1074311008 [ 864.144253] IPv6: ADDRCONF(NETDEV_UP): veth185: link is not ready [ 864.172424] CPU: 1 PID: 15949 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 864.180275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.189669] Call Trace: [ 864.192287] dump_stack+0x197/0x210 [ 864.195952] should_fail.cold+0xa/0x1b [ 864.199988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 864.205120] ? lock_downgrade+0x880/0x880 [ 864.209309] __should_failslab+0x121/0x190 [ 864.213571] should_failslab+0x9/0x14 [ 864.217397] kmem_cache_alloc_trace+0x2cc/0x760 [ 864.221072] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 864.222088] ? kasan_unpoison_shadow+0x35/0x50 [ 864.222108] ? kasan_kmalloc+0xce/0xf0 [ 864.222134] __memcg_init_list_lru_node+0x8a/0x1e0 [ 864.222155] __list_lru_init+0x402/0x720 [ 864.237786] Unknown ioctl 1074311008 [ 864.239423] sget_userns+0x84a/0xd30 [ 864.239444] ? ns_test_super+0x50/0x50 [ 864.239465] ? set_bdev_super+0x120/0x120 [ 864.239482] ? set_bdev_super+0x120/0x120 [ 864.239495] ? ns_test_super+0x50/0x50 [ 864.239506] sget+0x10c/0x150 [ 864.239523] mount_bdev+0xff/0x3c0 [ 864.239537] ? msdos_mount+0x40/0x40 [ 864.239555] msdos_mount+0x35/0x40 15:50:19 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x16) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0472dfd7e1f566e7e7ed867f46e5acfa670433b13549b878389893680ede00e7ea37b5eec66bc64dfe36ae515ecbb44829c31eeb726bdfd21757517715"], 0x2) r3 = msgget$private(0x0, 0x80) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000001140)='/dev/null\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0x80045500, &(0x7f0000001180)) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f00000011c0), &(0x7f0000001200)=0x4) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000140)=""/4096) 15:50:19 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x8) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) getpeername$ax25(r1, &(0x7f0000000000)={{0x3, @null}, [@rose, @default, @netrom, @default, @bcast, @bcast, @null]}, &(0x7f0000000080)=0x37) read(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000140)={'ip6gre0\x00', {0x2, 0x4e22, @multicast2}}) [ 864.239569] mount_fs+0xa8/0x31f [ 864.239592] vfs_kern_mount.part.0+0x6f/0x410 [ 864.294106] do_mount+0x53e/0x2bc0 [ 864.297682] ? copy_mount_string+0x40/0x40 [ 864.301952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.307645] ? copy_mount_options+0x280/0x3a0 [ 864.312184] ksys_mount+0xdb/0x150 [ 864.315851] __x64_sys_mount+0xbe/0x150 [ 864.319850] do_syscall_64+0xfd/0x620 [ 864.323755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.328969] RIP: 0033:0x45d99a [ 864.332181] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 864.351109] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 864.358848] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 864.366253] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 864.373555] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 864.380850] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 15:50:19 executing program 2: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) getpid() r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000011c0)={&(0x7f00000000c0), 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x6, 0x6, 0x739f6c2245f862f5, 0x70bd28, 0x25dfdbfb, {0x5, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x24000880) ptrace(0xffffffffffffffff, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000140)=""/4096, &(0x7f0000000080)=0x1000) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r2, 0x0, 0x0) [ 864.388231] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:29 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) io_setup(0x7d8669c6, &(0x7f0000000200)=0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) io_cancel(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x285, r1, &(0x7f0000000240)="6fae6048d1b1b95d63dec01eda8c35e52bdbedde9c7a4c51999dc65df17de20a0245f70665ba4145135db6dba1c91ca47401aecb5fe8391b2a4b59d88ca9b59cc64ee5de066c84058d4347d4f20811bac46addeb73e1cd9da96f36104b072e2309d27170127ada18329f1a476a471b5163d941525a6db4395d8046a2565ab1555acbbc41e9fd54cb8f75ac0d7fff2d794a4ee840ee4c6a039a4b9434e30ec5fe19bf3a76ea2dc9f47c826b28ad8aef8959789aa58010b6bc8fc2025f562170410a8fae00da6ae25eafc33f18f3205922e5e9b3fa8152bbaa42c656843b90a2", 0xdf, 0x6f7c3ef3, 0x0, 0x1, r3}, &(0x7f0000000380)) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)={r4, 0x57, "9c626fc51a9bbfe0b03b9ec1b0d2b8018a9582c9979d028549fc896107dd6465945a72f40bbb4375dd35df43bc54ca57ce7c22910cb033241abf17274547aa7cc2e83fb3dc9065637f61c80585d45c73adf49234113067"}, &(0x7f00000001c0)=0x5f) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:50:29 executing program 4 (fault-call:0 fault-nth:89): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:50:29 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:29 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x60000, 0x0) unlinkat(r2, 0x0, 0x200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r3, 0xfffd, 0x9, 0x7, 0xfffffff8, 0x4}, 0x14) read(r0, 0x0, 0x0) 15:50:29 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 874.315803] FAULT_INJECTION: forcing a failure. [ 874.315803] name failslab, interval 1, probability 0, space 0, times 0 [ 874.343864] CPU: 0 PID: 15984 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 874.351706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.361071] Call Trace: [ 874.363678] dump_stack+0x197/0x210 [ 874.367328] should_fail.cold+0xa/0x1b [ 874.371232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 874.376360] ? lock_downgrade+0x880/0x880 [ 874.380534] __should_failslab+0x121/0x190 [ 874.384786] should_failslab+0x9/0x14 [ 874.388609] kmem_cache_alloc_trace+0x2cc/0x760 [ 874.393301] ? kasan_unpoison_shadow+0x35/0x50 [ 874.397910] ? kasan_kmalloc+0xce/0xf0 [ 874.401820] __memcg_init_list_lru_node+0x8a/0x1e0 [ 874.406768] __list_lru_init+0x402/0x720 [ 874.410842] sget_userns+0x84a/0xd30 [ 874.414572] ? ns_test_super+0x50/0x50 [ 874.418474] ? set_bdev_super+0x120/0x120 [ 874.422632] ? set_bdev_super+0x120/0x120 [ 874.426793] ? ns_test_super+0x50/0x50 [ 874.430686] sget+0x10c/0x150 [ 874.433805] mount_bdev+0xff/0x3c0 [ 874.437357] ? msdos_mount+0x40/0x40 [ 874.441085] msdos_mount+0x35/0x40 [ 874.444640] mount_fs+0xa8/0x31f [ 874.448022] vfs_kern_mount.part.0+0x6f/0x410 [ 874.452535] do_mount+0x53e/0x2bc0 [ 874.456094] ? copy_mount_string+0x40/0x40 [ 874.460352] ? _copy_from_user+0xdd/0x150 [ 874.464515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 874.470076] ? copy_mount_options+0x280/0x3a0 [ 874.474598] ksys_mount+0xdb/0x150 [ 874.478166] __x64_sys_mount+0xbe/0x150 [ 874.482162] do_syscall_64+0xfd/0x620 [ 874.485981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.491178] RIP: 0033:0x45d99a [ 874.494384] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:50:29 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0xe0040) r0 = socket(0x27, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040)=0x3c, 0x4) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) read(r1, 0x0, 0x31d) 15:50:29 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 874.513294] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 874.521017] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 874.528419] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 874.535701] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 874.542987] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 874.550266] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:29 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000000)) read(r0, 0x0, 0x0) 15:50:29 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7, [], 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:29 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) write$vhci(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2474577559d06788faf0bc655f73c4007169da56ebcaa8095855885c4653f3b64e245364519c5868f443230605b04d7346a603f3a3153fd22ae5a360290a09dc4edc26"], 0x2) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f0000000080)=0xffff) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40c822, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) 15:50:29 executing program 4 (fault-call:0 fault-nth:90): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:50:29 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) [ 874.950924] FAULT_INJECTION: forcing a failure. [ 874.950924] name failslab, interval 1, probability 0, space 0, times 0 [ 874.972049] CPU: 0 PID: 16005 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 874.979984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.989355] Call Trace: [ 874.991975] dump_stack+0x197/0x210 [ 874.995627] should_fail.cold+0xa/0x1b [ 874.999674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 875.004804] ? lock_downgrade+0x880/0x880 [ 875.008978] __should_failslab+0x121/0x190 [ 875.013229] should_failslab+0x9/0x14 [ 875.017044] kmem_cache_alloc_node_trace+0x274/0x720 [ 875.022161] ? kmem_cache_alloc_trace+0x348/0x760 [ 875.027018] ? kasan_unpoison_shadow+0x35/0x50 [ 875.031620] __kmalloc_node+0x3d/0x80 [ 875.035431] kvmalloc_node+0x68/0x100 [ 875.039248] __list_lru_init+0x4d9/0x720 [ 875.043344] sget_userns+0x84a/0xd30 [ 875.047080] ? ns_test_super+0x50/0x50 [ 875.050991] ? set_bdev_super+0x120/0x120 [ 875.055170] ? set_bdev_super+0x120/0x120 [ 875.059334] ? ns_test_super+0x50/0x50 [ 875.063234] sget+0x10c/0x150 [ 875.066356] mount_bdev+0xff/0x3c0 [ 875.069936] ? msdos_mount+0x40/0x40 [ 875.074173] msdos_mount+0x35/0x40 [ 875.077722] mount_fs+0xa8/0x31f [ 875.081105] vfs_kern_mount.part.0+0x6f/0x410 [ 875.085613] do_mount+0x53e/0x2bc0 [ 875.089169] ? copy_mount_string+0x40/0x40 [ 875.093418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 875.098979] ? copy_mount_options+0x280/0x3a0 [ 875.103499] ksys_mount+0xdb/0x150 [ 875.107054] __x64_sys_mount+0xbe/0x150 [ 875.111058] do_syscall_64+0xfd/0x620 [ 875.114895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.120098] RIP: 0033:0x45d99a [ 875.123314] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 875.142235] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 875.149970] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 875.157263] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 875.164552] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 875.171841] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 875.179128] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:39 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0xc0}, 0xffffffffffffff18) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) 15:50:39 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:39 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:50:39 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x1ff2c3dac829cbea) read(r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r3, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0xafc956ad8e2c5d5d}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0xd3}, @NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0xa) 15:50:39 executing program 4 (fault-call:0 fault-nth:91): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 884.549588] FAULT_INJECTION: forcing a failure. [ 884.549588] name failslab, interval 1, probability 0, space 0, times 0 [ 884.585845] CPU: 0 PID: 16020 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 15:50:39 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 15:50:39 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 884.593684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.603048] Call Trace: [ 884.605657] dump_stack+0x197/0x210 [ 884.609308] should_fail.cold+0xa/0x1b [ 884.613218] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 884.618340] ? lock_downgrade+0x880/0x880 [ 884.622516] __should_failslab+0x121/0x190 [ 884.626775] should_failslab+0x9/0x14 [ 884.630603] kmem_cache_alloc_trace+0x2cc/0x760 [ 884.635309] ? kasan_unpoison_shadow+0x35/0x50 [ 884.639922] ? kasan_kmalloc+0xce/0xf0 [ 884.643840] __memcg_init_list_lru_node+0x8a/0x1e0 15:50:39 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x5}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 884.648794] __list_lru_init+0x402/0x720 [ 884.652870] sget_userns+0x84a/0xd30 [ 884.656605] ? ns_test_super+0x50/0x50 [ 884.660523] ? set_bdev_super+0x120/0x120 [ 884.664683] ? set_bdev_super+0x120/0x120 [ 884.668845] ? ns_test_super+0x50/0x50 [ 884.672741] sget+0x10c/0x150 [ 884.675865] mount_bdev+0xff/0x3c0 [ 884.679413] ? msdos_mount+0x40/0x40 [ 884.683140] msdos_mount+0x35/0x40 [ 884.686776] mount_fs+0xa8/0x31f [ 884.690164] vfs_kern_mount.part.0+0x6f/0x410 [ 884.694680] do_mount+0x53e/0x2bc0 15:50:39 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x500}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 884.698249] ? copy_mount_string+0x40/0x40 [ 884.702499] ? _copy_from_user+0xdd/0x150 [ 884.706666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 884.712486] ? copy_mount_options+0x280/0x3a0 [ 884.717007] ksys_mount+0xdb/0x150 [ 884.720568] __x64_sys_mount+0xbe/0x150 [ 884.724571] do_syscall_64+0xfd/0x620 [ 884.728403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 884.733604] RIP: 0033:0x45d99a [ 884.736804] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 884.755725] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 884.763460] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 884.770758] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 884.778026] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 884.785296] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 884.792559] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:40 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000080)=@HCI_EVENT_PKT={0x4, "ecdca56c478347a7ef72"}, 0xffffffffffffffad) 15:50:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x3f00}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:40 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101000) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) read(0xffffffffffffffff, 0x0, 0xffffffffffffff93) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)={{0x10b, 0x3, 0xff, 0x210, 0xf7, 0xdee, 0x3c8, 0x1}, "84a853b9d5a30f6a2c0d9265923ac6da67dcb8e5e31f49b0c797016a1ebc11daec784164cb5f775e3f995b2eeaecfdb4320a80c5eaf7b23090ef58084c9338bf3e516788b3f181b94c390912a233f7a8c03136379ce123d36224b57013db33c34e7ba2737fd5e1fcd96d9a1b7d493a2f140c", [[], [], [], [], [], [], [], []]}, 0x892) bind$unix(r0, &(0x7f0000000980)=@file={0x0, './file0\x00'}, 0x6e) 15:50:40 executing program 4 (fault-call:0 fault-nth:92): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 885.182984] FAULT_INJECTION: forcing a failure. [ 885.182984] name failslab, interval 1, probability 0, space 0, times 0 [ 885.205622] CPU: 0 PID: 16045 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 885.213458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.222825] Call Trace: [ 885.225438] dump_stack+0x197/0x210 [ 885.229112] should_fail.cold+0xa/0x1b [ 885.233023] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 885.238136] ? lock_downgrade+0x880/0x880 [ 885.242310] __should_failslab+0x121/0x190 [ 885.246557] should_failslab+0x9/0x14 [ 885.250379] kmem_cache_alloc_trace+0x2cc/0x760 [ 885.255069] ? kasan_unpoison_shadow+0x35/0x50 [ 885.259666] ? kasan_kmalloc+0xce/0xf0 [ 885.263865] __memcg_init_list_lru_node+0x8a/0x1e0 [ 885.268917] __list_lru_init+0x402/0x720 [ 885.273000] sget_userns+0x84a/0xd30 [ 885.276762] ? ns_test_super+0x50/0x50 [ 885.280685] ? set_bdev_super+0x120/0x120 [ 885.284861] ? set_bdev_super+0x120/0x120 [ 885.289023] ? ns_test_super+0x50/0x50 [ 885.292944] sget+0x10c/0x150 [ 885.296071] mount_bdev+0xff/0x3c0 [ 885.299632] ? msdos_mount+0x40/0x40 [ 885.303366] msdos_mount+0x35/0x40 [ 885.306917] mount_fs+0xa8/0x31f [ 885.310301] vfs_kern_mount.part.0+0x6f/0x410 [ 885.314813] do_mount+0x53e/0x2bc0 [ 885.318365] ? retint_kernel+0x2d/0x2d [ 885.322273] ? copy_mount_string+0x40/0x40 [ 885.326528] ? copy_mount_options+0x1ea/0x3a0 [ 885.331249] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 885.336125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 885.341684] ? copy_mount_options+0x280/0x3a0 [ 885.346215] ksys_mount+0xdb/0x150 [ 885.349775] __x64_sys_mount+0xbe/0x150 [ 885.353764] do_syscall_64+0xfd/0x620 [ 885.357579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 885.362773] RIP: 0033:0x45d99a 15:50:40 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x1000000}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 885.365977] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 885.384886] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 885.392603] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 885.399878] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 885.407151] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 885.414445] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 885.421716] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:40 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:50:40 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0xffffff5c) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x9530660f500ec110, 0x4, 0x2}}, 0x10) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r1, 0x0, 0x0) 15:50:40 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x2) 15:50:49 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0xa30000, 0x100, 0x80, r2, 0x0, &(0x7f00000000c0)={0x4e0485, 0x7, [], @string=&(0x7f0000000080)=0x7}}) accept4$phonet_pipe(r3, &(0x7f0000000180), &(0x7f00000001c0)=0x10, 0x800) 15:50:49 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2000000}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:49 executing program 4 (fault-call:0 fault-nth:93): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:50:49 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)={0x2, 'bond_slave_1\x00', {0x1}, 0x3ddf}) read(r0, 0x0, 0x0) 15:50:49 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) [ 894.796334] FAULT_INJECTION: forcing a failure. [ 894.796334] name failslab, interval 1, probability 0, space 0, times 0 [ 894.820947] CPU: 0 PID: 16073 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 894.828784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.838155] Call Trace: [ 894.840769] dump_stack+0x197/0x210 [ 894.844424] should_fail.cold+0xa/0x1b [ 894.848854] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 894.853978] ? lock_downgrade+0x880/0x880 [ 894.858154] __should_failslab+0x121/0x190 [ 894.862416] should_failslab+0x9/0x14 [ 894.866241] kmem_cache_alloc_trace+0x2cc/0x760 [ 894.870920] ? kasan_unpoison_shadow+0x35/0x50 [ 894.875515] ? kasan_kmalloc+0xce/0xf0 [ 894.879416] __memcg_init_list_lru_node+0x8a/0x1e0 [ 894.884599] __list_lru_init+0x402/0x720 [ 894.888679] sget_userns+0x84a/0xd30 [ 894.892405] ? ns_test_super+0x50/0x50 [ 894.897275] ? set_bdev_super+0x120/0x120 [ 894.901442] ? set_bdev_super+0x120/0x120 [ 894.905602] ? ns_test_super+0x50/0x50 [ 894.909500] sget+0x10c/0x150 [ 894.912629] mount_bdev+0xff/0x3c0 [ 894.916187] ? msdos_mount+0x40/0x40 [ 894.919918] msdos_mount+0x35/0x40 [ 894.923476] mount_fs+0xa8/0x31f [ 894.926868] vfs_kern_mount.part.0+0x6f/0x410 [ 894.931379] do_mount+0x53e/0x2bc0 [ 894.934938] ? copy_mount_string+0x40/0x40 [ 894.939190] ? _copy_from_user+0xdd/0x150 [ 894.943381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.949067] ? copy_mount_options+0x280/0x3a0 [ 894.953960] ksys_mount+0xdb/0x150 [ 894.957810] __x64_sys_mount+0xbe/0x150 [ 894.961818] do_syscall_64+0xfd/0x620 [ 894.965639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.970837] RIP: 0033:0x45d99a [ 894.974042] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 15:50:49 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x5000000}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:49 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000040)=0x1) [ 894.992967] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 895.000703] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 895.007988] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 895.015266] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 895.022541] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 895.029817] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:50 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x3f000000}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 895.078391] Unknown ioctl 1074033722 15:50:50 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x4440c0, 0x20) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000080)) read(r0, 0x0, 0x0) 15:50:50 executing program 4 (fault-call:0 fault-nth:94): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:50:50 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x6, &(0x7f0000001480)=[{&(0x7f0000000140)="8a08193ee1b8b962fb1034a1af53f1a30c5bd5382e1e", 0x16, 0x3}, {&(0x7f0000000240)="70c7b0f2626e1c13452759955672fd2157bb3a1e376cacfad3fcfc7ed3933c39e90dec781675623da9115becd8b1fbbc2e16dfd55b8a973d75dce38700ac967748bacd58a8426646d0da1d", 0x4b, 0x2}, {&(0x7f00000002c0)="a048fdf015dd2f2a60a4e7d388232a5b849d32944a51bd5a659c8f0154bdbed5b748103502d92b6a90f4532e05de0e036374134dd94dc69ae8474ec412e7fea7d9afd12eaa3aa07c35d01f796069a5bbc0eabbf9dccd52608e4548fb13e1803251f552a4e9b004b3e672eb85729bb137f23d38632373eb71102611d7bb1a00f48efa48ba86094643d40c35e644eee6753a2f61742b30351127dadbc6", 0x9c}, {&(0x7f00000001c0)="ecf858f1c70a825d811c2d1f70efbbded6406602aafe6bf88431bde0d4ac93048a8d393695", 0x25, 0x6}, {&(0x7f0000000380)="ece8409429fdf3eb49d0f453319779de1aec69db95865bbd79534ee4ae3de92a6705ad4b84dae7e868e1e0e0cde3a466ead0108adba909ee98fbdfe0ac2436a7cc1049a38d4058c6a8335d78b51255959e6b4a53987f8b4b7a43a27fc193c8ed6e849153e68d365b6f98a100e3cc5f25db18020f0c88f811dbae280b4026b881f7d959dd3af6e639749ee56bf7403929c276909b9dc9280b82d0da357f733adf3ad34f47aa556c4253a18d5f63b0bf7238de2731a1869a5b4ab28c910ee1e052dd3f5d797cf524396f0fd5ae976677b573bee6db3ae93d20317fc52ac8ffe20f8ad349be26", 0xe5, 0xffffffffffff0001}, {&(0x7f0000000480)="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", 0x1000, 0x8000}], 0x100090, &(0x7f0000001600)={[{@adaptive_mode='mode=adaptive'}, {@noinline_dentry='noinline_dentry'}, {@resgid={'resgid', 0x3d, 0xee00}}, {@six_active_logs='active_logs=6'}, {@alloc_mode_reuse='alloc_mode=reuse'}], [{@subj_user={'subj_user', 0x3d, 'user{-*#wlan1*'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/vhci\x00'}}, {@dont_measure='dont_measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'em0'}}]}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='ext3\x00', 0x0, 0x0) pause() read(r0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x2000, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000200)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r5, 0x0, 0x200) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000018c0)={0x41, 0x4, 0x2, r5}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) write$P9_RRENAMEAT(r3, &(0x7f0000001880)={0x7, 0x4b, 0x2}, 0x7) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001740)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000001840)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x80402400}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)={0x4c, r6, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44088016}, 0x800) [ 895.211166] FAULT_INJECTION: forcing a failure. [ 895.211166] name failslab, interval 1, probability 0, space 0, times 0 [ 895.250759] CPU: 0 PID: 16091 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 895.258590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.267948] Call Trace: [ 895.270552] dump_stack+0x197/0x210 [ 895.274208] should_fail.cold+0xa/0x1b [ 895.278113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 895.284007] ? lock_downgrade+0x880/0x880 [ 895.288175] __should_failslab+0x121/0x190 [ 895.293121] should_failslab+0x9/0x14 [ 895.297642] kmem_cache_alloc_trace+0x2cc/0x760 [ 895.302340] ? kasan_unpoison_shadow+0x35/0x50 [ 895.306950] ? kasan_kmalloc+0xce/0xf0 [ 895.310962] __memcg_init_list_lru_node+0x8a/0x1e0 [ 895.315914] __list_lru_init+0x402/0x720 [ 895.319994] sget_userns+0x84a/0xd30 [ 895.323725] ? ns_test_super+0x50/0x50 [ 895.327643] ? set_bdev_super+0x120/0x120 [ 895.331823] ? set_bdev_super+0x120/0x120 [ 895.335983] ? ns_test_super+0x50/0x50 [ 895.339893] sget+0x10c/0x150 [ 895.343124] mount_bdev+0xff/0x3c0 [ 895.346676] ? msdos_mount+0x40/0x40 [ 895.350420] msdos_mount+0x35/0x40 [ 895.353972] mount_fs+0xa8/0x31f [ 895.357366] vfs_kern_mount.part.0+0x6f/0x410 [ 895.361883] do_mount+0x53e/0x2bc0 [ 895.365446] ? copy_mount_string+0x40/0x40 [ 895.369692] ? _copy_from_user+0xdd/0x150 [ 895.373853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.379403] ? copy_mount_options+0x280/0x3a0 [ 895.383918] ksys_mount+0xdb/0x150 [ 895.387469] __x64_sys_mount+0xbe/0x150 [ 895.391458] do_syscall_64+0xfd/0x620 [ 895.395270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.400488] RIP: 0033:0x45d99a [ 895.403695] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 895.422610] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 895.430332] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 895.437623] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 895.444915] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 895.452193] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 895.459468] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:50:50 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x115) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) signalfd4(r1, &(0x7f0000000040)={0x3}, 0x8, 0x81000) write$vhci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="74c9dab28cef5e43ab5fdafad758c49726606d52def391362ce4ea3daa278e21d712656eefdc2f9e6a918b56c97dcd91bb634789e783c154cdb33b9f2ec0a302d5f8149d8dd1e959b57fe4a611186a7d6648e8eeb9e842ccbc62952d3721c4a1d09e84de168820b63c149d8d7199bf451ade36c64aef297da71b779111f861fb09272ae299036473a8e8554c60369a7d81cec3ff748f42e5730b"], 0x8d) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f00000000c0)={0x3f, 0x9, 0xfffffffc, 0x6, 0x0, "feb213ec02e91465f747685938684b47f104c7", 0x9, 0x1e87}) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000140)={{0x5c, @multicast1, 0x4e20, 0x2, 'ovf\x00', 0x1, 0x180000, 0xc}, {@broadcast, 0x4e21, 0x2000, 0x2, 0x7f, 0x9}}, 0x44) 15:50:59 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) 15:50:59 executing program 4 (fault-call:0 fault-nth:95): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:50:59 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0xf5ffffff}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:50:59 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:50:59 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0462d64ca0c08cd9d6e06fbdc9576a237d642f82578377a2615cedb138fdb279fad3314ea89658674af5296b4cf7302b8f3a23fc5dadda31bdf400c5f9c7868489191ff63378114147eb5ba3d5228e480d2c5f0200000000000000781379bd87fcd0353671e4d4912e1f8f1affe3b88542daae3c62fdcb0b951c476a336e25dcec03e0052a5b17264e2d6fe87809567a7790e4c01f21051ca8ad912bf69c6148"], 0x2) 15:50:59 executing program 2: socket$kcm(0x29, 0xd, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000200)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0xfffffffffffffc78, 0x4, 0x0, {0x6, 0x3, 0xffffffffffffff98, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2b4) [ 905.030972] FAULT_INJECTION: forcing a failure. [ 905.030972] name failslab, interval 1, probability 0, space 0, times 0 [ 905.062519] CPU: 1 PID: 16107 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 905.070360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.079730] Call Trace: [ 905.082344] dump_stack+0x197/0x210 [ 905.086006] should_fail.cold+0xa/0x1b [ 905.089927] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 905.095143] ? lock_downgrade+0x880/0x880 [ 905.099322] __should_failslab+0x121/0x190 [ 905.103573] should_failslab+0x9/0x14 [ 905.107387] kmem_cache_alloc_trace+0x2cc/0x760 [ 905.112067] ? kasan_unpoison_shadow+0x35/0x50 [ 905.116673] ? kasan_kmalloc+0xce/0xf0 [ 905.120589] __memcg_init_list_lru_node+0x8a/0x1e0 [ 905.125552] __list_lru_init+0x402/0x720 [ 905.129668] sget_userns+0x84a/0xd30 [ 905.133400] ? ns_test_super+0x50/0x50 [ 905.137318] ? set_bdev_super+0x120/0x120 [ 905.141483] ? set_bdev_super+0x120/0x120 [ 905.145653] ? ns_test_super+0x50/0x50 [ 905.149555] sget+0x10c/0x150 [ 905.152678] mount_bdev+0xff/0x3c0 [ 905.158492] ? msdos_mount+0x40/0x40 [ 905.162239] msdos_mount+0x35/0x40 [ 905.165795] mount_fs+0xa8/0x31f [ 905.169196] vfs_kern_mount.part.0+0x6f/0x410 [ 905.173718] do_mount+0x53e/0x2bc0 [ 905.177287] ? copy_mount_string+0x40/0x40 [ 905.181536] ? _copy_from_user+0xdd/0x150 [ 905.187017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 905.192572] ? copy_mount_options+0x280/0x3a0 [ 905.197095] ksys_mount+0xdb/0x150 [ 905.200661] __x64_sys_mount+0xbe/0x150 [ 905.204664] do_syscall_64+0xfd/0x620 [ 905.208497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 905.213700] RIP: 0033:0x45d99a 15:51:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) r2 = dup2(0xffffffffffffffff, r1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) read(r0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000240)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x280040, 0x0) dup(r0) unlinkat(r5, 0x0, 0x200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r6, 0x8010743f, &(0x7f0000000200)) faccessat(r6, &(0x7f00000000c0)='./file0\x00', 0x4, 0x400) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000140)={{0x3f, 0x4}, 'port0\x00', 0x22, 0x10, 0x7ff, 0x4, 0x7, 0xebbc, 0x101, 0x0, 0x1, 0x8f}) 15:51:00 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0xfffffff5}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 905.216909] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 905.235825] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 905.243558] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 905.250839] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 905.258133] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 905.265412] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 905.272690] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:51:00 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:51:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000000)={0x3f68000, 0xc, 0x4, 0x2000, 0x2, {0x77359400}, {0x3, 0x8, 0x6, 0x5, 0x0, 0x0, "5034df5b"}, 0x1000, 0x2, @userptr, 0x5, 0x0, r0}) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x9c6231440ded9ebb, 0x3}, 0x401}}, 0x18) read(r0, 0x0, 0x0) 15:51:00 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x2, 0x0, @dev}}}, 0x108) 15:51:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x2, 0x1, 0x6, 0x3, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r1, 0x1}, 0xc) read(r0, 0x0, 0x0) 15:51:10 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x0) write$vhci(r0, &(0x7f00000002c0)=@HCI_ACLDATA_PKT={0x2, "95043c32edd713d62996c37b20880b163326ad1b4de76447153ee4ce2e583454e27a3edd3f82f78abe7873723a1decdad0f3f70a8ca4216317e325753db4385444347acb1d757a1508b7efdcacd11cf727138464d38340c8b8645e432f8cc7648800da0e194a713d1b7a59b6c521bcad275951b1d19478a61a5a9a2919b8e4ec88d6efb7d10b04db5470f9980236b4c14c3cf421cbf3e81fdcb8d67b08a6f2743a29ff79fe0e7342c095b42d9e96149068aea0ba60284219a540416fad1a1f547b388bfe37000ee0bdbf74f31407523d2e9c5e45c5d50a402c236f24c7e570"}, 0x42c) 15:51:10 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x5, 0x0, @dev}}}, 0x108) 15:51:10 executing program 4 (fault-call:0 fault-nth:96): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:51:10 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100140, 0x0) 15:51:10 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:51:10 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0xffffff5c) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000140)={0xc9, 0x3, 0x4, 0x4000000, 0x3, {0x77359400}, {0x5, 0x2, 0xf3, 0x7, 0x5, 0x80, "616306ee"}, 0x9, 0x4, @planes=&(0x7f0000000080)={0x0, 0x3, @fd, 0xffffffff}, 0x7, 0x0, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0xffffff5c) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x80}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) [ 915.909853] FAULT_INJECTION: forcing a failure. [ 915.909853] name failslab, interval 1, probability 0, space 0, times 0 [ 915.950950] CPU: 1 PID: 16142 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 915.958799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.968180] Call Trace: [ 915.970798] dump_stack+0x197/0x210 [ 915.974460] should_fail.cold+0xa/0x1b [ 915.978380] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 915.983515] ? lock_downgrade+0x880/0x880 [ 915.987695] __should_failslab+0x121/0x190 [ 915.991948] should_failslab+0x9/0x14 [ 915.995772] kmem_cache_alloc_trace+0x2cc/0x760 [ 916.000517] ? kasan_unpoison_shadow+0x35/0x50 [ 916.005110] ? kasan_kmalloc+0xce/0xf0 [ 916.009040] __memcg_init_list_lru_node+0x8a/0x1e0 [ 916.013996] __list_lru_init+0x402/0x720 [ 916.018080] sget_userns+0x84a/0xd30 [ 916.021812] ? ns_test_super+0x50/0x50 [ 916.025713] ? set_bdev_super+0x120/0x120 [ 916.029893] ? set_bdev_super+0x120/0x120 [ 916.034055] ? ns_test_super+0x50/0x50 [ 916.037950] sget+0x10c/0x150 [ 916.041072] mount_bdev+0xff/0x3c0 [ 916.044622] ? msdos_mount+0x40/0x40 [ 916.048349] msdos_mount+0x35/0x40 [ 916.051899] mount_fs+0xa8/0x31f [ 916.055283] vfs_kern_mount.part.0+0x6f/0x410 [ 916.059792] do_mount+0x53e/0x2bc0 [ 916.063351] ? copy_mount_string+0x40/0x40 [ 916.067598] ? _copy_from_user+0xdd/0x150 [ 916.071775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 916.077347] ? copy_mount_options+0x280/0x3a0 [ 916.081876] ksys_mount+0xdb/0x150 [ 916.085452] __x64_sys_mount+0xbe/0x150 [ 916.089457] do_syscall_64+0xfd/0x620 [ 916.093286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 916.098489] RIP: 0033:0x45d99a [ 916.101702] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 916.120620] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 916.128347] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 916.135634] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 916.142915] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 15:51:10 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r0, 0x0, 0x200) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x88900) read(r1, 0x0, 0x0) 15:51:11 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x500, 0x0, @dev}}}, 0x108) 15:51:11 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) dup(r0) read(r0, 0x0, 0x0) 15:51:11 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) r1 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) sendto$x25(r1, &(0x7f0000000140)="071832f689bf69a33d1d70c0c2c2caa3e066d01038164c420cb31d2df16d5600033db58d98ea2a15d19658234cad0e5235610f752d540f05f82819dbb3e69c761a9204a68e1b396915d9a13671f7578fe96303c8f4faba5ba8a9ad722e07c00cf5996c35c86bf3026e8a756a7a1ab9c11830c44dba1ce56fed77ca34efffb536b0c032814795aec0630266f887150f94853b51dcfab206934633dc2c037f32694be298b98d9c1443cc13661bf72f6df00aaa1a774377b26095d47757cca260996cb086777a407bde511230e810595cf2e58d2af9b172323955a84f6838a9d49ab8f88ebba3ace143f8cf1bfd", 0xec, 0x4000, &(0x7f00000000c0)={0x9, @remote={[], 0x2}}, 0x12) [ 916.150194] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 916.157566] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:51:11 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) msgget(0x1, 0x0) write$vhci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1001) 15:51:11 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x3f00, 0x0, @dev}}}, 0x108) 15:51:11 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) syz_open_dev$vcsu(&(0x7f0000000340)='/dev/vcsu#\x00', 0x51e, 0x2000) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000040)={0xfffffff, 0x2, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x30376, 0x4, [], @ptr=0x10001}}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1500000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x16c, r3, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6f}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xca}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5111}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x91}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'eth', 0x3a, 'hsr0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa4ba}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x2e02fb0f47300977}, 0xc40) 15:51:11 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 15:51:11 executing program 4 (fault-call:0 fault-nth:97): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:51:11 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x400000) read(r0, 0x0, 0xffffffffffffffa9) [ 916.485269] FAULT_INJECTION: forcing a failure. [ 916.485269] name failslab, interval 1, probability 0, space 0, times 0 [ 916.498745] CPU: 0 PID: 16184 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 916.506562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.515930] Call Trace: [ 916.518535] dump_stack+0x197/0x210 [ 916.522184] should_fail.cold+0xa/0x1b [ 916.526089] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 916.531206] ? lock_downgrade+0x880/0x880 [ 916.535380] __should_failslab+0x121/0x190 [ 916.539628] should_failslab+0x9/0x14 [ 916.543447] kmem_cache_alloc_trace+0x2cc/0x760 [ 916.548125] ? kasan_unpoison_shadow+0x35/0x50 [ 916.552737] ? kasan_kmalloc+0xce/0xf0 [ 916.556656] __memcg_init_list_lru_node+0x8a/0x1e0 [ 916.561612] __list_lru_init+0x402/0x720 [ 916.565707] sget_userns+0x84a/0xd30 [ 916.569441] ? ns_test_super+0x50/0x50 [ 916.573359] ? set_bdev_super+0x120/0x120 [ 916.577527] ? set_bdev_super+0x120/0x120 [ 916.581688] ? ns_test_super+0x50/0x50 [ 916.585589] sget+0x10c/0x150 [ 916.588711] mount_bdev+0xff/0x3c0 [ 916.592277] ? msdos_mount+0x40/0x40 [ 916.596118] msdos_mount+0x35/0x40 [ 916.599672] mount_fs+0xa8/0x31f [ 916.603063] vfs_kern_mount.part.0+0x6f/0x410 [ 916.607579] do_mount+0x53e/0x2bc0 [ 916.611143] ? copy_mount_string+0x40/0x40 [ 916.615397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 916.620950] ? copy_mount_options+0x280/0x3a0 [ 916.625466] ksys_mount+0xdb/0x150 [ 916.629020] __x64_sys_mount+0xbe/0x150 [ 916.633098] do_syscall_64+0xfd/0x620 [ 916.637175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 916.642371] RIP: 0033:0x45d99a [ 916.645575] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 916.664484] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 916.672203] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 916.679492] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 916.686766] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 916.694042] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 916.701415] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:51:21 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:51:21 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x2, @dev}}}, 0x108) 15:51:21 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) read(r0, 0x0, 0x0) 15:51:21 executing program 4 (fault-call:0 fault-nth:98): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:51:21 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000080)=@HCI_ACLDATA_PKT={0x2, "282193eecdaf4c62ddc7cfe800e30d7c6d12b3c599e54d0bf81e8fbf3b574637c63b984c5484db0125437991faa5388749267d079262d9542d6153ff42bc4bb21cb4e3e6b1eb41ef1a3c30d2b470d4f1772cb0be31f3f3072c677dfa28816a14b6dc8534c0a7449d50"}, 0x6a) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) 15:51:21 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000000c0)=0x7) r2 = dup2(r0, r0) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/84}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x8001, 0x61, &(0x7f0000000240)="c2491adbf9f13a0ea92662ef42cc8ef1ecedcdcfb3e2b05e93230424fc0d98ad8b89315c6533ccb24c8541fe166a9b0c6ad2328a7af92e3311810c12f8f73d55ae3fd67a2344934ebd4d76f6e9e9ee8a5900b3438c1c06ff5dee0a423da3ac3db0", 0x81, 0x80, 0x7, 0x3, 0x4, 0x1, 0x273, 'syz1\x00'}) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "7278e81046f2e3ff023e35998a75cb"}, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r12, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r9}]}, 0x4c}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r19, @ANYBLOB="0300000000000000280012000c000100766574680000940018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r19}, [@IFLA_LINKINFO={0x24, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r16}]}, 0x4c}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2100002}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x74, r5, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r16}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2e52, 0x4}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) [ 926.831050] FAULT_INJECTION: forcing a failure. [ 926.831050] name failslab, interval 1, probability 0, space 0, times 0 [ 926.864508] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 15:51:21 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, 'r'}, 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) getpeername$l2tp6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x20) [ 926.885174] CPU: 1 PID: 16193 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 926.893030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.902394] Call Trace: [ 926.905003] dump_stack+0x197/0x210 [ 926.908660] should_fail.cold+0xa/0x1b [ 926.912605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 926.917732] ? lock_downgrade+0x880/0x880 [ 926.921915] __should_failslab+0x121/0x190 [ 926.926171] should_failslab+0x9/0x14 [ 926.929995] __kmalloc+0x2e2/0x750 [ 926.933552] ? save_stack+0x45/0xd0 [ 926.937192] ? kasan_kmalloc+0xce/0xf0 [ 926.941165] ? match_number.isra.0+0xa1/0x230 [ 926.943863] IPv6: ADDRCONF(NETDEV_UP): veth151: link is not ready [ 926.945680] match_number.isra.0+0xa1/0x230 [ 926.945699] ? match_strlcpy+0x100/0x100 [ 926.945718] ? match_wildcard+0x320/0x320 [ 926.964455] match_int+0x41/0x50 [ 926.967851] parse_options+0xe9a/0x1b00 [ 926.971861] ? fat_alloc_inode+0x60/0x60 [ 926.975954] ? __lockdep_init_map+0x10c/0x5b0 [ 926.980468] ? lockdep_init_map+0x9/0x10 [ 926.984548] ? vfat_rename.cold+0x5c/0x5c [ 926.988730] fat_fill_super+0x287/0x3900 [ 926.992813] ? vsnprintf+0x32a/0x19a0 [ 926.996635] ? pointer+0x970/0x970 [ 927.000194] ? fat_flush_inodes+0x1a0/0x1a0 [ 927.004530] ? up_write+0x1c/0x150 [ 927.008083] ? snprintf+0xbb/0xf0 [ 927.011545] ? vsprintf+0x40/0x40 [ 927.015017] ? wait_for_completion+0x440/0x440 [ 927.019615] ? set_bdev_super+0x120/0x120 [ 927.023777] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 927.028804] ? set_blocksize+0x2bf/0x340 [ 927.032885] msdos_fill_super+0x2f/0x40 [ 927.036871] mount_bdev+0x304/0x3c0 [ 927.040507] ? msdos_mount+0x40/0x40 [ 927.044239] msdos_mount+0x35/0x40 [ 927.047791] mount_fs+0xa8/0x31f [ 927.051177] vfs_kern_mount.part.0+0x6f/0x410 [ 927.055689] do_mount+0x53e/0x2bc0 [ 927.059274] ? copy_mount_string+0x40/0x40 [ 927.063521] ? _copy_from_user+0xdd/0x150 [ 927.067692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.073251] ? copy_mount_options+0x280/0x3a0 [ 927.077770] ksys_mount+0xdb/0x150 [ 927.081326] __x64_sys_mount+0xbe/0x150 [ 927.085317] do_syscall_64+0xfd/0x620 [ 927.089136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 927.094335] RIP: 0033:0x45d99a [ 927.097545] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 927.116462] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 927.124181] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a 15:51:22 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x5, @dev}}}, 0x108) 15:51:22 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000200)) read(r0, 0x0, 0x338) [ 927.131464] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 927.138740] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 927.146017] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 927.153298] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 15:51:22 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0xffffff5c) getsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000000)=""/32, &(0x7f0000000040)=0x20) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r1, 0x0, 0x0) [ 927.176625] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 15:51:22 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)=0x1ff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r1, 0x0, 0x0) 15:51:22 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0xffffff5c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x8, 0x0, 0x100400, 0xe04, 0x10013c, 0x7}) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000cc0)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000d80)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={r5, 0x7, 0x7f}, 0x8) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0xffffff5c) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x2, {0xa, 0x4e20, 0xcc4, @rand_addr="f2a9227767dbcb850e5f42ae308acbd5", 0x9}}}, 0x38) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x40}, 0xfffffffffffffd3c) write$vhci(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='$r'], 0x2) [ 927.256011] IPv6: ADDRCONF(NETDEV_UP): veth153: link is not ready [ 927.274280] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 927.313361] IPv6: ADDRCONF(NETDEV_UP): veth155: link is not ready 15:51:32 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) read(r0, &(0x7f0000000240)=""/215, 0xd7) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080014}, 0xc, &(0x7f0000001300)={&(0x7f0000000240)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x18fec7513c1ba365}, 0x800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, 0x0, 0xf43487976e1f9b70, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4020}, 0x4000100) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) 15:51:32 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0', "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"}, 0x102) 15:51:32 executing program 4 (fault-call:0 fault-nth:99): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) 15:51:32 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) finit_module(r0, &(0x7f0000000080)='/dev/vhci\x00', 0x5) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) write$vhci(r1, &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYBLOB="61e030f5642387cdca040c628717fb8a3d6b613c13e5f178363db589ed2941b5d9c6fab48799780f576731e254ea00b4d17165af612cb379cf94d2f30a7530def0541d6b708bc1db3445675dd23b3b8f194ce3c2ac7a0fc9c453e6e3b871ff0f60dd6b4138", @ANYRESDEC=r0, @ANYBLOB="ef8f7c494aa4ebf8fe54fc15962a188aa59fb10df3aaf07a2347ec256ab552de70fa31c9f090b6097d4171faa47400e896aeb390cf9fb89ba9dd56a154dd0688a9721e947a88977e6ea2dcba802ee2a28b5255b2ad673c9d771d8b6289bc7c5d74"]], 0x8) 15:51:32 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x500, @dev}}}, 0x108) 15:51:32 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peek(0x1, r0, &(0x7f0000000080)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="040278e81046f2e3ff024035998a75cb"], 0x10) [ 937.674037] FAULT_INJECTION: forcing a failure. [ 937.674037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 937.685897] CPU: 1 PID: 16229 Comm: syz-executor.4 Not tainted 4.19.95-syzkaller #0 [ 937.693705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.703067] Call Trace: [ 937.705669] dump_stack+0x197/0x210 [ 937.709320] should_fail.cold+0xa/0x1b [ 937.713233] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 937.717065] ================================================================== [ 937.718371] ? mark_held_locks+0x100/0x100 [ 937.718398] __alloc_pages_nodemask+0x1ee/0x750 [ 937.725928] BUG: KASAN: slab-out-of-bounds in hci_event_packet+0xa5b2/0xaa40 [ 937.730145] ? kasan_check_read+0x11/0x20 [ 937.734792] Read of size 3 at addr ffff88809b102f3f by task kworker/u5:1/8458 [ 937.741965] ? __alloc_pages_slowpath+0x2870/0x2870 [ 937.746081] [ 937.753356] cache_grow_begin+0x91/0x8c0 [ 937.764006] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 937.769538] ? check_preemption_disabled+0x48/0x290 [ 937.774561] __kmalloc+0x68b/0x750 [ 937.778095] ? save_stack+0x45/0xd0 [ 937.781716] ? match_number.isra.0+0xa1/0x230 [ 937.786213] match_number.isra.0+0xa1/0x230 [ 937.790530] ? match_strlcpy+0x100/0x100 [ 937.794609] ? match_wildcard+0x320/0x320 [ 937.798751] match_int+0x41/0x50 [ 937.802122] parse_options+0xe9a/0x1b00 [ 937.806126] ? fat_alloc_inode+0x60/0x60 [ 937.810201] ? __lockdep_init_map+0x10c/0x5b0 [ 937.814702] ? lockdep_init_map+0x9/0x10 [ 937.818768] ? vfat_rename.cold+0x5c/0x5c [ 937.823003] fat_fill_super+0x287/0x3900 [ 937.827059] ? vsnprintf+0x32a/0x19a0 [ 937.830858] ? pointer+0x970/0x970 [ 937.834392] ? fat_flush_inodes+0x1a0/0x1a0 [ 937.838705] ? up_write+0x1c/0x150 [ 937.842241] ? snprintf+0xbb/0xf0 [ 937.845706] ? vsprintf+0x40/0x40 [ 937.849168] ? wait_for_completion+0x440/0x440 [ 937.853764] ? set_bdev_super+0x120/0x120 [ 937.857912] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 937.862932] ? set_blocksize+0x2bf/0x340 [ 937.867009] msdos_fill_super+0x2f/0x40 [ 937.870984] mount_bdev+0x304/0x3c0 [ 937.874606] ? msdos_mount+0x40/0x40 [ 937.878336] msdos_mount+0x35/0x40 [ 937.881900] mount_fs+0xa8/0x31f [ 937.885279] vfs_kern_mount.part.0+0x6f/0x410 [ 937.889779] do_mount+0x53e/0x2bc0 [ 937.893324] ? copy_mount_string+0x40/0x40 [ 937.897566] ? _copy_from_user+0xdd/0x150 [ 937.901748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.907413] ? copy_mount_options+0x280/0x3a0 [ 937.911925] ksys_mount+0xdb/0x150 [ 937.915470] __x64_sys_mount+0xbe/0x150 [ 937.919464] do_syscall_64+0xfd/0x620 [ 937.923288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.928473] RIP: 0033:0x45d99a [ 937.931663] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 937.950568] RSP: 002b:00007f8a9b118a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 937.958272] RAX: ffffffffffffffda RBX: 00007f8a9b118c90 RCX: 000000000045d99a [ 937.965543] RDX: 00007f8a9b118ae0 RSI: 00000000200000c0 RDI: 00007f8a9b118b00 [ 937.972803] RBP: 000000000075bf20 R08: 00007f8a9b118b40 R09: 00007f8a9b118ae0 [ 937.980061] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f8a9b1196d4 [ 937.987326] R13: 00000000004cbf18 R14: 00000000004e6db0 R15: 0000000000000003 [ 937.994612] CPU: 0 PID: 8458 Comm: kworker/u5:1 Not tainted 4.19.95-syzkaller #0 [ 938.002162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.011538] Workqueue: hci0 hci_rx_work [ 938.015517] Call Trace: [ 938.018111] dump_stack+0x197/0x210 [ 938.021759] ? hci_event_packet+0xa5b2/0xaa40 [ 938.026265] print_address_description.cold+0x7c/0x20d [ 938.031560] ? hci_event_packet+0xa5b2/0xaa40 [ 938.036080] kasan_report.cold+0x8c/0x2ba [ 938.040250] __asan_report_load_n_noabort+0xf/0x20 [ 938.045190] hci_event_packet+0xa5b2/0xaa40 [ 938.049561] ? hci_cmd_complete_evt+0xb920/0xb920 [ 938.054419] ? show_schedstat+0x900/0xbb0 [ 938.058576] ? __lock_acquire+0x6ee/0x49c0 [ 938.062814] ? debug_object_deactivate+0x1e4/0x360 [ 938.067753] ? find_held_lock+0x35/0x130 [ 938.071826] ? skb_dequeue+0x12e/0x180 [ 938.075722] ? find_held_lock+0x35/0x130 [ 938.079793] ? skb_dequeue+0x12e/0x180 [ 938.083702] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 938.088907] ? skb_dequeue+0x12e/0x180 [ 938.092801] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 938.097916] ? lockdep_hardirqs_on+0x415/0x5d0 [ 938.102513] ? trace_hardirqs_on+0x67/0x220 [ 938.106851] hci_rx_work+0x478/0xae0 [ 938.110568] ? hci_rx_work+0x478/0xae0 [ 938.114474] process_one_work+0x989/0x1750 [ 938.118731] ? pwq_dec_nr_in_flight+0x320/0x320 [ 938.123409] ? lock_acquire+0x16f/0x3f0 [ 938.127392] ? kasan_check_write+0x14/0x20 [ 938.131629] ? do_raw_spin_lock+0xd7/0x250 [ 938.135880] worker_thread+0x98/0xe40 [ 938.139705] kthread+0x354/0x420 [ 938.143080] ? process_one_work+0x1750/0x1750 [ 938.147580] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 938.153126] ret_from_fork+0x24/0x30 [ 938.156853] [ 938.158479] Allocated by task 16239: [ 938.162201] save_stack+0x45/0xd0 [ 938.165657] kasan_kmalloc+0xce/0xf0 [ 938.169376] __kmalloc_node_track_caller+0x51/0x80 [ 938.174312] __kmalloc_reserve.isra.0+0x40/0xf0 [ 938.178987] __alloc_skb+0x10b/0x5f0 [ 938.182706] vhci_write+0xc4/0x470 [ 938.186247] __vfs_write+0x587/0x810 [ 938.189962] vfs_write+0x20c/0x560 [ 938.193512] ksys_write+0x14f/0x2d0 [ 938.197142] __x64_sys_write+0x73/0xb0 [ 938.201032] do_syscall_64+0xfd/0x620 [ 938.204839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.210033] [ 938.211667] Freed by task 3777: [ 938.214950] save_stack+0x45/0xd0 [ 938.218406] __kasan_slab_free+0x102/0x150 [ 938.222654] kasan_slab_free+0xe/0x10 [ 938.226453] kfree+0xcf/0x220 [ 938.229574] skb_free_head+0x99/0xc0 [ 938.233302] skb_release_data+0x619/0x8d0 [ 938.237458] skb_release_all+0x4d/0x60 [ 938.241361] consume_skb+0xe2/0x390 [ 938.245004] kobject_uevent_env+0xa2c/0x1170 [ 938.249436] kobject_synth_uevent+0x77b/0x89c [ 938.254042] uevent_store+0x26/0x80 [ 938.257734] dev_attr_store+0x59/0x80 [ 938.261542] sysfs_kf_write+0x116/0x170 [ 938.265522] kernfs_fop_write+0x2b8/0x480 [ 938.269675] __vfs_write+0x114/0x810 [ 938.273402] vfs_write+0x20c/0x560 [ 938.276945] ksys_write+0x14f/0x2d0 [ 938.280579] __x64_sys_write+0x73/0xb0 [ 938.284471] do_syscall_64+0xfd/0x620 [ 938.288294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.293483] [ 938.295141] The buggy address belongs to the object at ffff88809b102d40 [ 938.295141] which belongs to the cache kmalloc-512 of size 512 [ 938.307817] The buggy address is located 511 bytes inside of [ 938.307817] 512-byte region [ffff88809b102d40, ffff88809b102f40) [ 938.319704] The buggy address belongs to the page: [ 938.324647] page:ffffea00026c4080 count:1 mapcount:0 mapping:ffff88812c31c940 index:0xffff88809b1020c0 [ 938.334111] flags: 0xfffe0000000100(slab) [ 938.338271] raw: 00fffe0000000100 ffffea000155ebc8 ffffea000251df88 ffff88812c31c940 [ 938.346161] raw: ffff88809b1020c0 ffff88809b1020c0 0000000100000004 0000000000000000 [ 938.354040] page dumped because: kasan: bad access detected [ 938.359757] [ 938.361382] Memory state around the buggy address: [ 938.366314] ffff88809b102e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15:51:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x3f00, @dev}}}, 0x108) [ 938.373684] ffff88809b102e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 938.381047] >ffff88809b102f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 938.388408] ^ [ 938.393860] ffff88809b102f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 938.401225] ffff88809b103000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 938.408582] ================================================================== [ 938.415936] Disabling lock debugging due to kernel taint 15:51:33 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2) read(r0, 0x0, 0x0) 15:51:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@codepage={'codepage', 0x3d, '860'}}]}) [ 938.433678] Kernel panic - not syncing: panic_on_warn set ... [ 938.433678] [ 938.441173] CPU: 0 PID: 8458 Comm: kworker/u5:1 Tainted: G B 4.19.95-syzkaller #0 [ 938.450101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.459529] Workqueue: hci0 hci_rx_work [ 938.463508] Call Trace: [ 938.466111] dump_stack+0x197/0x210 [ 938.469754] ? hci_event_packet+0xa5b2/0xaa40 [ 938.474258] panic+0x26a/0x50e [ 938.477458] ? __warn_printk+0xf3/0xf3 15:51:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x1000000, @dev}}}, 0x108) 15:51:33 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8b6fb24c9305fa60) socket(0x400000000000010, 0x802, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x14000, 0x0) unlinkat(r1, 0x0, 0x200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r2, 0x80585414, &(0x7f0000000140)) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read(r0, 0x0, 0xfffffffffffffd07) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) [ 938.481356] ? hci_event_packet+0xa5b2/0xaa40 [ 938.485858] ? preempt_schedule+0x4b/0x60 [ 938.490015] ? ___preempt_schedule+0x16/0x18 [ 938.494432] ? trace_hardirqs_on+0x5e/0x220 [ 938.498759] ? hci_event_packet+0xa5b2/0xaa40 [ 938.503269] kasan_end_report+0x47/0x4f [ 938.507251] kasan_report.cold+0xa9/0x2ba [ 938.511411] __asan_report_load_n_noabort+0xf/0x20 [ 938.516352] hci_event_packet+0xa5b2/0xaa40 [ 938.520689] ? hci_cmd_complete_evt+0xb920/0xb920 [ 938.525540] ? show_schedstat+0x900/0xbb0 [ 938.529698] ? __lock_acquire+0x6ee/0x49c0 15:51:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x2000000, @dev}}}, 0x108) [ 938.533944] ? debug_object_deactivate+0x1e4/0x360 [ 938.538882] ? find_held_lock+0x35/0x130 [ 938.542956] ? skb_dequeue+0x12e/0x180 [ 938.546852] ? find_held_lock+0x35/0x130 [ 938.550924] ? skb_dequeue+0x12e/0x180 [ 938.554823] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 938.559937] ? skb_dequeue+0x12e/0x180 [ 938.563836] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 938.568965] ? lockdep_hardirqs_on+0x415/0x5d0 [ 938.573557] ? trace_hardirqs_on+0x67/0x220 [ 938.577894] hci_rx_work+0x478/0xae0 [ 938.581619] ? hci_rx_work+0x478/0xae0 [ 938.585523] process_one_work+0x989/0x1750 [ 938.589773] ? pwq_dec_nr_in_flight+0x320/0x320 [ 938.594454] ? lock_acquire+0x16f/0x3f0 [ 938.598439] ? kasan_check_write+0x14/0x20 [ 938.603201] ? do_raw_spin_lock+0xd7/0x250 [ 938.607464] worker_thread+0x98/0xe40 [ 938.611277] kthread+0x354/0x420 [ 938.614650] ? process_one_work+0x1750/0x1750 [ 938.619156] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 938.624705] ret_from_fork+0x24/0x30 [ 938.629953] Kernel Offset: disabled [ 938.633594] Rebooting in 86400 seconds..