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", &(0x7f0000000140), &(0x7f0000000280), &(0x7f00000002c0)="0d46c7284d8d3182750b5699e4a15ea9785fe88bffcbd5057dbc85c704a933a4a15f5fa306dab6164447bc148218e9b6203fbcc8c2ef8c29b515a6cfc816150d44f3ccdb647cad0c1f158a5ade3c271746d1ef997a70d65089221ca867ed9a3a92ae5233cc5b4d876e934fe27e3e6223a713cc60d3449fae8de70737168ac5958ba977a7552af052b4bb8d135b5381a4ea5b73546d6524b9e3ff9acf0fe63ebd0da4896f21b1d38daa5287f510ec3375fc5701620ead6a0d9dc799be2100d2ac3fee39c080e6b6d40fd1e3eabdad5f82dd34e704d30c506f9175d2135293d93ca4b1") r0 = openat(0xffffffffffffffff, 0x0, 0x139402, 0x82) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001180)={0xfffffffffffffffe, 0x0, &(0x7f00000006c0)={&(0x7f0000002000)=ANY=[@ANYRESDEC], 0x9fc}}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) r3 = dup2(r1, r2) r4 = openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000200)={{r4}, 0xa, &(0x7f00000000c0)=[0x1, 0xb2f3, 0x4, 0x20, 0xfffffffffffffff8, 0x20, 0x8, 0x8ae, 0x1, 0x8000080000000], 0x8f, 0x5, [0xfff, 0x6, 0x0, 0x2]}) openat(r1, &(0x7f0000000000)='./file0\x00', 0x24800, 0x40) [ 515.952867][T13201] loop5: detected capacity change from 0 to 32760 [ 515.962230][T13201] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:06 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 516.281079][T13226] loop5: detected capacity change from 0 to 32760 [ 516.290988][T13226] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x48000000, 0x0) 11:39:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1200}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x3, 0x10000000, 0x0, 0x5, 0x0, 0xfffffffffffffffd, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f0000005dc0)={0x5, 0x70, 0xff, 0xa0, 0x12, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4387, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x0, 0xc9, 0xffffffc1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000340)=""/244, 0xf4, 0x40, &(0x7f0000000440)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast]}, 0x80) syz_mount_image$nfs(&(0x7f0000005e40), &(0x7f0000005e80)='./file0\x00', 0xf24, 0x5, &(0x7f0000006300)=[{0x0}, {0x0, 0x0, 0x1400}, {&(0x7f0000006100)="2517742fb7d1ac9557d72c012f317ee32b1313a059490ab413e14f3fffa8", 0x1e}, {&(0x7f0000006140)="735cf7292e84f1f45dc7007328dbd0980bf447f1e8c5744821607adefb6e91854502747ccda81209b3738abc2dea8e58356e2d8d09bd6fb25af815de8d1a1658765b57f073546f94b371ed20a7354d7cc6830997a667c660343b5dfb3e46f43509b36c2bdf8e6bac5e0f81bd5a88f5b104c715b67d23f32d184676f290ca1e9b97ff373d3b65175a0290cec7ca0ce513b22871", 0x93, 0x3}, {&(0x7f00000062c0)='+', 0x1, 0x20}], 0x0, &(0x7f00000063c0)=ANY=[@ANYBLOB="1f5c2c262c252e2c2b5e7b2c2d2128b55b2c6f626a5f757365723d202c7569643c", @ANYRESDEC=0xee00, @ANYBLOB=',appraise_type=imasig,euid=', @ANYRESDEC=0xee01, @ANYBLOB=',fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',obb_user=/2%&,uid=', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) open(&(0x7f0000000040)='./file0\x00', 0x2000, 0x8) syz_mount_image$ext4(&(0x7f00000064c0)='ext3\x00', &(0x7f0000006500)='./file0\x00', 0x0, 0x3, &(0x7f0000006780)=[{&(0x7f0000006580)="2e4eb127c6c080e026c52d593dfc18bc7a2033078916910f1e395e9cfbd6632fe2f5f3f60ea4e44fca8311890136bfac0f5baa6c2ca79f2944b4c72cf0bc0259ac6b9275f784f4867f38c32d80374a9b9115383e67e0b4d03c5e66c157459485f0228425bbd978a5293d7b5cd21354ef392d0c135f71b812eb84846594d08a8bba4541038ce4a3d3c004d5a0670839bc11c67fc8255ac7d81836aeac3b6a3621210b9d3a10d9685fbb3f4bdfc8a7c6e864265b29f779f363fbaa32cea27125986607c27f148190aeabc6def874bb64b8134c783dd6a0", 0xd6, 0x1}, {&(0x7f0000006680)="5a6f57fc80c5c1f08f7b7eb37c4f09fab3717ab477de80378ec12b8da39038c61b838e6deb5b2aaf6f2874a2cb02b858d9997666eee5ab1fed669ab20f9872d619ed9789", 0x44, 0x80}, {&(0x7f0000006700), 0x0, 0x9}], 0x2000, &(0x7f0000006800)=ANY=[@ANYBLOB="61636c2c6a6f75726e616c5f636865636b0200000000000000616973655f747970653d696d617369672c7065726d69745f646972656374696f2c7063723d30303030303030303030303030303030303030302c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 11:39:06 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1700000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 516.354295][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 516.354306][ T25] audit: type=1326 audit(1621683546.846:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13170 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:06 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf67f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 516.447933][ T25] audit: type=1326 audit(1621683546.936:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13237 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) getpeername$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c) getpeername(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000340)=0x80) read(r3, &(0x7f0000000280)=""/185, 0xb9) set_mempolicy(0x4000, &(0x7f0000000000)=0x2f, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r4, 0x0, 0x88000cc, 0x0) set_mempolicy(0x0, &(0x7f0000000040)=0x9, 0xf72) fcntl$setpipe(r2, 0x407, 0x20ffffd) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) 11:39:07 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2300}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 516.794792][T13254] loop5: detected capacity change from 0 to 32760 [ 516.804084][T13254] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x9, 0x8) set_mempolicy(0x4000, &(0x7f00000000c0)=0x1, 0x5) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x2d55d4064f10a6ef, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x23f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r7) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x33, r5, 0x8d9ed000) write$eventfd(r6, &(0x7f0000000240)=0x8, 0x8) 11:39:07 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf77f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x4c000000, 0x0) [ 517.288159][ T25] audit: type=1326 audit(1621683547.776:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13237 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2700}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1900000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:07 executing program 0: ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000080)={0xff, 0x2}) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='overriderockperm,utf8']) [ 517.371841][T13279] loop5: detected capacity change from 0 to 32760 [ 517.382629][T13279] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 517.391803][ T25] audit: type=1326 audit(1621683547.876:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13287 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xfffffffffffffe01, 0x80000000}, 0x49443}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) dup2(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) recvfrom(r0, &(0x7f0000000040)=""/218, 0xda, 0x2040, &(0x7f0000000200)=@l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}, 0x3}, 0x80) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0xc058534f, &(0x7f00000002c0)={0x0, 0xbf}) statx(r2, &(0x7f0000000780)='./file0\x00', 0x2000, 0x7ff, &(0x7f00000007c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x800, 0x8, &(0x7f00000006c0)=[{&(0x7f0000000940)="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", 0x21a, 0x9}, {&(0x7f0000000380)="1c98e5feec2a4bd2f020d8184f", 0xd}, {&(0x7f00000003c0)="5a4c42844a19f105531e08d4a875445f98d9b3d1910c1f0ce1ffd659dcd753692a251dda3a7bf30cbf94f6c7f18a96f0c62db2406ff9fca924d9032e486d0db28c97f6ff190f7dc7f685149991358857f63ea2b7aa0c78caecb0a8581bb4e720e741a762fe38fefba2ba34cf8882140b0c8674bbdf9b0c791623fd4e1980d753888d9f9d8ef51fca051374dee6629376d541228382130ea303f3113b519fdf7ad766730dddbefa08e1", 0xa9, 0x6}, {&(0x7f0000000480)="aa094c019d38e8303af4239e32c227377e8076f8154d48707a8f1e26c527d54ecc618f428826b797e9e58a529e0aac9316a7d1e05f0de784423d0d376bf20a6b2764569f4e166b2fe5347c4da8005cb1bb3da60ed8f3e57cd2d86f83ad7c8dd07e132d95bc35328214851da5eb0d989725", 0x71, 0x5}, {&(0x7f0000000500)="e258b39e3f45", 0x6, 0x7e8}, {&(0x7f0000000540)="6ab9f83a206969aced6750765260b6a36c467f091b80e42b8c278da0b144a046f9", 0x21, 0x83}, {&(0x7f0000000580)="2fd77583c6838d378e526608037fa05f97f97616c6d8fcdead1b318c5f723f9bc5c7b18649635110afb5cacd823eeab4db208560ae39488e8bea731e7cc8167d630ffbd61ae610fd2a8ff80b8d641c409c262729b7899454e0cde721343243357c51b4184e614bf862e902efa78bbe0a1c528a9264743d62efbcc880128879cd3e9e04301108ac252f9c25cee90392ba9cf517643b5b74d145a1b34b361f6e9f6887263adf82ab092a7f45db62", 0xad, 0x200000006}, {&(0x7f0000000640)="e9c2cf100ad9c6cf78e1f3bebf4542939501aa782f072f54d84dbd3934c4b77462040ff3d08f6bce51e01d6f0e41d1c786d50272c614d3066855d7393940962a78061c9396f9043b2a3e77cfabd8b9a349f3650289cf70c6041351bc7fc0e39490a88263916a29ba722da4be39d2756922866df2a59fa6c87c26a0f2", 0x7c, 0x100}], 0x40800, &(0x7f00000008c0)={[{@shortname_winnt}, {@utf8no}, {@uni_xlateno}]}) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r4) clone3(&(0x7f0000006ac0)={0xc0167100, 0x0, 0x0, &(0x7f00000068c0), {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) [ 517.490962][T13279] loop5: detected capacity change from 0 to 32760 [ 517.512275][T13279] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:08 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf87f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000280)={0x0, &(0x7f0000000300)}) r1 = gettid() r2 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x204000, 0x12) r3 = getpid() sched_setattr(r3, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) tkill(r3, 0x16) r4 = clone3(&(0x7f0000000040)={0x40020400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1, {r2}}, 0x58) pidfd_getfd(r2, r0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) clone(0x10204000, &(0x7f00000005c0)="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", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="63e0cddb578509ab39e40d59ce47899f29907e33f32a45ab895185cbe6b9f00d793a63b764679bd3b2368cc77ef5aa6dca61b97d816395f2fd764490e2f78cffdece2eac05995d9afc8a4c9483499a3aa505304db6818e1cc834698ee4cd01f0574a984cafb1af2b0246240f9f9acc00a3bcf6d6b473fed02966f3f8b8167f490171e1abf64eb6a997af4ca959c57f54d088b239038f48") tkill(r1, 0x17) exit_group(0x81) r5 = getpid() clone3(&(0x7f0000000540)={0x800800, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x3f}, &(0x7f0000000440)=""/121, 0x79, &(0x7f00000004c0)=""/13, &(0x7f0000000500)=[r1, r1, r5, r1, r4, r4, r1], 0x7, {r2}}, 0x58) wait4(0x0, 0x0, 0x0, 0x0) 11:39:08 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1a00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 517.844425][T13320] loop5: detected capacity change from 0 to 32760 [ 517.854782][T13320] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4800}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x88000ce, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write(r0, &(0x7f0000000280)="a3e6021115f921050780bcdc8ea50b381b2dfbf70f56e692a8a98d9fe246e5c385872ae7c1d7f226fa7a7fb3b807cde8b291f03475ca2cec6203a8f83b053b2aeb6c12beeed1d8e40ce16d57f5fdc0ec0b4b5b5d68288b3ae93ec8aaa59e112591a1aac95c09f461aec4dd9f55036c539b68d8b56598bdf2e4deab183392d21396e0a17ca26cdf179730d3a01770fd65578bcfdaa2b374c0e7743db3fbf73c037f2f0baec9b4109cfd2793e5d6c57e5899da62abc06174487575c142a9a825a17da40db1fff39c3c464b77df241de18d14c3dcaa47a1669bdcd1e65058e1f4d1a81e929afa1a046c4cab290420e57d252876bf95dae324a61871be0e077dd6f8aece095c034570c09e2d37a337598b0a3a14e63491ad530ce4d6d27a5f687deac20e8417283b31abe118762b7f36f00396a7f6631a4253430cd2097eddf9240689e377005c14f05ae81878f8a8ab048f9a08082a8de8e7ab436f48ddb0f022253dbbb5661818ac2dc0e0361b138978b41e3a6fd5efcd2c811aa7e64a76c287ad494117fa88d1745d9bbfca6b8caba9baa443a146c205e8cf40d672d99818cc0012929f29d5d32188f2c9941bd94120a2a1135130afc5c2db151f70f930d055ed000d11b8b58edf062280f1a433f672cbe44ba39d320ba127a989b420a5e1e251b88e6bddb7a153a740d3b2dffc2e91ff1a69e9eb0077f1b0fed4c569ee652e45c599cc4009113f3fbd53cbcd5fe9f56ffe6d756441062256d3cda592ccf06718146056dc58b0145ada45dfadf4de50d20531d1b1e72af65cfb000524802cb314f794822f8e12c14991c3f089289b4c9804db849f198d5009bc42d968100d0da8759c191d24afeeee2cff4cd782bc293e5238b3c4bdfeab54d74e801862f84dfe3c492231ade2f426fc995b9f5143ab393e3a768cc4b4bdd76044b70670c8d59527b6028f189ae9f4b0ad2e68d75805d84c6ef00752600d0ac7ba7439b9eb67b2444cdcad39a426709ff2bfc6fd9d24f056d9c277507280c4e5cd992437050908ab86c7450a112339587d29cb91a24739dd87690e902c613b1b7e87add63831102e2618b3a01114efd791ba9b2e6cbec82028458da17e5ab4b47f957475848a72130c1f7558dd4369a24aaccaafad7d7bdcf10a9e7ebe4bf12cc195388fe9aff8f097cbcccceb96430724052609fe52db8ab6295c12b3b9d9ba50d2f707fe93fb660d3788e5894eef36f3e510c19c1747bc5cd1abca78bbd3c5ff79ac4000a7eb4cd650dbffeeaa8d6d4d79ff4e52fce3a532ac3c74002501f905173899754a351cb63bd2a1b40ea6efd83c60b17457709d2fe18f78ff462d64f98bde58fa7e429401d50820fe8ecdebfed688c3329f85edb422cb7b66254018863c3589844a6e326dd34a49c5d01b84b03926cfe0c0ae4b4ccd894bf2e06310ca57c2e45da35acc7cb13fe1b2b55404af9961eff7dbd3248056c87863ec290f488beb6c845abed532e0fa1b80857c35a623c86ae74f6fbeb6aa5181f905edf2566b52ac92ff350a48cfc23fd2668cc5dea1916720e8ca61da83cc44bd9c9517cc8df38c3743177557f7336e51f2762c861d31e0fc6e9269dc72798e07e021bcdc86b10029b42ca71338295bdfd29618a5ad6e8a90d2ac1d1d883805f64ba58d7371fa2b0266f37727613b4f3549b6c4e98f40d3e50d4e10a1565460f1bdcae8c8404c6dbe1dcd0cb74c063f66ee732cb1d10e9b8138d07b47c69207cb53651b6b1638801030dbce0fe6cfad708d22da73258d7934be89a9a8f997fe079d305f3bb6a9eea576e7644ddce52435e791113e322f1ae936efc9bc84039feebd7c0e79e9534c56aa1f1f002e906c9fd48c1cce0e89889075b09798a9316d9b456b4aceca5ace74effbf685fcb463a4325d6a1c22fcf4f3ccddbd745660eea00d810a4c8c78ca993117f0798e24dd58ad7327d167bc604aff6340bae498b2c805a7f5c1fb93b66b6f819f8852ca56d270826c69a6355f7ea5911db2b1b6e8a7d0fe58addd3c573a88c344e9e954239c3952ca92997bf87edef1aaa18473ee080f040796e1963e67e0745c472a3bdeaee0f4beced902e88406d929dd62177efb39b472a65e110e426d84a7cb22c681b258c0b3956b658a7df3d60e7b4c5acfd3718627f2abbf02c369db40e47a9b4c0dad8d089b9c681e4515131646dd54e56a624c8b9c1d8b29982bcaf09ec5a4012dbca87be501ac85ebdc97d341ccaaf691e0ec125804970dd3ffa71e6be2f2f63db6c91c83f5993b8e223b48c30e48a744074228c1de065a984e98596eb33712a3f41231a4ad7c70a66c569747410687ca82bdbcb2bdd340ba09d59520b5ff1938453b4d1989667b06db2e3849d9d3c45cbf62d9d7bb52c85fb3b0d9ec74f0894e3395ddfa3f455d3f04ea9dc7b52e12bf32511f578625b33b965348a1d4f3c4e17e3b8a24c8c193acfa4951cec0b843bed09dd14480d92b9db1aeec6207bef6509151591f14e8a1e0ef8aa22f0428bccc57e633258f9667f1706bfe6fb69b90188a3670b7327fa41011797d9638da8c0ad8955649e809273b1221cb634c1cbbd4de8ffe5caab80c6269a711b630cd6f5493d814911d82bdb6c7aba7b9107a1a84b3ba5f37e57dcccc5da8501803e1f9946d1605d32de33eb276878925a8337d8fd618815bf0f8ef91871755de715326d020038b1af7f9d31ac58c56c5d7aea65b569e8bca3b4564b56ba06d3f51229b5ea38f09177457da6b02d1b335fe3d78f7ba2a7efcd4af46943c70242f4c639196cf3ee16a7209de8f56f5642beb9386bf3359228714e66fb29fd60d2d3a87bbca8874fd86b77f2d032e99d2a399178bb3413c06777adf57d12ece619e19ef66c74feaff375b6b222aa433738c8327c5f51f2179cda0881545e31b0c83e3a5a3a01c91cd514d70e785846dc1a7d116896dff96642f4bd18e2d153cff2e7bcb17f48850355c6eb8fb7ae61073347cb17fc815466e7ff7a8ffb18dd526f314df4d8c0adbac0bf6e84036a79d8ccab34fefa72176b1a13b4b2854c58dce667a8e9edfdb61b59ee61a911b5b78b51b827380e2799be98cc77de5b0b299cd226fce3f864868f68f624919635d890c503248605127bf13feb1b0e6fda64b94c27da6817f3ae2eb5d022f48942d96dfd8675f0686a801e28fe7e3af4ae5ed3ca632735d087cef0be05b54a1788735f6c32d53bf0105d68d87ec3285083167e3ac765e734a161b14c1ca423f0b8108bbd68ea23e995c2de43e7cb8ab271541fb29ba96e7f7463f79fff253c4ab992cbde176a78622dba7b59513e11de1cfd53c826014d5590bd0dae409776e3fdc029e07ed711ba946e16f4a441099ea048940775d397ed7af496bfe165f9a701c8b44dd8ea5f8d7c27b92de8b9bf952af2533c5a53f5ac73c78bf9aab62873b7691f01b8335627c6edabe5f57f37cfac26d2fe6e9f2c814bb8d2d060f8433ad5b5953de9c8a52f340a7a0dc0d2f15760cada10f312cdccd682d9241e2f0625c842f703df5fa355798bb3edc55f2c0cfac8374512b8d2f268a341bd989bafd75d63bb31354d8ceb3a608ba4726bf0a0c19f57548e5c8b162910fed02dec79d87d9e59ce1e9ee552d749517e87110d67c7ca637073920380ed83e9757475a47011c796de6bc41551a5069c68de661066482a759f76832720f97d92d6d1440e44c7ba178d699ebc81695114855c461499d0e3da0b7f753396b934519cbb6673b3d1e7816c49e222f9df928160c862ba57d8b290e2883324515688fcde04f72217dc071cc05db2ead5a5ea0a80b6b39909d7775bf6ce69a2aeacca4362d18526e630b36a1ab9868bbde5a290d24af0e35c082824d68beea165dcfedb397c54e65bd149878545f20d3fe441acece8d0b4428ea5295ebcb93da11b94e5925f7e70e1b48629ef7c4ac70a8c173c1e3566f6bb00fa45e22e1945f161b9d981d913f2367962545a790451ad922a50e9fb2c5c444d36ea71a876a6e8f1060f21917b9a504135b7f9f673fa6e10fbacd7e3af6a52cef581f9f5a1949d20a5c4921e287da8e99786a864a283378e525601aa09a4816b35e4def340d35df31a9d31297036ccba5c9132e5935ed959878839584618f507f19a1d05a861a76dc7328085f4ad73eaa490b84d0095521bd1e25e0c26c54f053fdf32d1ab187b82a3985b182d9796c9f167dadde024470cc3cee7b3db23d72ec4cadffe5163f6a27c6272383497e524cc760dc0db7c2d9d862cb3e32bea115e3475e1d94b9e80f7704b479311446bab9db6e19202e0f49eb78aeb01973e2d188774887e98dc02b36ef7ad0688a1cc6096283fbad3388a0bebb7aa54ca6b63015383577d36c138207b5e6f08f1422497343ab9c15bcc2074a4e3d480cd789528787acab2c966630152b945739376c7b68a26c747829ccf0dbc4a470e1ec94f4830fc0504ffc8ac488d3273fe13e2221fb503f36de893baa74499244236e80e871ddd14c4f9244c5d430cfcaefcc63abc9ec005d11b0a16bdfa3000f6a66af59e5044074b64218ecfaeb8c3920a7b9cf91ccd38d18e3c81dca738e4912cb7788aa3fcd7400176dd8b6e507a5e378f05beb02104c2214b439933ed2ae4f29c70a7c5befe30e53cc2b69a5421bb0533c6286af4d3a4c421346b01f0f1fb3c1b2be30794754b34b19dced22a5c60387d6ee072a23e1f0a56b1b55431329df9e4b9e4957cb42e5c390578d71523ff4b164cac88d8d9497a76b589cd58473fbd43c0c9b092e7730efce7b55a373342f1bf3d1b4267f71579c3e28a4d70febc6a4e77b20c6c54d08d740e78d73e135af05542b19c9b6519569d5ad699672d904a582f590a36ac7a14d184b0a6763aafec9729344f17c388cf5735380a2ae09c194f85204e98c5a765b82abc829c4e39745f448d2508b8a9ceabbfe115a052cd369bd6c2ddfbc079b4ec2fac79d85254d7e961d51bd6e26aaeeac0650397b8c0672c86f758cd36ad23c8a91acbc4631f92767725388e0bfed64748a498e8604870444905f7add68ebd4fb3e8035d092f92d2e51d5ad262556f8bce518dc9de37940fac33ab42a08f7300f93e17d6697735df19866aa33d8f9a79d69ba59af85fd95c6471226aa224e80b7e25c504fb588428ef5e709224fa53f38b9f404548ca812ec7c48fcae69ff18c874171ea77776e26bf1dea4c172819077fea307192ddc663569634e408abea9ebdc63508602ed27eff6383b4080846454639a48af6f82871bf91bf19ca9cef226897f15f9e8412e1061f5705d0483424b5d706d99a6d02b39785893a0da8727af43d1399ae76bf58bb9bd6d169a90d6f937435ae2a993cd6708fb230abdb8efb4803620046b58691e925c75e9e51a73a86a34adcbb198a8814d7693fc970206506e75d6c8a7ab41d3d65c3208f54bb3f1c6b10e7fe35e70b5d990a222273cc4d072cb2081805b699ce5c64a004c1cac69a3d1b32cb6c03b686df3568d422cc6d3060ffd7460d93af74df75f60f76462c767016b6f03773a00bf6f2f5ed69abe1c26db99cb57137f00f3a76bde9e0e6b331eb82a478615c181b549a9e6a73512e80570f6470ddf4130fef6f0e3d731290188b2e7c381d62a348a0067b3707052dfaa070d7cdf8a7559cf1f9a63f4460d1bcb608e00bf8d29a93127babe66dcc32ad9d152a349ab245653410ee436435cd418d944139e8dedeb1b5c2834b8e8a922049ea604e0720660acfa785b97b32c433423e529c6ff51bc237ce8d060409d1f7194f99062f78cf1539d01", 0x1000) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) set_mempolicy(0x4000, &(0x7f0000000000)=0x1f, 0x7ff) [ 518.039324][T13320] loop5: detected capacity change from 0 to 32760 11:39:08 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfb3f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 518.207205][ T25] audit: type=1326 audit(1621683548.696:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13287 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x68000000, 0x0) 11:39:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0x3, 0x2000) vmsplice(r2, &(0x7f0000001380), 0x0, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r3, 0x0, 0x88000cc, 0x0) recvfrom$inet6(r1, &(0x7f0000003440)=""/102400, 0x19000, 0x40010041, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @mcast1, 0x1f}, 0x1c) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) read$eventfd(r3, &(0x7f0000000040), 0x8) 11:39:08 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1b00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 518.305885][ T25] audit: type=1326 audit(1621683548.796:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13358 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 518.335168][T13352] loop5: detected capacity change from 0 to 32760 [ 518.344486][T13352] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:09 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfc3f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6800}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 518.700415][T13385] loop5: detected capacity change from 0 to 32760 [ 518.709281][T13385] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 519.133757][ T25] audit: type=1326 audit(1621683549.626:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13358 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0xb1d000) ioctl$FITRIM(r0, 0x4030582b, &(0x7f0000000080)={0x0, 0xb813, 0x4000000dce9}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\xf9\'({&\\{'}, {0x20, '^+(-'}, {0x20, 'threaded\x00'}, {0x20, 'threaded\x00'}, {0x20, 'memory.events\x00'}, {}], 0xa, "c36acbb033df290193ceb61b3b4668ddc52113470fb95bcdbe2b2fc17fe27b487a32d843692a6184eedbf7cdd8d45cdac4542a71e0af61c32700de45d0599714990e0c260fdfd1b546cdb70423f97e109d8b3ec730397054c5decbbc3835916eddf841235c8f5129aa6dca09a84723f8f47b98cd335205ba0b49ba525f1705a76b5ea5edf97db288bce0ac74b3f430a95aebb96e906fa381735c9ce18e8377f6805e04c96bb417d77e5d7dab4f0f89cbf62b0880e1313729e0e937c8349676528112b9f5f5a0d044591e4317a94c66c3"}, 0x10c) 11:39:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = fsmount(r0, 0x1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r4, 0x0, 0x88000cc, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000100)={0x6, &(0x7f0000000040)=[{0x80, 0xef, 0x9, 0x3}, {0x0, 0x7f, 0x9}, {0x3f, 0x7, 0x3, 0x1}, {0x9, 0x8, 0x4}, {0xfff8, 0x57, 0x20, 0x2}, {0x1, 0x3f, 0x20, 0x2b}]}) fcntl$setpipe(r3, 0x407, 0x20ffffd) write$eventfd(r3, &(0x7f0000000240), 0xffffff14) 11:39:11 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1c00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x6c000000, 0x0) [ 520.798475][ T25] audit: type=1326 audit(1621683551.286:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13403 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) recvfrom$packet(r0, 0x0, 0x0, 0x40000102, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0xb6c78030b5cab353, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001700), r3) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000001880), r3) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r5, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x10) 11:39:11 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) flock(r1, 0x0) syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) r5 = dup(r1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r5, 0x5386, &(0x7f0000000100)) syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) r8 = pidfd_getfd(r1, r0, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r7, &(0x7f00000000c0)=@IORING_OP_OPENAT2={0x1c, 0x4, 0x0, r8, &(0x7f0000000000)={0x10000, 0x20, 0x8}, &(0x7f0000000040)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r9}}, 0x8) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 520.956762][T13408] loop5: detected capacity change from 0 to 32760 [ 520.986293][T13408] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:11 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1d00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:11 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x67]}}]}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0) 11:39:11 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 521.123444][T13424] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pid=13424 comm=syz-executor.0 [ 521.147357][T13429] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pid=13429 comm=syz-executor.0 11:39:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ptrace$setopts(0x4206, r1, 0x2000000003b, 0x100002) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) r2 = getpid() sched_setattr(r2, &(0x7f0000000200)={0x38, 0x2, 0x10000049, 0x0, 0x5, 0x1, 0x0, 0x0, 0xfffffffd, 0x88000}, 0x0) tkill(r2, 0x12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f00000001c0)=r0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10a, &(0x7f00000002c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_getparam(r0, &(0x7f0000000040)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:39:11 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) poll(&(0x7f0000000000), 0x0, 0x80) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:12 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1e00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 521.458891][T13442] loop5: detected capacity change from 0 to 32760 [ 521.469565][T13442] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff07}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x74000000, 0x0) [ 521.626634][ T25] audit: type=1326 audit(1621683552.116:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13403 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) r6 = openat$cgroup_ro(r1, &(0x7f0000000000)='net_prio.prioidx\x00', 0x7a05, 0x1700) splice(r0, 0x0, r6, 0x0, 0x88000cc, 0x1) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:12 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:12 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1f00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 521.751967][ T25] audit: type=1326 audit(1621683552.246:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13470 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x3, &(0x7f0000000000)=0x4, 0x7fffffff8000000) set_mempolicy(0x1, &(0x7f0000000040)=0x7, 0x100000000) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 522.010262][T13482] loop5: detected capacity change from 0 to 32760 [ 522.020728][T13482] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:12 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x20000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 522.290269][T13502] loop5: detected capacity change from 0 to 32760 [ 522.299524][T13502] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 522.573777][ T25] audit: type=1326 audit(1621683553.066:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13470 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x45833af92e4b39ff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 11:39:14 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '\\*+/*+\\\\::\x80'}, {0x20, 'memory.events\x00'}, {0x20, 'memory.events\x00'}, {0x20, '[}'}, {0x20, 'memory.events\x00'}, {0x20, '!@'}, {0x20, '_.%}-{&\''}]}, 0x53) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000001, 0x10, r0, 0xcf6b6000) set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r2, 0x407, 0x20ffffd) write$eventfd(r2, &(0x7f0000000000), 0x8) 11:39:14 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x40000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x7a000000, 0x0) 11:39:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 524.353250][ T25] audit: type=1326 audit(1621683554.846:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13521 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x45833af92e4b39ff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 11:39:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x6, 0x7, 0x2, 0x7, 0x2, 0x6, 0x25f7fdfc, 0x1b, 0x40, 0x313, 0x1f, 0x7, 0x38, 0x2, 0x7, 0x5, 0xafd0}, [{0x2, 0xd24, 0x2, 0x6, 0x1, 0xf57, 0x10001, 0x5}], "971a0c9bb589afe5d2e8ca685cef71d6067c38364c5f61f63b642db1fa57c1b8d54e62c0bdcedafba6862e77caf0257d83467d4c0debab7e896f7d9343ae670fc0e66232e3ac8e9f305614658d3e8e82bf3937b727e6c803a59072b91612d6c1a9e59f0462f1e807d6a6f5a7612cc57327af301964b18c7c5455e90994e5cc32e4a3b4810dd957fbee33855c810cd87e959ce637132d23a1b4697deaa3273bc3c88a9a3357651504929cc208c19b06081a034656d32d2cda4e73721f179d494e5dc7dbf7d730e2fd802c75dc25c7f325ee082ba798489909dd286eedb47220ab8c948463d7f205fa7583d7bde5bd86ef4f6a5b0e04f8e1b8d8121ef8f9340b3701e4172e38a5b05f5940dd3989668f40d84aced886a8ec7dcba1db815d011c348d556e943954a1673eb8cd17f3f0a9a5ffe3cc7e602da3088fca480eb4066b34bb21e53ede8a8b2ca17da53fd9961738dfd7a4c86ac1f32785b685382a7e4a27c2d7eb086ee2ee853e39c4ff613ce7cc3f3cd1556ca1ad142601d548bb80c5f8308f583dc261a788c0ea21a07eb192dffd98ae543473b0bc476c5970391309f92fc880faa968810fc41e1ba9bd40f56d3b3d8aef45e2f52486db2e5cb65bac610a711f5ac28fe667f3c4ec5ecd4f736fba6f0abf53ea8a0defb21186faf71946b20d8beafeedcdea7972aa0a7acbf83663b577f2c1bcfed0a4a0b69853449dfa7b8392bc6cdd94c8f846b8c3d7789fa833a511b90847532a3ea64cb37efe650ba5eb38ef8dcc3f5b370153136b3adc6926edc17ab3255a5e75ffa5c939861c343a7875b83e78941622ac58dea83a19b122076dd3fffedb609c77f8bd8ca938ae52ec735a521aa7c610501fe2289b5550a3fb0e3867cfd82aea6ceabf5723f4bd1aa2fd8e24479d539a5478a038e0fd483eaddb65296edf30f83d7d644fe5c053c660cb9201c313e0125bd1e6aec896c8326680a7e0726c26a036d831bc93019f52da41ede02eeaccca7b838f887ccfd3103a8b830b4f0b3abddcce81439a8257136ff11798abe67840750f9393d275afe298449f17228f8254f75c4d32b68fc1c1fee9cf58d7c1906c67a877345a4db8fec2da65ea99b7e33b6b65cf6021c7fd700f9de9eaeb44d457b483717b71235314d092d03726d61c83a6ee07868ce569fdaa51996cb81fd0e14cbc8b86c0766c9f96877ab11f316c2941a55212b4721b953a36a578af5d35a07ab181241cea10f921c5f9023e987367ecd17ce344cfe3a6128f478c083716e2b883deaf00c8f3a0e6205dbcc8502d1de2632da6a415b96a24ecbaf0b49a80ad9d7d56fb671ea02a6a283553f4eb99979894fb65f8ef58a01d6eee89cff7aa6064363a6da35f40dc2330ae8f8d4210cea0c43e0f4d74006268784de4b3d7cc24de7d4c32d6797fefc2c3258b49672de599e548a79ccba5776293ee08993153a06fa1198d2823caff4bed2fb24efb476c9ac35fd3e0bb582a1d1d9df4d100aba828c9321ed390816c7acef0d374f83386693a7d6995b8d561a0ba91be0511508f2eb068d37fc3491e759c13556b89c47098e50fd024baf1ef3152f35746e82ab2e1047ccbb25ca5c0a7f33eecccda9cdbec2e2f8089288ffc311052c64199d074baff3db7c0aef5d0678c426ce766ac158881bd65cc35036c169f5fd650de73d976c00c68c05537c0d8f8ebb8cb1436f8a65b0a003316718c9dc57b50fabbfbe9b77abc97bb499354ae56d6be61fae1174a238e5d62617ae3d9b254f62ce1dc654740fd1e0d96b2ae3ecea1bcc4e4d00aa243cc32f32940dfba54c4e99e297a89b68094113d65fe0bf70a746074bfd18979a15ead8fc776a54039ce5d9c1ac5c3ef2a4bdba3b4cb93b5a129ec000cbe8776a90dcca02ba4f15d92679bbaed39a896fcce50df449a6ea540d2b34d876548eb7ce31e624084480844f4ea17fcf52b191019691ddcb9b3ca973d8c0e29239517b1659d92afcdb45d90de2931a031505e5ea9a1a3dd3c5f8e0248799d5e1d7662c285ca9d29ac9f2201f9fb8cb748f9d113087ddb38d499f390517e07bc08b47fc9d3c0dadbeb71f67e709b1601b5b0a9288026ea440f925297c7b9e86d23e8bb345e01669eefa5e3f6e2def578dc9a9a29d38e2655016104376e1c4659ffbfc875e7a134c700d79af8be565645926e88f93e33509354ab08f0a8b9d537c1121db2e68d0196051b7ae69344581e2036c0b30e010dd0a39ad5efc85ca0ade966882d3a984fa316340b0386dcc4cc309c04c3dce3461f1a66b4831db003e8d2d38edea46a1c84bcfd0294486be4a028d5e9050a0b422d3fd03537f742e55e6890ee79e3fa257606d7d1678b0e8dbad14c5f4acf392e141c48834e64532264279a8bdcc73f59793edd1a1fc04d8aeded4c27cb95048ee748213c355664845027e0dee1e42c38cd2806ece6e79766316feab8fb94851d7f9c9365356a3c75b2dca2ded9a8094e7a4040a2a55e0952b8e2dee7f8eb1eaf5c6e57322662c945a28e651b588e9fc429c21700630dbffbb9337680d5dda7f76c88d9cf86b18a6a8d3d39c992f97249c220f1708341a274d121798cda49a1d695eab47151a5f53e3a356b594e10706387b37c4c2ae5f53d7d1230a7854c482e02515502adbf4ac194d7d3e0d1f5cf0d86ffd5ba786dbcda7d71885322f0e1d01a90b40876f4bc2bb62aa17647b299d2b8d280090395935dab2258ba395486aef109bc79fa548c1a4b4248f56d176f64d2057adaeae91f405b0dbd97592da684f4e8e41decd30ed4f035d9c80aeaf845122f5066311f6e607a7c41f1f84b0209f281f39d2973f6c08ac7869b1e992735ea34fa23445f9cdda7023b00887b4ce78bd9cf42ea1efb68702f45a06cc389485bfc90582b21ee818e9c607823d56ad799c2b5a751e2157b046eb23f5395b782e3de7e573f21c78b203de76149b9e4b658547389373c291098b9dcadebdbb03fc63acdaa542f9a6e1bd4d0942cdd37c664e8b7b4bb472c4e3c3ddba58e27810f2fd9eb4dc103168f53025fcc1f044663613108c6623242f39c8f8f3a3ab0f177d5360a9a9bbb4ddb4becea548549c06a7653a86fd25f36404611aa86f5d2a42ac52515c0ffd618594be7460bd2505e8f7e39b9fef89bec07132e9c9c3bc4492b40f2ea786557b8aefcc51fded3162d2584e365885d7405ccc90a6abad5f2717810c9525a283700b092d727d16b57c73b5233b8488897810005418d18c8c7d5c52568f4ef0338a9e855bc571036715170907d39c6af8fa63fa96f7b425d500e37009faf9c8ee84847ebef26aed4d9b2371e7644b4c27c977a68c21cc00a53075ef799f718e7418fe2f376a0d598098a0cae1e6df40d1e753dfc80f02823cca161887be91ac17b43e582b2bdb083351eed9708a871ff4b6ea3cd8cccf1c5914e098453a28b0705a61414151b6984db8686628aa85b3f90f98811b6463865f6ac481df3a0d355c79db45377b82fd23d00a67b1a28c27f4997ac301ec81801a25ee58f54f4326bb47569789b82bf8c1c9464bbf4fa616d22826ed99d3c66916ce8e6f805ec691ef1d1b1ee21c5a40f5ca16281cc424cafb5514bf2dbcd94e8dabb9a40cc0ea232a7d8dd0ec3d8e7456f4bc9ad0a85e0c2110c991e2f8562fb2fb6649fe1e36ae61df020bbea60738d5f5900b9f33cd81084a9d30e718a4547fb0f9d6c199988135e5a3e7ca3c3a53c563b9237c7dce236e3a9001238160d982151e6093f769815fc9f03d95df914fe8da43b243e233afdd7f7475335f211463bb801cb165fe893c7d78ee0b4ee16aaa948a75df7dcd9c831163ecdf1c20644341b4cc12f34fd8bdaff155de24b73159cbc1131d5a75c1a8116daf12f1d4756544d30806768e9c595d9ebaf8feae71d4805bf17971b5764aea811f907d6bc6f7d946a9bc58f961cbbfecd5bc3f2c1b051d65f39a175bfc9553118c399a8bb76b3866687968d4123c70e9d3339e79fe5466a3ad3faca063e1eaeeb0caa5f13ab8f9b8cbc9882eb387ac0095f3d0d587829553b47056941deebeab92b26a43566fed76ac90b4e650f10353caa3543f59c0f3761d024612220955f5f800abc8c6c111b60fb2cb6df1ae0ccffbc69494d7fea92e26342052628bb3b4872549f56640cc5a4dad3dbb123461ee2367ae3c6ebf873d7780fca22652b413f50fd75f969b2074040550fc41b581309b56dc65b10cf41c96b2e24411b0118fb954d0b6e40b7fd458c1af069d75e67998daedfa07d7541e43829d968343439a6787b81b0786b518912b923225c0bc2bc2615715b98f504f6f44321cf2716430f84a2fc57b75d9af452d975ca86660985907cc87bf8775a0281af580c8bbb743ebbfb51e841432bf98ec82c35bbb38827878f69ec3040f35680b7f9ef0dbae99aa79ca39fc5610f4e40346e8832b09dd9dbf0cab492086158370c58fd1a615c271778ca2bd057a9772ddec793c9f9736d2258f201fbb8dac96b800c79f1277aea2e42cb457c354e32c347adeb4419dbf733d3c82db5be0c7e9817abeb36cd192c53c1bf2ac2fa95dff01298de80bf6abee314a2b14fa4453f071d3746a8c4582542cb7b5e7d62b64a08e1c7393dbb04f2598f6109fbe4f22184af55ed40cea5bbce7fbf25dc35770cfb98116d2f0cc2195a67912c5ac112af81ef93ec53734a8fade91bb68fb342c5262840ada9262ba0f2cf1512f4746ecbc9fa35904c9c40fab4adc31fcf46a7db69ea981ea264a623cea6e26e3146034291a91f91e463c4822f5e4cd96ac5aa8e1c104d15aa0c88445e995d54f19cc048efb5f337dd64c9607283ac4167186ee8efc44d7bc529ff8f61fe17af723b927d72f8e505b278e47f18826c9d9096449761ed6c44f4b230d9273c9a446ed17196372d888cd72ed3061dd8082f2c8d28d689e67dbbfc6c09c46296b75c39f95c66045234b874df1feac9a0a00fc26b05406bbefd512674c3158f8b18fa490f44198d0e08eff579047746f8e6c516c189cdf55f6178335eb0dc36b146aa1e4f0def1cc6bb7798714c1317d060fbdf6101530490b4ae44677dfffd74442c86d07dadf34a6a5caec222c1eefd3d56c9f1b9fbe5b9630deeb336cda9944e4095102ae0044352cd52db0a1f9f50565bda83d016fbb4cc7c9ca620eb97a0b9e4ce6ebb9fd23ddf752bee1b0ce65af115b28b9013226580799de6e959dc3bfea4b8c21af09848d1d9363968ba8bb2e758f39e3421459f2ea0b83b9f6c0e826e9dde84edc54e5add79ffdd4cd876cbdb5fa57d1fb2caa5b5ba3d7407aef7e88c9a378de65fe2e1e4981d5893203c2cc288b4e3718a45cce5feb2e74d4243bba19bc89d3571c17837ee79a05ef1585ad09530984108603bfa4c09d170374a0f269c84223f21e5a04b98454d8b049df6dc08a5b42ffe01b4a43b36022f3027b981b0a024a108713bd75c729d8cbfcb78d3c28f3c1b868fba84a817b2b47b504f06393abb133daa3aa6a3db936e044d69b92a760c1d267916b081da15f56586317db01ced3252058ea020efe636ced5b25648981133e2c813ea889b578e0edcfc6ce5892056590d58f5cc16dee19d07a05acdeb5f9d84da3166733ddd5d37616e21199ff6e0c5cb653012037dbdceca5a5bd862891309d59c7088868722aa72d320ccfb66c60f67bddc931e06d57a32a329f3b3a676d524305da9c11ce8f41f54dc34c34661e3822ad19876966665c5af5932320c34965e2dbd2ca1aa7a862df29f3e66a12e7835e9c7d17bdcd88e0f523e5229acf9c90862"}, 0x1078) 11:39:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x80ffff}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x45833af92e4b39ff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 524.532831][T13526] loop5: detected capacity change from 0 to 32760 [ 524.539856][T13526] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:15 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2010000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1004000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x45833af92e4b39ff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 524.753587][T13526] loop5: detected capacity change from 0 to 32760 [ 524.762174][T13526] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:15 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x60000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 524.996345][T13582] loop5: detected capacity change from 0 to 32760 [ 525.005059][T13582] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 525.186915][ T25] audit: type=1326 audit(1621683555.676:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13521 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x7fc00000, 0x0) 11:39:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x45833af92e4b39ff, 0x0) 11:39:15 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2100000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 525.262436][ T25] audit: type=1326 audit(1621683555.756:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13596 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:15 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x80000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 11:39:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 525.562502][T13615] loop5: detected capacity change from 0 to 32760 [ 525.574775][T13615] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 525.728192][T13615] loop5: detected capacity change from 0 to 32760 [ 525.737014][T13615] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 526.096244][ T25] audit: type=1326 audit(1621683556.586:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13596 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x7ff00000, 0x0) 11:39:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x0, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/109, 0x6d}, {&(0x7f0000000280)=""/145, 0x91}, {&(0x7f0000000180)=""/79, 0x4f}], 0x3, 0x1f, 0x81) fcntl$setpipe(r2, 0x407, 0x20ffffd) r4 = fcntl$getown(r1, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f00000020c0), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='^\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000fedbdf256800000008000300", @ANYRES32=r6, @ANYBLOB="2c00c70000000205ff05040720046b0202068105060400020401030600011f05050108024caa619719df0d9a1800c7000207400580070100ff020307736c9ed12ba0585f1e00c70000013900cd02010606070500060600047f0363a1e18b2e1a231d0000"], 0x80}, 0x1, 0x0, 0x0, 0x48000}, 0x4000801) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x90, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@cf_end={{}, {0x6}, @broadcast, @from_mac=@broadcast}}, @NL80211_ATTR_FRAME={0x48, 0x33, @mgmt_frame=@action={@wo_ht={{0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, {0x40}, @device_a, @broadcast, @from_mac, {0xf, 0x6}}, @sp_mp_confirm={0xf, 0x2, {0x4248, @random=0x7ff, {}, @val={0x72, 0x6}, @val={0x2d, 0x1a, {0x8, 0x3, 0x7, 0x0, {0x3f, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x400, 0x80000000, 0x3f}}}}}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x90}, 0x1, 0x0, 0x0, 0x4084}, 0x20000810) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) set_mempolicy(0x8001, &(0x7f0000000380)=0xfffffffffffffeff, 0x4) signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x7fffffff]}, 0x8) syz_open_procfs(r4, &(0x7f0000000000)='totmaps\x00') write$eventfd(r2, &(0x7f0000000400)=0x2, 0x8) set_mempolicy(0x3, &(0x7f00000003c0)=0xfffffffeffffffff, 0x5) 11:39:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 11:39:16 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x80040, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:16 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2300000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 526.166609][ T25] audit: type=1326 audit(1621683556.656:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13649 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 11:39:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 526.287883][T13660] loop5: detected capacity change from 0 to 32760 [ 526.297859][T13660] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 526.485240][T13660] loop5: detected capacity change from 0 to 32760 [ 526.492682][T13660] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x7ffc0000, 0x0) [ 526.997709][ T25] audit: type=1326 audit(1621683557.486:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13649 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r2, 0x407, 0x20ffffd) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'vcan0\x00', {0x2}, 0x5}) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) 11:39:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:17 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xa0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:17 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2400000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 527.065595][ T25] audit: type=1326 audit(1621683557.556:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 527.306526][T13723] loop5: detected capacity change from 0 to 32760 [ 527.322025][T13723] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x11000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x7fff0000, 0x0) 11:39:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x12000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2500000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:18 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xc0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r6 = syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r5, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r6, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@GTPA_LINK={0x8}, @GTPA_LINK={0x8}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008001}, 0x8800) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, r6, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_I_TEI={0x8, 0x8, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8840}, 0x800) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 527.899357][ T25] audit: type=1326 audit(1621683558.396:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x20000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 527.995502][ T25] audit: type=1326 audit(1621683558.486:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13762 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x23000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x27000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x40000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 528.111149][T13766] loop5: detected capacity change from 0 to 32760 [ 528.128220][T13766] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x48000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 528.815289][ T25] audit: type=1326 audit(1621683559.306:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13762 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x8e000000, 0x0) 11:39:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/163, 0xa3}, {&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000500)=""/218, 0xda}], 0x4, 0x6, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0xc0, 0x0) preadv(r5, &(0x7f0000000780)=[{&(0x7f0000000600)=""/190, 0xbe}, {&(0x7f00000006c0)=""/189, 0xbd}], 0x2, 0x95, 0xfffffff8) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) fcntl$setstatus(r6, 0x4, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r7) write$eventfd(r4, &(0x7f0000000240), 0x8) 11:39:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xe0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:19 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2600000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f0000000280)=""/94, 0x5e}, 0xfffffff7}], 0x1, 0x40000140, &(0x7f0000000300)) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x68000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 528.923920][ T25] audit: type=1326 audit(1621683559.416:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13818 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x74000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 529.087638][T13821] loop5: detected capacity change from 0 to 32760 [ 529.103036][T13821] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 529.257219][T13821] loop5: detected capacity change from 0 to 32760 [ 529.264455][T13821] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xa1ffffff, 0x0) 11:39:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2700000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:20 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat(r2, &(0x7f0000000000)='./file0\x00', 0x2, 0x8) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 529.744590][ T25] audit: type=1326 audit(1621683560.236:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13818 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe83a1b00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 529.835810][ T25] audit: type=1326 audit(1621683560.326:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13869 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x548, 0x4) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfeffffff}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 529.960806][T13872] loop5: detected capacity change from 0 to 32760 [ 529.983135][T13872] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 530.185368][T13872] loop5: detected capacity change from 0 to 32760 [ 530.194321][T13872] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 530.669124][ T25] audit: type=1326 audit(1621683561.166:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13869 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xb0030000, 0x0) 11:39:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff070000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x5) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9, 0x0, 0x7eefff7f}}], 0x2102, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:21 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:21 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:21 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x200000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffff8000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 530.765225][ T25] audit: type=1326 audit(1621683561.256:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13923 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff7f}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff8c}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 530.864489][T13918] loop5: detected capacity change from 0 to 32760 [ 530.872924][T13918] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xb0781300, 0x0) 11:39:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:22 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) close(r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r4, 0x0, 0x88000cc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000280)) fcntl$setpipe(r3, 0x407, 0x20ffffd) socketpair(0x51e43aa8c749a09b, 0x6, 0x90000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_BEACON(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0x75c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x0, 0x32}}}}, [@NL80211_ATTR_IE_ASSOC_RESP={0x10d, 0x80, [@random_vendor={0xdd, 0xd9, "86f077a90be3e89b47f9acc350dba4e6967f1e7a816def8869473789a4c7736feee8965b0f9643349e4d2a6684ba869e047979ce41bc41383a8eb879372915d7aa96fff0628968bd1ac80ed0c6bd9eb80edafe03ed48aab694773dde43f59cf16f2a2b74fac6a1ac048b12b70391666b2e8d1850753cfc4200d3e82a912746c56952e8fcb650e1fceac983ebf4dc929209290906f41f0793557d5b9a45d96e1d040080c5ffee6a04b364cfc62c5670c313ba72311b870d50950fd8a6059c409a53f93fcfd4ea7945a312b083ffd267d537a3f9b875f1c36e83"}, @mesh_config={0x71, 0x7, {0x0, 0x1, 0x1, 0xffffffffffffffff, 0x0, 0xff}}, @rann={0x7e, 0x15, {{0x0, 0x29}, 0x7, 0x80, @device_b, 0x7, 0x4, 0xfffffff9}}, @chsw_timing={0x68, 0x4, {0x0, 0x3}}, @gcr_ga={0xbd, 0x6, @broadcast}]}, @NL80211_ATTR_IE_PROBE_RESP={0x54, 0x7f, [@ext_channel_switch={0x3c, 0x4, {0x0, 0x9f, 0x7, 0x5}}, @prep={0x83, 0x1f, @not_ext={{}, 0x8, 0x20, @device_b, 0x8000, "", 0x6, 0x4, @device_a, 0x7}}, @ibss={0x6, 0x2, 0x7}, @challenge={0x10, 0x1, 0xb8}, @mesh_chsw={0x76, 0x6, {0x9, 0x5, 0x16, 0x3f}}, @mic={0x8c, 0x18, {0x128, "041d6c93875e", @long="555bd976eef4a1b7c6c1834ffa9c7a9d"}}]}, @NL80211_ATTR_PROBE_RESP={0x5cd, 0x91, "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"}]}, 0x75c}, 0x1, 0x0, 0x0, 0x20000040}, 0x8008000) write$eventfd(r3, &(0x7f0000000240), 0xffffff14) sendmsg$NL80211_CMD_DEL_MPATH(r6, &(0x7f0000000c80)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x40, 0x0, 0x408, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x40}}, 0x44044805) 11:39:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffff6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x400000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:22 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2900000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffffe}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 531.860096][T13977] loop5: detected capacity change from 0 to 32760 [ 531.878323][T13977] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 532.026745][T13977] loop5: detected capacity change from 0 to 32760 [ 532.034765][T13977] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xc6020000, 0x0) 11:39:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x800000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) io_uring_enter(r2, 0x7609, 0x6ba6, 0x0, &(0x7f0000000040)={[0x3]}, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r3, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:23 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2a00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:23 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 532.516851][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 532.516863][ T25] audit: type=1326 audit(1621683563.006:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13962 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000001000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 532.618196][ T25] audit: type=1326 audit(1621683563.106:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14021 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 532.719008][T14022] loop5: detected capacity change from 0 to 32768 [ 532.729288][T14022] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 532.901061][T14022] loop5: detected capacity change from 0 to 32768 [ 532.908037][T14022] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 533.449862][ T25] audit: type=1326 audit(1621683563.946:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14021 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xeaffffff, 0x0) 11:39:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="16e231547dd3d6601c57598a1181c677b2a1a8ac91fc83f69e8e9745e2be8c6773cd232d25e75932d140912dd890eb6ca01502109653c219d5d912be736c71f30911e41c0388d5d251b9526dd845e14fe2ea1f994e6f18dc4121f39ec740b26708b008630ea85bb124d7395dbc2c8df796c9b5e920049e96e68c1f8830058977639e446ef4a82961f1a8bed718c786e4137f4464bb32fd78aa617df7a6d1247cb29d9b9a8bfe5e46d684a4b9", 0xac}, {&(0x7f0000000280)="4ed4269ea81ec4dffde28fa9bceacab8929fce36d4e0289274f4c21352cb8cedd70600ca4d4282197d57b77683631d3151256d1f835ce69d271326afd8930e0702800bbee22765d24a1adaecb2580fa91e4650f745f3ec1f5c5f108d45a953a6e9c291310a364bebbc26123dd4a0b1d5989d31f519e5854d9c02fb780cecef068b4ff7b7ef1e9bb25ff23856a2ace934fb2e96fc14c280a113a8f1e15de4bc8375cdf621af0b579146bff3b16ff4c7e673c5719d5ca9c7643cf09ba4d0", 0xbd}, {&(0x7f0000000340)="24873c2893f0440369a26934e317f4fea990707ea42e0505e51776e989dc6b62e20b9397c2a932b3c9ebaadd9929b57e4d4ce418bfa7fa4e80a706432a9236bf3f111aa41e3d813581730ff939e97e66484c4215cadc5345edb4c1ca62959fc451355bca2f7ecc3144bec162912b0cc202110caf194a87bd0a4eda938952fa981db6ce5ff9c64ec30a2806c632e9fe1fe9ed01fa50083b31de2e13bbe75522e9a852ff8fcfee035250755e944670fa2ff36e82fc1587acfb97b5d13b7e25330b564341d55414f2a2b8f081986ab0e6a3e72c4ac9e24713", 0xd7}, {&(0x7f0000000440)="a4ab50159ef672694a7c908b8be0bda61756b6247e699957ff4b9f82e1b8ae9e187ec3f1ba3e98156e1d2e592cbe03ca88e1878e09824af1aa6a4e7b4977d4a934960c7302609fbf928115f8f11edbbe2a345df64e5e6cf3efb09a4b7e0404823d18b5de0a0460386c7d672fc0d690a19ba40a6a459dc7ef1a7eb2c698335959ad6cb6667676fd11022c36ce7bea2c79d34afb681e1727ef79c9bfd7a82d22ec7c987b58b2f0d58256706b4b47ff676bcbd1395b77764bbb5169eaf824949a8eccbfe263a74cf3108ca91915e738136dd7d0a6b20eb5897688d36ff88078471288b060d35dd236f3", 0xe8}, {&(0x7f0000000000)="98a029534e2b559f9b568431c362c4313bb219b5dfa0592b79b7e824f2ea2cf1471a5e68afd456045fbebc3cc2608f6f7dabe840ce345dff0acb672c2b890a", 0x3f}], 0x5, 0x4) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:24 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2b00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:24 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x10e0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 533.541760][ T25] audit: type=1326 audit(1621683564.036:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14069 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10000010000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x40000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0x2, &(0x7f00000000c0)=0x3, 0xffffffffffff724f) fcntl$setpipe(r1, 0x407, 0x20ffffd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000940)=""/133, 0x85}, {&(0x7f0000000880)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0xffffffffffffff88}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x1, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x4010, r3, 0x518fb000) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 533.715117][T14073] loop5: detected capacity change from 0 to 34560 [ 533.748317][T14073] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 533.854465][T14073] loop5: detected capacity change from 0 to 34560 [ 533.863306][T14073] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 534.374571][ T25] audit: type=1326 audit(1621683564.866:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14069 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xf8030000, 0x0) 11:39:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x40000100000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:24 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2c00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x80ffff00000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 534.470956][ T25] audit: type=1326 audit(1621683564.966:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 534.547158][T14119] loop5: detected capacity change from 0 to 65536 [ 534.569675][T14119] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) r3 = eventfd2(0xffffffff, 0x80001) readv(r3, &(0x7f0000000000), 0x0) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xfeffffff, 0x0) 11:39:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x500000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2d00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:25 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000000100)=0x5, 0x8) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/221, 0xdd}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f0000000380)=""/128, 0x80}], 0x3, 0xffff, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r2, 0x407, 0x20ffffd) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x2e}, 0xf) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) [ 535.299619][ T25] audit: type=1326 audit(1621683565.796:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x600000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 535.411438][ T25] audit: type=1326 audit(1621683565.906:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14174 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x700000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x800000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 535.520583][T14169] loop5: detected capacity change from 0 to 66048 [ 535.533394][T14169] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x7, 0x0, 0x33, 0x80, 0x0, 0x7fffffff, 0xa10, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x1, @perf_config_ext={0x0, 0x6ef0}, 0x8000, 0xe99, 0x4, 0x1, 0x401, 0x5, 0x400, 0x0, 0x8, 0x0, 0xb416}, r0, 0x5, r1, 0x3) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000100)=[r2, r0, r1, r0, r3], 0x5) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) preadv(r4, &(0x7f0000002600)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/234, 0xea}, {&(0x7f0000000180)=""/162, 0xa2}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/35, 0x23}, {&(0x7f00000023c0)=""/137, 0x89}, {&(0x7f0000002480)=""/147, 0x93}, {&(0x7f0000002540)=""/149, 0x95}], 0x9, 0x5, 0x7) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r5, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r0, 0x407, 0x8800008) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 535.744450][T14169] loop5: detected capacity change from 0 to 66048 [ 535.757768][T14169] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 536.240437][ T25] audit: type=1326 audit(1621683566.736:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14174 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xffffffa1, 0x0) 11:39:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x900000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:26 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:26 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 536.308531][ T25] audit: type=1326 audit(1621683566.806:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14222 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat(r2, &(0x7f0000000100)='./file0\x00', 0x80, 0x134) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f0000000180)=0x3, 0x4) signalfd(r0, &(0x7f0000000040)={[0x3]}, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r2, 0x407, 0x20ffffd) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x92240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000200)=0x0) fchown(0xffffffffffffffff, r7, 0xee01) openat$cgroup_ro(r5, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="6d7d94dccbde008ec1b8d0a4de45e570e4fe4b125789ead8ec20af6c7b471994e757d07aada904af042c8e376cddc7a4c0c9a3453c7baa7d449a9612fef6c36911c9931d0691289ac99b81e47cc0ab4e76fda6af2afa39c4cc5e849c2bcdad667409f740f9c7680c66be12", 0x6b) set_mempolicy(0x8000, &(0x7f0000000000)=0x7, 0x8001) [ 536.496801][T14225] loop5: detected capacity change from 0 to 98304 [ 536.513652][T14225] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 536.613135][T14225] loop5: detected capacity change from 0 to 98304 [ 536.621319][T14225] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xffffffea, 0x0) 11:39:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2f00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000200)={0x8, 0x20, '\x00', 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x4c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x88000cc, 0x0) r4 = accept4(r1, &(0x7f00000000c0)=@ax25={{}, [@rose, @null, @null, @rose, @bcast, @null, @rose, @rose]}, &(0x7f0000000180)=0x80, 0x0) fcntl$setpipe(r4, 0x407, 0x20ffffd) r5 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x2, 0xa}, 0x18) write$eventfd(r5, &(0x7f0000000240), 0x8) 11:39:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1100000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1200000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 537.286280][T14278] loop5: detected capacity change from 0 to 131072 [ 537.294663][T14278] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2300000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2700000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 537.625695][T14320] loop5: detected capacity change from 0 to 163840 [ 537.633816][T14320] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xfffffffe, 0x0) 11:39:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4800000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3000000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000000)={'ip_vti0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x10, 0x700, 0x5, 0x9, {{0x14, 0x4, 0x2, 0x1f, 0x50, 0x65, 0x0, 0x9e, 0x2f, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x33}, {[@timestamp={0x44, 0x18, 0x19, 0x0, 0xd, [0x401, 0x3, 0x9, 0x98, 0x8c]}, @timestamp={0x44, 0x14, 0x6e, 0x0, 0x2, [0x2, 0x7, 0xfffffffb, 0x6000]}, @rr={0x7, 0xf, 0x7b, [@local, @private=0xa010101, @multicast2]}]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='rdma.current\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) tee(r2, 0xffffffffffffffff, 0x3, 0xc) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 538.074963][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 538.074973][ T25] audit: type=1326 audit(1621683568.566:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14288 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6800000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 538.174457][ T25] audit: type=1326 audit(1621683568.666:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14343 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) write$nbd(r1, &(0x7f0000000180)={0x67446698, 0x1, 0x0, 0x0, 0x4, "f52b0d8492a737c3e45d8c6f2459f87c0837192e989059a5f4c4bfa93436e4022fef0b67c002edad70d36c27a2611dceedcdb4b3792280d61869dba02c5398a678b50a50f3be9a1c888649c36f70be3b6348a4c3e5c25814b616e2175c05150b745cdc0b8a3405929dbc4a4ebb6eec7fcefc1a0c947e8fe168002256"}, 0x8c) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9, 0x0, 0x7eefff7f}}], 0x2102, 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000000)) 11:39:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 538.336973][T14344] loop5: detected capacity change from 0 to 196608 [ 538.361524][T14344] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x30000000000, 0x0) 11:39:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:29 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3100000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:29 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 539.001694][ T25] audit: type=1326 audit(1621683569.496:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14343 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff00000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 539.094741][ T25] audit: type=1326 audit(1621683569.586:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14381 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe83a1b0000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff00000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 2: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r3, 0x4008f50a, &(0x7f0000000100)={0x9, 0x7ff}) r4 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0xc0000) r5 = syz_open_dev$evdev(&(0x7f0000000080), 0xfffffffffffffffd, 0x200) dup3(r4, r5, 0x0) 11:39:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfeffffff00000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 539.238644][T14390] loop5: detected capacity change from 0 to 197120 [ 539.260786][T14390] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 539.372394][T14390] loop5: detected capacity change from 0 to 197120 11:39:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x50000000000, 0x0) 11:39:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff07000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) 11:39:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:30 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3200000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 539.919314][ T25] audit: type=1326 audit(1621683570.416:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14381 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff7f00000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 540.001907][ T25] audit: type=1326 audit(1621683570.496:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14435 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffff00000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) [ 540.093846][T14440] loop5: detected capacity change from 0 to 229376 [ 540.104051][T14440] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffffffffffff}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x26e1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r4, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/241, 0xf1}], 0x9}}], 0x1, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000003, 0x10010, r4, 0x3a590000) fcntl$setpipe(r2, 0x407, 0x20ffffd) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/55, 0x37}, {&(0x7f0000001880)=""/89, 0x59}], 0x3, 0x625ce034, 0xaf41) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) 11:39:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) 11:39:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 540.828935][ T25] audit: type=1326 audit(1621683571.326:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14435 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xc07f00000000, 0x0) 11:39:31 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 11:39:31 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3300000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 540.905079][ T25] audit: type=1326 audit(1621683571.396:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14482 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 11:39:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 541.023907][T14492] loop5: detected capacity change from 0 to 262144 [ 541.032767][T14492] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 11:39:31 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x9, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3200000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xf07f00000000, 0x0) 11:39:32 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3400000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="a06d5c9d8051869e2ed4b1e1dfff9778b8c96bf5c7ab6139de8b1075a16dc4a81a20b2491f38b221eb16cd64f913c8866dc2027b8e0860a3c7740201483e848acd1ff96ff630640c608eb11a333261c817ab97cfd504f2cb5e42cd27fcc449828be3777273a3686e2a89e3315dadfd23e2f44fd90319b98076ded00bbf4cee7047c2364c26edff4c94397a5d7395a4f63920143329d4fabb06334ff76ad4851aebf61ad303369ddd3d2c9b9bf522be53db1df8babdb2f879d5", 0xb9}, {&(0x7f00000000c0)="c2a9315a8ce52fd14d30169181c3f0d4cd99ada9af5ba0cbabfed07e24f696fe668ed2822e37befc08910145fd6350d808a5518bca1f9b159e07297fafb1ee4f51c11d617ad72c30c6052dcba5bc0b23df7261488e4103b1795696eaa12949", 0x5f}], 0x2) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r2, 0x407, 0x20ffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000880)}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) dup2(r1, r5) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x10f040, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, 0x10, r6, 0xab698000) connect$netlink(r4, &(0x7f0000000280)=@kern={0x10, 0x0, 0x0, 0x10}, 0xc) set_mempolicy(0x1, &(0x7f0000000000), 0xfffffffffffffff9) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r7, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9, 0x0, 0x7eefff7f}}], 0x2102, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'ip6gretap0\x00'}) [ 541.737108][ T25] audit: type=1326 audit(1621683572.226:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14482 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 541.835725][ T25] audit: type=1326 audit(1621683572.326:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14539 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 541.989783][T14548] loop5: detected capacity change from 0 to 264192 [ 542.000211][T14548] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 542.142866][T14548] loop5: detected capacity change from 0 to 264192 [ 542.150340][T14548] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xfc7f00000000, 0x0) 11:39:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3500000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) close(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r5 = getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001280)=0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r10 = openat$incfs(0xffffffffffffffff, &(0x7f0000001300)='.log\x00', 0x80, 0x104) preadv(r1, &(0x7f0000001500)=[{&(0x7f00000013c0)=""/17, 0x11}, {&(0x7f0000001400)=""/235, 0xeb}], 0x2, 0x40, 0x0) clone3(&(0x7f0000001340)={0x4000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0), {0x33}, &(0x7f0000000280)=""/4096, 0x1000, &(0x7f0000000180)=""/148, &(0x7f00000012c0)=[r4, r5, 0x0, r6, r7, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, r8, r9], 0xa, {r10}}, 0x58) fcntl$setpipe(r2, 0x407, 0x20ffffd) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) 11:39:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 542.955708][T14598] loop5: detected capacity change from 0 to 264192 [ 542.968688][T14598] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 543.069290][T14598] loop5: detected capacity change from 0 to 264192 [ 543.076802][T14598] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xff7f00000000, 0x0) 11:39:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x1) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:34 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3600000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:34 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 543.570106][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 543.570115][ T25] audit: type=1326 audit(1621683574.066:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14586 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 543.672283][ T25] audit: type=1326 audit(1621683574.166:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14633 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 543.818347][T14644] loop5: detected capacity change from 0 to 264192 [ 543.836102][T14644] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 543.944028][T14644] loop5: detected capacity change from 0 to 264192 [ 543.952241][T14644] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x10000000000000, 0x0) 11:39:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000000)={{0x6a, 0x8}, 0x0, 0x6000000, 0x8001, {0x0, 0x1}, 0x8, 0x8000}) set_mempolicy(0x3, &(0x7f0000002a40)=0x10003, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r4, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:35 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3700000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:35 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xc000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 544.503263][ T25] audit: type=1326 audit(1621683574.996:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14633 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 544.608968][ T25] audit: type=1326 audit(1621683575.106:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14684 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x23}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 544.758445][T14683] loop5: detected capacity change from 0 to 264192 [ 544.780387][T14683] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 544.935769][T14683] loop5: detected capacity change from 0 to 264192 [ 544.943204][T14683] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 545.432716][ T25] audit: type=1326 audit(1621683575.926:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14684 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x20000000000000, 0x0) 11:39:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)={'#! ', './file0', [{0x20, 'memory.events\x00'}, {0x20, 'memory.events\x00'}, {0x20, 'memory.events\x00'}], 0xa, "7786096d899be5f8172b8b31487d2f63cf2d380a0f0c628c5d1066d2bd69800c9ce335f6ea5ec7818164854d71ce97a16bad3a4d748992c1eef0eaaa6aea888f3f244efdcbed42cde715fc03358b9fa5d5c7e8b850e4bc49328dfe54fdd632aac4d59680190e8324dcd621fd62e12dbefce29bb77c7aabfd07302463cc1d235927a9770e9306a199e2dffc7d759b0990232bba47317fd7f0fefaec128428cc19f47aa707569004e8113e6e73d88c35fbd3b22af6c0dfeae630dc4f3db5b2a7babf6b41a56124c82c233ea51bea4fb80268f1c82c698ec13591a7bfe9cb5ad04deb100d67122e5ebc6babef9e95d5794038e20c0aeeba4d51"}, 0x130) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r0, 0x540c) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r2, 0x407, 0x20ffffd) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) 11:39:35 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:35 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 545.528545][ T25] audit: type=1326 audit(1621683576.026:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14726 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:36 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x1) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 545.660902][T14733] loop5: detected capacity change from 0 to 264192 [ 545.680337][T14733] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 545.877192][T14733] loop5: detected capacity change from 0 to 264192 [ 545.888826][T14733] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x40000000000000, 0x0) 11:39:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:36 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3900000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:36 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x1) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:36 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xe000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 546.358956][ T25] audit: type=1326 audit(1621683576.856:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14726 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 546.432174][ T25] audit: type=1326 audit(1621683576.926:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14770 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 546.568573][T14782] loop5: detected capacity change from 0 to 264192 [ 546.605027][T14782] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:37 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x1) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:37 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 546.871112][T14782] loop5: detected capacity change from 0 to 264192 [ 547.260527][ T25] audit: type=1326 audit(1621683577.756:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14770 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x80000000000000, 0x0) 11:39:37 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3a00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:37 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x1) 11:39:37 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:37 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x2000001c}) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 547.358569][ T25] audit: type=1326 audit(1621683577.856:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14830 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 547.475581][T14834] loop5: detected capacity change from 0 to 264192 [ 547.493305][T14834] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:38 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r4 = openat2(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x402, 0x2c, 0x1c}, 0x18) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000a00)={0x0, @vsock={0x28, 0x0, 0x0, @hyper}, @ax25={0x3, @default, 0x4}, @can, 0x81, 0x0, 0x0, 0x0, 0xc0, &(0x7f00000009c0)='netdevsim0\x00', 0x1, 0xc1e, 0x3fe0}) connect$unix(r4, &(0x7f0000000880)=@abs={0x0, 0x0, 0x1}, 0x5a) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9, 0x0, 0x7eefff7f}}], 0x2102, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x8012, r3, 0x7382) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r5, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9, 0x0, 0x7eefff7f}}], 0x2102, 0x0, 0x0) sendmmsg(r5, &(0x7f0000001a00)=[{{&(0x7f0000000900)=@nl=@unspec, 0x80, &(0x7f0000000980)=[{&(0x7f0000000280)="a21d3ffa0877e12a6e", 0x9}], 0x1, &(0x7f0000003440)=ANY=[@ANYBLOB="10100000000000000600000001000000a2d7c1462006e3d878230d89b7135d00dbc275c99dc60b947bb0c292d9848b093ca5db989d9c1c3bfefc168bac27be1a4c9e6ab62beab0e8b8a29e0f2b8547888e570bcd838338c570dcfd89a06bf1716fce478c742c467f3dfdc3b5c2c0e4686c1d1a106c37539e39e45806b9618a29b8c149747bfd3c2e0538c759a917b5482d94abf378a30c8310f04ee47f859b0aaf1a39d7abcc82ace4d71d7f5b28e4f1d9863b20ce14dd034488affd0d9c48e81da6508f1dd6c5b8b54001d7d01abc9c2026a82f7a7897288b116d4189268ba7b051d3aeb2de58ce70e1bfe328682019306aa01a64f60c0e75d8a0cd59bdedd863c7c338fe48404f56187b74bf51e13856c58574c13f139af402423faeb0558284e9407f8e68cc1838525cf154e274f46d68a6baf20fa103f5b4ee52afc4d718c56565ef8cbdbabc6187e1ebd39297a40443e9457ac7190524ac80507c0dacf1a8cdf1a2606e12b9e8c7bfb469fade433768b79ae05c3c113628937e3ed5dd8ea585045d56c5efbef564a955974401d10a20013457ee98b2642f264c4c23fb2e6ff1738965d270749219979e214e9f50594cbbc24b8ceda0d06b8bbf17408be528d26c45883aad630d0671fb67b14656d0cd00b3372c3d5cdc3eca6a2db15fe0d66708fa5863326aa198e7471b08b05aaebc68743d5b3c15a50b25f619a739f8c638737833597c01416731935df9ee500337f95f84fafc70306181d462c77032f653dbe74044988b3df38454636a3ba5bcaf8b57fd4cb6228122e3aaf87ff7ee8ba5124e4f781469248436630f4b6f4d250bd72593b9ceeec604a521e5db0a79cf73f78db4e872ad30f9fb7639f29f4ec8691312a843468bddf65077c8c7fbb905ad325561ebf0b7c1f9ba6c02cade1934811ea2fa7300edba0cef557c555f4d7075d62c1e08d65154033f51d194ac89857abff60c9d97e05090a3380912c00e1fa1d930ee910b2a9e93204e80fca9f80242e3d97ddbd9e648650d2b5cf2daff1819417bb1735a4394a3977482e2fa8c74815b809d64e7425bef7c66cdb6135f75e8931340bf0721ecc38b801ffd99127e0158428d105dc08af0653f30a5e10cf654c7163649b3b2b0313851ef1e6390589f835560d86d239daa340e7aef11ecf6905d3e35561b270441060b13199827582cc077445c868a42c5518f20fc23d214e943d66ed308240741786473c714603e54e7b9ccc78267af7238a9268e74233709e8a27b755c7fdd39e7a5593dbb6821ac68246403efe66baf4c6930d9e2a47f9970aa5fb43062749cf7c3e813fa639059bb51f3380dfafdd553bc5e7e855456771d1f641f577fa80f450d33e756f777d73bb98c2aa2425231115f245d8a4f7d07a03a9e6c99ce4af1baa4705ec4e41f194e99694a25be73bbefe4987d10697de70ac0520dd87a5cf28d9eb56d076cac31aade9f2d60d78d7883a2c1aae2c1e5eb47e07d3a736ac7fbebcdf077fcb2d9f607fe4374a68ff07b9b66034efe3af86099dbb892430ebc84f24f162b49c0a85f049b99716cc03229371fb24c115f5fcca5f3d1c05dc7f17459ae890f4d26090d49c7d16a4339868916da2ce3f90bb41a3c28fd6453bf5a34c69c14623330d2c360e6ee3198dea2c0e4e025502b470e34fbb79d796c136aa1135bb59f2708b057be04642ea3f66619bddd9ef28dc9d688e6703966e53df4f84b8daefdcc4ebe6a89c663abaa3476f9860ed52ea15ba4aa2c9da57ce2643b0d9e13290377bfd09ba99bae9f5a54db3a4736facfac345af6466da1409b7ac2b20dc178440695e43cde175ee9ee280a002a97b0757c260d8561996fab58fe6aadc7039e6aa2e504c8c4c5bc5621bcd0d42748c0ca7615cb1b72b9719db73b3288f01e48fddb73bb53e03740a0d49efd39ebc0062a8abfa93b72445ba1935984beaa571d4b5e9061b80f33032e81e7b857b389546a1b437ad1247f11841cf46bbfda06f9907452aa376f9c006b88f16a8e42418b264e2ac13001963d0a599c20a8ccf8fabd788474cfab3f132303afd9bc313458d8723bf2f32d2cd76c52ab38df7e30a5b253cc1ebe41b238bccd94b02da2721b22210357a70d043bbf2a886e5e9ee04b9197c3080ccf91a094624e148877ceed0ca8f7584046094fde01cff0d3fd304af5323d8d154739a5ae3b994f166f6c3ffe995d0d015b4237b5699638500d5d7f066cf3fd493fedc312edaa307c0ceb6129ba20eca502623155256bad8b7997a684af962e1ab4db03975c2af6226c889b5867585bc6143344181a31908bd7a02d0d9636f0531a1272bb7920d207616c01000d447ba9998d6e779948e3a324a301511cf53a82cf67f3b7130c700725de55f8ca6db34413282f437944755dde596cd5e6f789c5cc9b07a9cb8bc657c87f440b1dd75019c27d0071eaf523326bba44a5ff7c493cbbff971ba6d9344fb9aa149fbd07e65ae63e178b7b28c977c9b7d44f53f4c7b88efc36d39ecc49523ec33077d9a5f703c46c0b0ca8cdf028e32c6e1415584f1744aa37f3d567e9aeb09c23d8be09c5748580a08bec2f929ba31d6a0c4c58c896c7bfeee1eae08fbf5fe38c2062119d2ae6e46aa67729b7ce8f36eed9e88abc9640b1028caa00a6f5c2746653b8098c7487561b9f111edd04e4e4cda1ee4b9539dd731c33412531bb238715a934a4bc52ec8abdcabae4ce990bffd7a4e5120d406e55e48f346a1d0aece46d7766e811ac3c4105abf2469560256ddb306b85c1947b53c804e1777e611de483f6958f33fc0a273c9b034f4a70afe5cba39c7e90604cc6ab8259a34dd6bcbf255fe9794d6dbbcc83b40f11980f55b33a89f1683f55f7e6aa9f7ce6b60bb855dd237a1425c94ecb048f70be75154b3881a8fb4d75a343d78f0fbc8189215c3c04e150084b7d441c168a9e0e4667df564f76a4ddc70626bd3c6e209c5c350dbf408c10a4ffd59b037e186a583e2ea0ab7423e36a1e6cbb8678cdf48cb12e9d7d4296d141cb029f8f8f035b9bd3a3250d699990461fd4ae2d04573960344c7023e366fffb4cf17b142986c97a753f19a38e829c31eefb3fb09dab75ea60db856c2991c5d2b710a3a0ab09fae1f596a193691c0d9503c6883fd861d6e96801e9c0c64289c64cd5c7c06ce235720255014af11a2d85e34d0e7de2b6bbd556abddb1e6d8e818272aedba3e45cb3d46727abd11425524fc1dd5af8496c08018beedaaab05f7a4ac537d272a23e4f2439464252bc41a03daf1645675d11b36163d948f449f804c66382044497a04dfb4f4dca0e1035d9944077cdb37bd63d25e0012f4f50d7e8a38ae453e49b896e91326ece20e9480d75d8dd1d2d71de5b3ab7cf2d0224dc9db6ee3d9c693209ae4b4945b0c9158ef205810acd683656a4449843f48e528a255bba4544fb9f186cbfcd86adb2f2fbec79214b069f61366593ad522a5c3f0943a5bd5e0aa5714d42cb9f0117446121b8268f7c1a52c560aa0d7b70b08e622259a098b1ca4dfea80b4ed4ce6b662b48d1e002a49e4f3ad07672d26dd17f326bfe9d7d0d8cc479d9a896f61aab455cceaf558967fd14972afe8473357e735782b66d0385fda5b76dc56e03d2bc9db178bb83827a6462b0c9a62536079e81cc0534effe419a1f2792065a7c5235f33e01d11adb3feccc6a2bf0db670b40200cb7dab0700d3ff8f47cefce1b3b34d7de775bedf2f95efddc69e4df4cc7bc90589a9a6a0ac59d86247db5ac8f6b574791e9a3e7fb2bb68d54fa2230610d15fede1603b9d9d2cc3602174b1ac29da8fbf89056a5be26291bdd98de3010a97aa6740d4be9d2e172f82616ba487da8096c8a75bb3a7175b59774ba0855b576d540a1753e684078751a888f1de44fdc474a17669456eb8b820fb184bb5005e70c91c61b0da0f7b3f726abc277da646c96b9a9057ade517817577bd88fa65f4ced4451b9ea105fb362bdb4454a47fe9c6c004430d2e2d5978383c31604557cafdf10c64ded78d00e71228617e9db855aa6b024945379c0e61fc58ae4e771084760a371bf8453b9a6e3d1192df64c4312ec64555ef7ac9dcb0579650c7e6bacf5e5f53748c22115d56bf12c1b9e2e259f1a68d208c83980503cfa97d7ef2975c86f913fa6b0176a0f604e3da2f5618e3b1b2634b7ba4421a796481c3f4d2b1bf1dd09c3e133d18a020ac4a53c2a109edeca53fe817314b6f00ee4c671416217aaba3e49183c99780deef7a112f541ab663feacfa38acf731dd0ab613cc3b638445aa9c44cc24eac307721281e4478d6b39a0f9db2943eebfe53585d0166152c8ec8d5c2fcbb383c5c2d8894be941ea766814e7609d0699c6a16381e5e52c5c8af1ade22add17b949fd5822bce54e913e805fa69a82de01d6e4dbc030c8acc3956d9e91c1331d0874daa999f238bdd8bb39ccd6221150dcbb6cb8b0c17b27971b18633e70bcc0b228b70bce72a7a824e5983977de2dc549b8a382cbad230d425b410e67e16f8c67b1a7f548cae326b7bbbcb9d9300c18b5756cbda7002de6c6cde5b17ee1f782a5151909ac4fbfd586650c9bb711fcf36dae90fd72e9a1b76d84b6f22ee88eb8dea547633628c1dd0dd6ee25c17ecf027b52e9b43f1c353665eb1651e00d35d64a24f53d2b2bc578643e130534a1ae28064c55c44b9f64e5522416a0e0ce99c67105ef6897f1759d3cd35fb434b7e372cbde1f39242ad0459958cb732c3b47220e20174aeb72c42a2921ff92244b6f4ccf726af8716d71e6ac02089cc15774915a40494e97e8ae6ef28d01082fe96f18358ae9526621ed9db1a7907ee874c4164c12e647fc0466fa115edc1ca64b9fe9192b60f33d2fb8fe7322d7a49d56b5bac531cbcce34a4adb62edc64457ad190b9bc9adffa39742f4ab2ec5f4d5d27647b223b27e4f8765f117f5932a076d5bc05f556db05a743679a5e5c55f1043330e51c46da2be2ccb83115f2b4413bb6b26bee175f0e0b51a593a93cf011f2c8045a27256cc8f6f724e19169d7a9c5cb277f0c38876011ffd7638820eaf4347dfc7c826f99f180e416ed33fca5588f8ffe53672f43bcfab089617e7764346b7817af3a9ce994b547febfcfc57786d64e83f54eb2bce5db8ad27ae6fcb9bd7f0705910d7e47c7a55b5fe51e6a20177eb9a63514076ce1fad4a0137df1a5e37fa9cf2def763739e5063d8141abc77df857b5ddced76672de230c285020cbf4684635933168383b0237d493df3827e3e2035b791a90c8bfdacf60e71d08c58068aca2280767347f1db541bafe4fb9c16e62352021edb623fcbaefd0d3058d19bc42d0ee916613c22011d5b5f3d1f3d3e3d087dc6f546394fe2390ddf536d92258248d3d865d6bdbbc4dbd115f64da9322b4435bb0f30fecdbc56391bffc71c5b94de578d0acd34c6c1f584dc451dc6c1403b4c7558246c89bac6aef28a31f83d17b0dd8a7dd52a639189156c050c37c215bafdccdc5e0eb5818ae4d6134d3785a23b3263492956f922311265c174003d861976a6659b301cdf3b0722678682cf10b20c6940a90dbf944b86d496934e161b6d68d1fd31879d6f96fc30df8de8b227a78a7ef33762daf10c59e48495300bb6d032cc9d0ff4f02109294b459044d6b3b290f8dbf8a473ab1ae99b73d8bb4175a300ac69c8d968df7806c23f62e310dbfd7065e966d867a5c5bf5bea4dff1d3aae46394a0a9e6bdb00907d37e1bc94f3f8ceaf91c12a839abe9cfba698c53f3f8ee39d85657954fdb88700dbea237ba873f7596d8d808532ae6e2eae29cf89b6553e543ed70e1ece45b4a93e6ebfff6eb6e07eebc3a83c072c64425b5c7023a8ed7d28cfa4fa738dea94371a2bf6ebc02b76f79969947471b8481c4de29c9f05b43e5d4d0f46ecbd0f7acff6e87f5d7c79b9c82b636d4ad9d90698956112a0967cdb1c5a92f98758fb4d9a66fb76a9c2951a8819bac9b0206c217b0fe10ab019894aa5205b0fee47072f701603d16fa91752beac51c8b6d110b6de6881f80fdd6729cbb78c217eb7"], 0x1010}}], 0x1, 0x0) 11:39:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:38 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3b00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 547.710420][T14834] loop5: detected capacity change from 0 to 264192 11:39:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x90920000c9ffff, 0x0) 11:39:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:38 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:38 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3c00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x1) 11:39:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 548.356436][T14885] loop5: detected capacity change from 0 to 264192 [ 548.372985][T14885] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) r3 = eventfd2(0x1, 0x40000) write$binfmt_misc(r3, &(0x7f0000000280)={'syz0', "6c12721582561c4bc5d1621d2b7bb1f4c8fc7d16d495bd297bbb5001b9f6e53958a978166ca02175aad362eba3c290e87e728ea735c32086ec6c7b76aeb23a32f98369c33bc00b8e6e040b409978e5fb262bad80655588e00b42dd97697a829befc195623d70ae4cfe650130a547bfdd9d89ccc9459f00bbb84b9b7f7c3db05ef33af1b546a5e1356986ac43c296701618e17d7f447a7c69ac9d4480e75c05e72b2446397e29967ad6bfc8e86cae6769691017b7cd963d2b84c7f24cd05899b44a54b3607e6cb2bedcca12708213438cd38f59a3657060916af16345a244433f14f30b"}, 0xe7) 11:39:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:39 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3d00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 548.573739][T14885] loop5: detected capacity change from 0 to 264192 [ 548.593797][T14885] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x100000000000000, 0x0) 11:39:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:39 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) set_mempolicy(0x4000, &(0x7f0000000000)=0x100000000, 0x7) 11:39:39 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3e00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:39 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x1) [ 549.098201][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 549.098213][ T25] audit: type=1326 audit(1621683579.596:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14882 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 549.195566][ T25] audit: type=1326 audit(1621683579.686:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14945 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x6, &(0x7f0000000040)=[{0x7, 0x3, 0x20, 0xd28}, {0x5, 0x4, 0xbb, 0x3}, {0x4, 0x0, 0x6, 0xa4}, {0x337, 0x1, 0x9, 0x8000}, {0x0, 0x7, 0x20, 0x2}, {0x26, 0x1, 0x36, 0x40}]}) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x9) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 549.321992][T14947] loop5: detected capacity change from 0 to 264192 [ 549.342461][T14947] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:39 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x200000000000000, 0x0) 11:39:40 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x12000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:40 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:40 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) set_mempolicy(0x0, &(0x7f0000000000)=0x4, 0xdd4b) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 550.026670][ T25] audit: type=1326 audit(1621683580.516:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14945 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 550.121115][ T25] audit: type=1326 audit(1621683580.616:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14994 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 550.218787][T15002] loop5: detected capacity change from 0 to 264192 [ 550.242817][T15002] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:40 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:40 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x13000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 550.597027][T15036] loop5: detected capacity change from 0 to 264192 [ 550.607594][T15036] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x300000000000000, 0x0) 11:39:41 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x4000080000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:41 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x9, 0x5) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/141, 0x8d}, {&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000280)=""/158, 0x9e}, {&(0x7f0000000340)=""/252, 0xfc}], 0x4) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) openat$cgroup_devices(r2, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) 11:39:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:41 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:41 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x14000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 550.949182][ T25] audit: type=1326 audit(1621683581.446:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14994 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 551.042996][ T25] audit: type=1326 audit(1621683581.536:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15050 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 551.139457][T15059] loop5: detected capacity change from 0 to 264192 [ 551.150152][T15059] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:41 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x15000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 551.462836][T15095] loop5: detected capacity change from 0 to 264192 [ 551.472391][T15095] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) 11:39:42 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0x0, &(0x7f0000000040)=0x7fffffff, 0x8a) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0xd0, 0x6, 0x5, 0x9224, 0x3, 0x3e, 0xac, 0x34, 0x40, 0x12d, 0x1d, 0x4, 0x38, 0x2, 0x0, 0x3c1, 0x8}, [{0x7, 0x72dec413, 0x4, 0x6, 0x9, 0x4, 0xe852, 0x2}, {0x6, 0x3ff, 0x73, 0x10001, 0xfffffffffffffffb, 0x3, 0x5, 0x6}], "1dfff9ac4fb8f6200f7c63f2ce5f83113fe9b8cfe034547a69d8a58f79345193972a87005c801d64b6f32cb4d05fd3c9d6c77fc1c97a572ccdae037adb9491c3272d0e8c04c95ed2f5a2c66e15f638", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ff) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000180)=""/107, 0x6b}], 0x1, 0xffffff81, 0x3) 11:39:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:42 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x4402000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:42 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x16000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 551.876810][ T25] audit: type=1326 audit(1621683582.366:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15050 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 551.981766][ T25] audit: type=1326 audit(1621683582.476:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15124 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:42 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 552.111449][T15127] loop5: detected capacity change from 0 to 264192 [ 552.124443][T15127] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000a00)='./file0\x00', 0x200101, 0x4) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9, 0x0, 0x7eefff7f}}], 0x2102, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f00000009c0)={0xa, &(0x7f0000000880)=[{0x5, 0xf0, &(0x7f0000000280)="02c47440d222b554849fd8d52c50d960f8abdf53ebceaf7c77d65e9ed8b8a05ba29ba50040990cc96359eaa5658b18a85243fe905d17456d26a618fe3e570de97b6f6eb481a436d6a07f479def4d9f973ea5f7147655a8b3920eeb3110c9ec601829b962647870a3fc762ce1204e4e3aecbb1dc3d5f29e379d8ddf2c9ecc576e31b710006891363f5cfc1e02a842af512aca23bd454863780f680106ad9efca7d952cf2546459836b867c54d44a0938d861201f37e95338e992a54ca2f98de4ed38ece12f8e62415cdc9d9a2a7c0e7aa0b4fc914dc41f0de6c356d444934e53288d160e54623b7fb46d0b174f915beb3", 0x1, 0x1}, {0x667d, 0xee, &(0x7f0000000380)="2f9cdf7c46c6c3a024c8d64594b6addc68fdfba9aa029ca4688d2d1a9ab29ce242fa78d3fc6c92b848bd47c1b084840acfc62cec9b80261ebade42e10171f8f03205d5459272198fc697799aa59f7c7cd197513f4f27ee0560709a1c63b2e1e78f45604f9311133f92f407b30ddd5f73b959b904505d2b32408ff612af7698e713fa85b3ff6ec2cf37daf6b45f02d96583a1a2b543ef7183d49642cbb4423e935abcbd4c18ed90ae9105f286e1160258f04c28c957a2fe2a1acf42b4b3cc0bfe14830f6b1e784c740612c777e5407279c268384f1d21bc531ec0fd63f6a8374b93962da70d5037d88cc2ce94da0b", 0x0, 0x1}, {0x7e, 0xff, &(0x7f0000000480)="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", 0x1, 0x1}, {0x7, 0x3b, &(0x7f0000000000)="0861972c8842cc0ead7291b28db804c81bb5a29902a93bbe0fa19dc1c2f9767f9a77a4c831887feda2e9298cd90fd7f0f4e188d793d3110aeee47e", 0x1}, {0x9, 0xb4, &(0x7f0000000180)="f0ab07f9b211f1f61295049f4d617d7269041b61b1cf205734ca51db3afebc487b4ae1f7812318e5cd9400bee469874c9a6a941d08e522bc12b0b84e467c29ff7621b98fb60f239ee6f5cb4207673b43b6fe7ea920157979c3be565b2f709a5dc637c6a38b0298cde14de00968f919bae3fd26e80e461236f0aa602f8941124db77fbf631c452dc87dd2db36b4353ded18b8a1facec66e4d6d56cbcad7f2e35f3b9bf96384a8a390af920587896d07e128816349", 0x1, 0x1}, {0x1, 0xf3, &(0x7f0000000580)="61455b2178a47a049d453b95780bd252c65d7b62c05ebe25ef1eb6e60a3af5d995d0247b76eb5a6ee9e341f3ab8fe850389779effa0c95fcd81fbd21843d89852ff99f9a2cdbe7f672c0f3a24eb081f99a13bd4e55f6442db6df3e03563378df97de04912644512077699631c5f8d4c2236dc315dd03a19b2754942b6eca95d4413fe2dff029333cd7bff21cc309fd65fcdaac7688d11b961c9be146cff54e527bd3825712a41e381e8e8d3256cc35ddfefc4cc5073f558787c089fcc253555c316afc55c465355c8ecbf91dbd7947d0576825a4f2263418f7ccb99652883614762f58aa8bc2c44a1b6afbab106a67ec8d04be", 0x1, 0x1}, {0x493c, 0x70, &(0x7f00000000c0)="3f45eebbc11f5cf8cf026f7f2639cdbe133d99852ff0bd8d9fd5c4a2c4801a582e248aec738b2e45ab7550c967a1ec396690c811343387021c0d10919b7d249f332038e181554d0c805594dc6b304db994ecbf8e76963c5159bdb8a9b45b1018efbaac5157e2cb88bcf8cc3ac82e1d00", 0x1}, {0x0, 0xf3, &(0x7f0000000680)="9e8f59fb9f6275b36014c84ef3d38af822e64ec8b505b1c7a84bc67a4c157aa332cd663df2151120d08851371bfda2f49ba05c36735bc7568a1a468648e6309b5d5d6da97d9cad7aa29bd95a6a72777ef4ec6cb269e01389bc4e3792abdba371d0542e70457c55a9e36684118d1fe152654f4db338dcf8f074d0e5a6bfa20f264691130d557458879c02e01a4df52d0ad45c8b1b833ef1382e8338ac6d3ff26fb8e20408d39c47895776c8a801ff1c14bbb3cd2d7d231e34cd34e258aa8f224f82c2dc25917571432300d3cd14ba509af80f777fe8f7708900e19bf0fee4d4c7be3132fa23eea10fa3201a330c75bace3ddfd9", 0x1, 0x1}, {0x2, 0x3d, &(0x7f0000000040)="0d515ff6aef2a9047d45014c4dddef76af171d239ffe38900d67e820ae72ef95a6426b04b633c1435e84c9a20bbfd1e9ada54049498a00686755c94242"}, {0xfffffffb, 0xea, &(0x7f0000000780)="d13684b202d4eb66434ee3dabc395a9cabbbccab5fce2dea10eeb828e40933adbf08ecf00fb71572a3fb5e3907689fc3008a84dedbe68ea92ece73cc316cc6e264aecd529c0a18c7ade3cd6cdc6f125b62676327853941b8390986ec5d5160662787afaebd9f26247d9dcea621538cc1e05ed61ec8d98d8d85215b39a16aaaeca51c7de260d3b8e2e9e22b00107b602a8fe0e6ca389f45ef408c6f60c12acca3e80557b761ebe17b41e468c2deb426cde9f3c8cc4cee66a7c836b21b3093a1778008374f4184e6f8caffb99618c225eb81fe2858306d6b301f54cd6d799835d9425eae231dd8a8560ff0"}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) set_mempolicy(0x2, &(0x7f0000000a80)=0x14e, 0x9) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000a40)=0x6, 0x4) fcntl$setpipe(r2, 0x407, 0x20ffffd) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) [ 552.804950][ T25] audit: type=1326 audit(1621683583.296:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15124 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x500000000000000, 0x0) 11:39:43 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x17000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:43 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x4800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:43 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) set_mempolicy(0xd156a613c252341d, &(0x7f0000000040)=0xffffffff7fffffff, 0x8b7a) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 552.893587][ T25] audit: type=1326 audit(1621683583.386:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15180 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 552.988076][T15184] loop5: detected capacity change from 0 to 264192 [ 552.997537][T15184] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:43 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) set_mempolicy(0x0, &(0x7f0000000000)=0xfffffffffffffffa, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 553.290411][T15220] loop5: detected capacity change from 0 to 264192 [ 553.299689][T15220] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x600000000000000, 0x0) 11:39:44 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x4c00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:44 executing program 2 (fault-call:1 fault-nth:0): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:44 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x19000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 553.806878][T15241] FAULT_INJECTION: forcing a failure. [ 553.806878][T15241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 553.819957][T15241] CPU: 1 PID: 15241 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 553.828789][T15241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.838842][T15241] Call Trace: [ 553.842121][T15241] dump_stack+0x137/0x19d [ 553.846455][T15241] should_fail+0x23c/0x250 [ 553.850855][T15241] should_fail_usercopy+0x16/0x20 [ 553.855867][T15241] _copy_from_user+0x1c/0xd0 [ 553.860487][T15241] perf_copy_attr+0x156/0x650 [ 553.865157][T15241] __se_sys_perf_event_open+0xb6/0x2740 [ 553.870682][T15241] ? vfs_write+0x50c/0x770 [ 553.875081][T15241] __x64_sys_perf_event_open+0x63/0x70 [ 553.880593][T15241] do_syscall_64+0x4a/0x90 [ 553.884990][T15241] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 553.890864][T15241] RIP: 0033:0x4665d9 [ 553.894734][T15241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.914315][T15241] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 553.922707][T15241] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 553.930686][T15241] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 553.938631][T15241] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 553.946588][T15241] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 553.954536][T15241] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:44 executing program 2 (fault-call:1 fault-nth:1): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x700000000000000, 0x0) 11:39:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 554.117649][T15262] FAULT_INJECTION: forcing a failure. [ 554.117649][T15262] name failslab, interval 1, probability 0, space 0, times 0 [ 554.130384][T15262] CPU: 1 PID: 15262 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 554.139132][T15262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.149182][T15262] Call Trace: [ 554.152456][T15262] dump_stack+0x137/0x19d [ 554.156820][T15262] should_fail+0x23c/0x250 [ 554.161210][T15262] __should_failslab+0x81/0x90 [ 554.165951][T15262] should_failslab+0x5/0x20 [ 554.170453][T15262] kmem_cache_alloc_node+0x58/0x2b0 [ 554.175630][T15262] ? cred_has_capability+0x1af/0x210 [ 554.180935][T15262] ? perf_event_alloc+0x160/0x1790 [ 554.186023][T15262] perf_event_alloc+0x160/0x1790 [ 554.191016][T15262] __se_sys_perf_event_open+0x5c7/0x2740 [ 554.196629][T15262] ? vfs_write+0x50c/0x770 [ 554.201022][T15262] __x64_sys_perf_event_open+0x63/0x70 [ 554.206522][T15262] do_syscall_64+0x4a/0x90 [ 554.210939][T15262] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 554.216895][T15262] RIP: 0033:0x4665d9 [ 554.220770][T15262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.240443][T15262] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 554.248855][T15262] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 554.256841][T15262] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 554.264790][T15262] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 554.272737][T15262] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 554.280720][T15262] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 554.309799][T15244] loop5: detected capacity change from 0 to 264192 [ 554.322183][T15244] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 554.340549][ T25] kauditd_printk_skb: 2 callbacks suppressed 11:39:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 554.340557][ T25] audit: type=1326 audit(1621683584.836:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15266 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:44 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x5252614100000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x800000000000000, 0x0) 11:39:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1a000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:45 executing program 2 (fault-call:1 fault-nth:2): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x23000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 554.511490][ T25] audit: type=1326 audit(1621683585.006:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 554.597238][T15299] FAULT_INJECTION: forcing a failure. [ 554.597238][T15299] name failslab, interval 1, probability 0, space 0, times 0 [ 554.610018][T15299] CPU: 0 PID: 15299 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 554.618770][T15299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.628835][T15299] Call Trace: [ 554.632224][T15299] dump_stack+0x137/0x19d [ 554.636553][T15299] should_fail+0x23c/0x250 [ 554.640987][T15299] ? perf_uprobe_init+0x45/0x140 [ 554.645960][T15299] __should_failslab+0x81/0x90 [ 554.650838][T15299] should_failslab+0x5/0x20 [ 554.655353][T15299] __kmalloc_track_caller+0x64/0x340 [ 554.660125][T15298] loop5: detected capacity change from 0 to 264192 [ 554.660635][T15299] ? strnlen_user+0x137/0x1c0 [ 554.671885][T15299] strndup_user+0x73/0x120 [ 554.676284][T15299] perf_uprobe_init+0x45/0x140 [ 554.681025][T15299] perf_uprobe_event_init+0xde/0x140 [ 554.686300][T15299] perf_try_init_event+0x21a/0x400 [ 554.691404][T15299] perf_event_alloc+0xa60/0x1790 [ 554.696338][T15299] __se_sys_perf_event_open+0x5c7/0x2740 [ 554.701981][T15299] ? vfs_write+0x50c/0x770 [ 554.706375][T15299] __x64_sys_perf_event_open+0x63/0x70 [ 554.711814][T15299] do_syscall_64+0x4a/0x90 [ 554.716318][T15299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 554.722196][T15299] RIP: 0033:0x4665d9 [ 554.726089][T15299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.745672][T15299] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 554.754058][T15299] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 554.762013][T15299] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 554.769973][T15299] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 554.777950][T15299] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 554.785900][T15299] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 554.794840][T15298] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:45 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:45 executing program 2 (fault-call:1 fault-nth:3): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 554.975434][T15318] FAULT_INJECTION: forcing a failure. [ 554.975434][T15318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 554.988616][T15318] CPU: 0 PID: 15318 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 554.997412][T15318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.007463][T15318] Call Trace: [ 555.010744][T15318] dump_stack+0x137/0x19d [ 555.015073][T15318] should_fail+0x23c/0x250 [ 555.019582][T15318] should_fail_usercopy+0x16/0x20 [ 555.024649][T15318] _copy_from_user+0x1c/0xd0 [ 555.029226][T15318] strndup_user+0xb0/0x120 [ 555.033646][T15318] perf_uprobe_init+0x45/0x140 [ 555.038399][T15318] perf_uprobe_event_init+0xde/0x140 [ 555.043710][T15318] perf_try_init_event+0x21a/0x400 [ 555.048809][T15318] perf_event_alloc+0xa60/0x1790 [ 555.053734][T15318] __se_sys_perf_event_open+0x5c7/0x2740 [ 555.059356][T15318] ? vfs_write+0x50c/0x770 [ 555.063762][T15318] __x64_sys_perf_event_open+0x63/0x70 [ 555.069395][T15318] do_syscall_64+0x4a/0x90 11:39:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1b000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:45 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x5802000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:45 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 555.073810][T15318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 555.079704][T15318] RIP: 0033:0x4665d9 [ 555.083586][T15318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.103186][T15318] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 555.111604][T15318] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 555.119581][T15318] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 555.127540][T15318] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 555.136039][T15318] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 555.144040][T15318] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x900000000000000, 0x0) 11:39:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:45 executing program 2 (fault-call:1 fault-nth:4): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:45 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:45 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x5902000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 555.327913][ T25] audit: type=1326 audit(1621683585.816:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 555.352072][T15334] loop5: detected capacity change from 0 to 264192 [ 555.359464][T15334] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 555.437302][ T25] audit: type=1326 audit(1621683585.926:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15346 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 555.465629][T15349] FAULT_INJECTION: forcing a failure. [ 555.465629][T15349] name failslab, interval 1, probability 0, space 0, times 0 [ 555.478381][T15349] CPU: 1 PID: 15349 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 555.487141][T15349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.497184][T15349] Call Trace: [ 555.500452][T15349] dump_stack+0x137/0x19d [ 555.504861][T15349] should_fail+0x23c/0x250 [ 555.509297][T15349] ? getname_kernel+0x37/0x1d0 [ 555.514043][T15349] __should_failslab+0x81/0x90 [ 555.518801][T15349] should_failslab+0x5/0x20 [ 555.523324][T15349] kmem_cache_alloc+0x46/0x2f0 [ 555.529964][T15349] getname_kernel+0x37/0x1d0 11:39:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 555.534665][T15349] kern_path+0x19/0x40 [ 555.538739][T15349] create_local_trace_uprobe+0x3f/0x3c0 [ 555.544309][T15349] perf_uprobe_init+0xbe/0x140 [ 555.549073][T15349] perf_uprobe_event_init+0xde/0x140 [ 555.554355][T15349] perf_try_init_event+0x21a/0x400 [ 555.559505][T15349] perf_event_alloc+0xa60/0x1790 [ 555.564437][T15349] __se_sys_perf_event_open+0x5c7/0x2740 [ 555.570068][T15349] ? vfs_write+0x50c/0x770 [ 555.574471][T15349] __x64_sys_perf_event_open+0x63/0x70 [ 555.579928][T15349] do_syscall_64+0x4a/0x90 [ 555.584371][T15349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 555.590336][T15349] RIP: 0033:0x4665d9 [ 555.594331][T15349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.613939][T15349] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 555.622339][T15349] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 555.630298][T15349] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 555.636696][T15334] loop5: detected capacity change from 0 to 264192 [ 555.638256][T15349] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 555.638269][T15349] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 555.638279][T15349] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:46 executing program 2 (fault-call:1 fault-nth:5): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:46 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1c000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:46 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x6000000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 555.776209][T15366] FAULT_INJECTION: forcing a failure. [ 555.776209][T15366] name failslab, interval 1, probability 0, space 0, times 0 [ 555.788945][T15366] CPU: 1 PID: 15366 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 555.797698][T15366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.807820][T15366] Call Trace: [ 555.811090][T15366] dump_stack+0x137/0x19d [ 555.815493][T15366] should_fail+0x23c/0x250 [ 555.819957][T15366] __should_failslab+0x81/0x90 11:39:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 555.824777][T15366] ? proc_self_get_link+0x90/0x100 [ 555.829876][T15366] should_failslab+0x5/0x20 [ 555.834431][T15366] kmem_cache_alloc_trace+0x49/0x310 [ 555.839715][T15366] proc_self_get_link+0x90/0x100 [ 555.844651][T15366] ? proc_setup_self+0x1d0/0x1d0 [ 555.849640][T15366] step_into+0x9b4/0xec0 [ 555.853947][T15366] walk_component+0x190/0x350 [ 555.858789][T15366] link_path_walk+0x4ba/0x780 [ 555.863465][T15366] path_lookupat+0x7b/0x570 [ 555.867964][T15366] filename_lookup+0xff/0x390 [ 555.872653][T15366] ? kmem_cache_alloc+0x201/0x2f0 [ 555.877672][T15366] ? getname_kernel+0x37/0x1d0 [ 555.882508][T15366] kern_path+0x2e/0x40 [ 555.886567][T15366] create_local_trace_uprobe+0x3f/0x3c0 [ 555.892110][T15366] perf_uprobe_init+0xbe/0x140 [ 555.896917][T15366] perf_uprobe_event_init+0xde/0x140 [ 555.902208][T15366] perf_try_init_event+0x21a/0x400 [ 555.907323][T15366] perf_event_alloc+0xa60/0x1790 [ 555.912261][T15366] __se_sys_perf_event_open+0x5c7/0x2740 [ 555.917951][T15366] ? vfs_write+0x50c/0x770 [ 555.922420][T15366] __x64_sys_perf_event_open+0x63/0x70 [ 555.927897][T15366] do_syscall_64+0x4a/0x90 [ 555.932365][T15366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 555.938279][T15366] RIP: 0033:0x4665d9 [ 555.942177][T15366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.961800][T15366] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 555.970318][T15366] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 555.978324][T15366] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 555.986279][T15366] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 555.994243][T15366] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 556.002199][T15366] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 556.164324][T15379] loop5: detected capacity change from 0 to 264192 [ 556.173107][T15379] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 556.269204][ T25] audit: type=1326 audit(1621683586.766:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15346 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xa00000000000000, 0x0) 11:39:46 executing program 2 (fault-call:1 fault-nth:6): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:46 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x6800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) 11:39:46 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1d000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 556.368592][ T25] audit: type=1326 audit(1621683586.866:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15397 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 556.375144][T15399] FAULT_INJECTION: forcing a failure. [ 556.375144][T15399] name failslab, interval 1, probability 0, space 0, times 0 [ 556.405145][T15399] CPU: 0 PID: 15399 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 556.414033][T15399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.425362][T15399] Call Trace: [ 556.428656][T15399] dump_stack+0x137/0x19d [ 556.433041][T15399] should_fail+0x23c/0x250 [ 556.437547][T15399] __should_failslab+0x81/0x90 [ 556.442363][T15399] ? create_local_trace_uprobe+0xa9/0x3c0 [ 556.448085][T15399] should_failslab+0x5/0x20 [ 556.452616][T15399] kmem_cache_alloc_trace+0x49/0x310 [ 556.457912][T15399] create_local_trace_uprobe+0xa9/0x3c0 [ 556.463453][T15399] perf_uprobe_init+0xbe/0x140 [ 556.468209][T15399] perf_uprobe_event_init+0xde/0x140 [ 556.473495][T15399] perf_try_init_event+0x21a/0x400 [ 556.478605][T15399] perf_event_alloc+0xa60/0x1790 [ 556.483632][T15399] __se_sys_perf_event_open+0x5c7/0x2740 [ 556.489274][T15399] ? vfs_write+0x50c/0x770 [ 556.493757][T15399] __x64_sys_perf_event_open+0x63/0x70 [ 556.499270][T15399] do_syscall_64+0x4a/0x90 [ 556.503809][T15399] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.509712][T15399] RIP: 0033:0x4665d9 [ 556.513599][T15399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 556.533239][T15399] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 556.541643][T15399] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 556.549603][T15399] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 556.557628][T15399] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 11:39:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) 11:39:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) 11:39:47 executing program 0: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:47 executing program 0: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 556.565596][T15399] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 556.573894][T15399] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 556.581953][T15399] trace_uprobe: Failed to allocate trace_uprobe.(-12) 11:39:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 556.721578][T15415] loop5: detected capacity change from 0 to 264192 [ 556.731384][T15415] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:47 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x6911000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xb00000000000000, 0x0) 11:39:47 executing program 0: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:47 executing program 2 (fault-call:1 fault-nth:7): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:47 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1e000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 557.196663][ T25] audit: type=1326 audit(1621683587.686:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15397 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 557.302252][ T25] audit: type=1326 audit(1621683587.796:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15440 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 557.332006][T15445] FAULT_INJECTION: forcing a failure. [ 557.332006][T15445] name failslab, interval 1, probability 0, space 0, times 0 [ 557.344666][T15445] CPU: 0 PID: 15445 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 557.353450][T15445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.363544][T15445] Call Trace: [ 557.366816][T15445] dump_stack+0x137/0x19d [ 557.371147][T15445] should_fail+0x23c/0x250 [ 557.375711][T15445] ? kzalloc+0x16/0x20 [ 557.379787][T15445] __should_failslab+0x81/0x90 [ 557.384581][T15445] should_failslab+0x5/0x20 [ 557.389099][T15445] __kmalloc+0x66/0x340 [ 557.393276][T15445] kzalloc+0x16/0x20 [ 557.397166][T15445] trace_probe_init+0x41/0x250 [ 557.401931][T15445] create_local_trace_uprobe+0xd1/0x3c0 [ 557.407505][T15445] perf_uprobe_init+0xbe/0x140 [ 557.412266][T15445] perf_uprobe_event_init+0xde/0x140 [ 557.417561][T15445] perf_try_init_event+0x21a/0x400 [ 557.422923][T15445] perf_event_alloc+0xa60/0x1790 [ 557.427863][T15445] __se_sys_perf_event_open+0x5c7/0x2740 [ 557.433592][T15445] ? vfs_write+0x50c/0x770 [ 557.438095][T15445] __x64_sys_perf_event_open+0x63/0x70 [ 557.443578][T15445] do_syscall_64+0x4a/0x90 [ 557.447990][T15445] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.453888][T15445] RIP: 0033:0x4665d9 [ 557.454544][T15437] loop5: detected capacity change from 0 to 264192 [ 557.457772][T15445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 557.484204][T15445] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 557.492797][T15445] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 11:39:47 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 557.500755][T15445] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 557.508710][T15445] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 557.516691][T15445] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 557.524730][T15445] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 557.532824][T15445] trace_uprobe: Failed to allocate trace_uprobe.(-12) 11:39:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 557.589279][T15437] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:48 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:48 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x6c00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:48 executing program 2 (fault-call:1 fault-nth:8): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 557.802818][T15474] FAULT_INJECTION: forcing a failure. [ 557.802818][T15474] name failslab, interval 1, probability 0, space 0, times 0 [ 557.815457][T15474] CPU: 1 PID: 15474 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 557.824281][T15474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.834366][T15474] Call Trace: [ 557.837648][T15474] dump_stack+0x137/0x19d [ 557.841987][T15474] should_fail+0x23c/0x250 [ 557.846389][T15474] ? trace_probe_init+0x1bd/0x250 [ 557.851427][T15474] __should_failslab+0x81/0x90 [ 557.856214][T15474] should_failslab+0x5/0x20 [ 557.860748][T15474] __kmalloc_track_caller+0x64/0x340 [ 557.866024][T15474] ? __kmalloc+0x23d/0x340 [ 557.870491][T15474] ? kzalloc+0x16/0x20 [ 557.874563][T15474] kstrdup+0x31/0x70 [ 557.878448][T15474] trace_probe_init+0x1bd/0x250 [ 557.883366][T15474] create_local_trace_uprobe+0xd1/0x3c0 [ 557.888942][T15474] perf_uprobe_init+0xbe/0x140 [ 557.893717][T15474] perf_uprobe_event_init+0xde/0x140 [ 557.899062][T15474] perf_try_init_event+0x21a/0x400 [ 557.904172][T15474] perf_event_alloc+0xa60/0x1790 [ 557.909152][T15474] __se_sys_perf_event_open+0x5c7/0x2740 [ 557.914773][T15474] ? vfs_write+0x50c/0x770 [ 557.919178][T15474] __x64_sys_perf_event_open+0x63/0x70 [ 557.924626][T15474] do_syscall_64+0x4a/0x90 [ 557.929092][T15474] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.935009][T15474] RIP: 0033:0x4665d9 [ 557.938980][T15474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 557.958623][T15474] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 557.967094][T15474] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 557.975062][T15474] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 557.983017][T15474] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 557.990970][T15474] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 557.998965][T15474] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 558.007074][T15474] trace_uprobe: Failed to allocate trace_uprobe.(-12) 11:39:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xc00000000000000, 0x0) 11:39:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:48 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1f000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:48 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7272416100000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:48 executing program 2 (fault-call:1 fault-nth:9): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 558.131441][ T25] audit: type=1326 audit(1621683588.626:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15440 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 558.219032][T15490] FAULT_INJECTION: forcing a failure. [ 558.219032][T15490] name failslab, interval 1, probability 0, space 0, times 0 [ 558.231671][T15490] CPU: 0 PID: 15490 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 558.240434][T15490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.250550][T15490] Call Trace: [ 558.253825][T15490] dump_stack+0x137/0x19d [ 558.258257][T15490] should_fail+0x23c/0x250 [ 558.262755][T15490] ? trace_probe_init+0x1e1/0x250 [ 558.267779][T15490] __should_failslab+0x81/0x90 [ 558.272612][T15490] should_failslab+0x5/0x20 [ 558.277188][T15490] __kmalloc_track_caller+0x64/0x340 [ 558.282492][T15490] ? trace_probe_init+0x1bd/0x250 [ 558.287527][T15490] kstrdup+0x31/0x70 [ 558.291429][T15490] trace_probe_init+0x1e1/0x250 [ 558.296300][T15490] create_local_trace_uprobe+0xd1/0x3c0 [ 558.301897][T15490] perf_uprobe_init+0xbe/0x140 [ 558.306659][T15490] perf_uprobe_event_init+0xde/0x140 [ 558.311970][T15490] perf_try_init_event+0x21a/0x400 [ 558.317112][T15490] perf_event_alloc+0xa60/0x1790 [ 558.322038][T15490] __se_sys_perf_event_open+0x5c7/0x2740 [ 558.327732][T15490] ? vfs_write+0x50c/0x770 [ 558.328318][T15492] loop5: detected capacity change from 0 to 264192 [ 558.332135][T15490] __x64_sys_perf_event_open+0x63/0x70 [ 558.332155][T15490] do_syscall_64+0x4a/0x90 [ 558.348483][T15490] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 558.354386][T15490] RIP: 0033:0x4665d9 [ 558.358259][T15490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.377857][T15490] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 558.386300][T15490] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 558.394324][T15490] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 558.402285][T15490] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 558.410239][T15490] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 11:39:48 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) [ 558.418187][T15490] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 558.426198][T15490] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 558.438145][ T25] audit: type=1326 audit(1621683588.936:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15485 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:49 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) [ 558.454156][T15492] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:49 executing program 2 (fault-call:1 fault-nth:10): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:49 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) [ 558.581192][T15516] FAULT_INJECTION: forcing a failure. [ 558.581192][T15516] name failslab, interval 1, probability 0, space 0, times 0 [ 558.593933][T15516] CPU: 1 PID: 15516 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 558.602712][T15516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.612760][T15516] Call Trace: [ 558.616031][T15516] dump_stack+0x137/0x19d [ 558.620356][T15516] should_fail+0x23c/0x250 [ 558.624770][T15516] ? create_local_trace_uprobe+0x235/0x3c0 11:39:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 558.630576][T15516] __should_failslab+0x81/0x90 [ 558.635331][T15516] should_failslab+0x5/0x20 [ 558.639832][T15516] __kmalloc_track_caller+0x64/0x340 [ 558.645112][T15516] ? kstrdup+0x4c/0x70 [ 558.649184][T15516] kstrdup+0x31/0x70 [ 558.653069][T15516] create_local_trace_uprobe+0x235/0x3c0 [ 558.658796][T15516] perf_uprobe_init+0xbe/0x140 [ 558.663551][T15516] perf_uprobe_event_init+0xde/0x140 [ 558.668893][T15516] perf_try_init_event+0x21a/0x400 [ 558.674052][T15516] perf_event_alloc+0xa60/0x1790 [ 558.678975][T15516] __se_sys_perf_event_open+0x5c7/0x2740 [ 558.684614][T15516] ? vfs_write+0x50c/0x770 [ 558.689024][T15516] __x64_sys_perf_event_open+0x63/0x70 [ 558.694470][T15516] do_syscall_64+0x4a/0x90 [ 558.698917][T15516] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 558.704830][T15516] RIP: 0033:0x4665d9 [ 558.708717][T15516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.728403][T15516] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 558.736820][T15516] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 558.744786][T15516] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 558.753061][T15516] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 558.761156][T15516] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 558.769132][T15516] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xd00000000000000, 0x0) 11:39:49 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:49 executing program 2 (fault-call:1 fault-nth:11): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:49 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 559.151364][T15542] FAULT_INJECTION: forcing a failure. [ 559.151364][T15542] name failslab, interval 1, probability 0, space 0, times 0 [ 559.164033][T15542] CPU: 1 PID: 15542 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 559.172794][T15542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.182840][T15542] Call Trace: [ 559.186114][T15542] dump_stack+0x137/0x19d [ 559.190609][T15542] should_fail+0x23c/0x250 [ 559.195015][T15542] ? traceprobe_set_print_fmt+0x45/0xa0 11:39:49 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 559.200557][T15542] __should_failslab+0x81/0x90 [ 559.205334][T15542] should_failslab+0x5/0x20 [ 559.209861][T15542] __kmalloc+0x66/0x340 [ 559.214066][T15542] ? __kmalloc_track_caller+0x23b/0x340 [ 559.219723][T15542] traceprobe_set_print_fmt+0x45/0xa0 [ 559.225143][T15542] create_local_trace_uprobe+0x2eb/0x3c0 [ 559.230789][T15542] perf_uprobe_init+0xbe/0x140 [ 559.235559][T15542] perf_uprobe_event_init+0xde/0x140 [ 559.240931][T15542] perf_try_init_event+0x21a/0x400 [ 559.246030][T15542] perf_event_alloc+0xa60/0x1790 [ 559.250952][T15542] __se_sys_perf_event_open+0x5c7/0x2740 [ 559.256617][T15542] ? vfs_write+0x50c/0x770 [ 559.260913][T15543] loop5: detected capacity change from 0 to 264192 [ 559.261026][T15542] __x64_sys_perf_event_open+0x63/0x70 [ 559.272973][T15542] do_syscall_64+0x4a/0x90 [ 559.277490][T15542] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 559.283393][T15542] RIP: 0033:0x4665d9 [ 559.287262][T15542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 559.306971][T15542] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 559.315382][T15542] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 559.323344][T15542] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 559.331291][T15542] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 559.339251][T15542] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 559.347215][T15542] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 559.356529][T15543] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:49 executing program 2 (fault-call:1 fault-nth:12): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:49 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 559.500027][T15558] FAULT_INJECTION: forcing a failure. [ 559.500027][T15558] name failslab, interval 1, probability 0, space 0, times 0 [ 559.512714][T15558] CPU: 0 PID: 15558 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 559.521475][T15558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.531521][T15558] Call Trace: [ 559.534866][T15558] dump_stack+0x137/0x19d [ 559.539198][T15558] should_fail+0x23c/0x250 [ 559.543614][T15558] __should_failslab+0x81/0x90 [ 559.548447][T15558] ? __uprobe_register+0xf8/0x8a0 [ 559.553475][T15558] should_failslab+0x5/0x20 [ 559.557982][T15558] kmem_cache_alloc_trace+0x49/0x310 [ 559.563341][T15558] __uprobe_register+0xf8/0x8a0 [ 559.568193][T15558] ? _find_next_bit+0x188/0x190 [ 559.573120][T15558] uprobe_register_refctr+0x29/0x40 [ 559.578401][T15558] probe_event_enable+0x2be/0x7d0 [ 559.583425][T15558] ? __uprobe_trace_func+0x430/0x430 [ 559.588736][T15558] trace_uprobe_register+0x88/0x410 [ 559.593966][T15558] perf_trace_event_init+0x34e/0x790 11:39:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x0, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 559.599247][T15558] perf_uprobe_init+0xf5/0x140 [ 559.604019][T15558] perf_uprobe_event_init+0xde/0x140 [ 559.609441][T15558] perf_try_init_event+0x21a/0x400 [ 559.614550][T15558] perf_event_alloc+0xa60/0x1790 [ 559.619479][T15558] __se_sys_perf_event_open+0x5c7/0x2740 [ 559.625136][T15558] ? vfs_write+0x50c/0x770 [ 559.629550][T15558] __x64_sys_perf_event_open+0x63/0x70 [ 559.634999][T15558] do_syscall_64+0x4a/0x90 [ 559.639405][T15558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 559.645349][T15558] RIP: 0033:0x4665d9 [ 559.649231][T15558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 559.668856][T15558] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 559.677276][T15558] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 559.685235][T15558] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 559.693229][T15558] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 559.701196][T15558] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 559.709164][T15558] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 559.848264][T15572] loop5: detected capacity change from 0 to 264192 [ 559.858637][T15572] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 559.978217][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 559.978226][ T25] audit: type=1326 audit(1621683590.476:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15535 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xe00000000000000, 0x0) 11:39:50 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:50 executing program 2 (fault-call:1 fault-nth:13): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:50 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x0, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x21000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 560.047330][ T25] audit: type=1326 audit(1621683590.536:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15584 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 560.093327][T15591] FAULT_INJECTION: forcing a failure. [ 560.093327][T15591] name failslab, interval 1, probability 0, space 0, times 0 [ 560.105961][T15591] CPU: 1 PID: 15591 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 560.114723][T15591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.124779][T15591] Call Trace: [ 560.128073][T15591] dump_stack+0x137/0x19d [ 560.132397][T15591] should_fail+0x23c/0x250 [ 560.136847][T15591] __should_failslab+0x81/0x90 [ 560.141656][T15591] ? selinux_perf_event_alloc+0x31/0xc0 [ 560.147201][T15591] should_failslab+0x5/0x20 [ 560.151696][T15591] kmem_cache_alloc_trace+0x49/0x310 [ 560.156972][T15591] selinux_perf_event_alloc+0x31/0xc0 [ 560.162346][T15591] security_perf_event_alloc+0x3f/0x90 [ 560.167875][T15591] perf_event_alloc+0xf89/0x1790 [ 560.172813][T15591] __se_sys_perf_event_open+0x5c7/0x2740 [ 560.178469][T15591] ? vfs_write+0x50c/0x770 [ 560.182869][T15591] __x64_sys_perf_event_open+0x63/0x70 [ 560.188330][T15591] do_syscall_64+0x4a/0x90 [ 560.192748][T15591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 560.198639][T15591] RIP: 0033:0x4665d9 [ 560.202518][T15591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.222138][T15591] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 560.227827][T15595] loop5: detected capacity change from 0 to 264192 11:39:50 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 560.230568][T15591] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 560.230581][T15591] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 560.230594][T15591] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 560.230605][T15591] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 560.246073][T15595] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 560.253053][T15591] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:50 executing program 2 (fault-call:1 fault-nth:14): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 560.386962][T15612] FAULT_INJECTION: forcing a failure. [ 560.386962][T15612] name failslab, interval 1, probability 0, space 0, times 0 [ 560.399634][T15612] CPU: 1 PID: 15612 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 560.408394][T15612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.418449][T15612] Call Trace: [ 560.421717][T15612] dump_stack+0x137/0x19d [ 560.426096][T15612] should_fail+0x23c/0x250 [ 560.430500][T15612] ? __d_alloc+0x36/0x370 [ 560.434821][T15612] __should_failslab+0x81/0x90 [ 560.439652][T15612] should_failslab+0x5/0x20 [ 560.444195][T15612] kmem_cache_alloc+0x46/0x2f0 [ 560.448953][T15612] __d_alloc+0x36/0x370 [ 560.453092][T15612] d_alloc_pseudo+0x1a/0x50 [ 560.457581][T15612] alloc_file_pseudo+0x63/0x130 [ 560.462442][T15612] ? security_perf_event_open+0x7c/0x90 [ 560.468023][T15612] anon_inode_getfile+0x9f/0x120 [ 560.473069][T15612] __se_sys_perf_event_open+0xb4e/0x2740 [ 560.478704][T15612] ? vfs_write+0x50c/0x770 11:39:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 560.483182][T15612] __x64_sys_perf_event_open+0x63/0x70 [ 560.488649][T15612] do_syscall_64+0x4a/0x90 [ 560.493059][T15612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 560.498999][T15612] RIP: 0033:0x4665d9 [ 560.502883][T15612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.522491][T15612] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 11:39:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x22000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:51 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 560.530908][T15612] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 560.538875][T15612] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 560.546878][T15612] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 560.554843][T15612] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 560.562810][T15612] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 [ 560.735958][T15629] loop5: detected capacity change from 0 to 264192 [ 560.747065][T15629] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x1000000000000000, 0x0) 11:39:51 executing program 2 (fault-call:1 fault-nth:15): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:51 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x0, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:51 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7ea74fce00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x23000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 560.879262][ T25] audit: type=1326 audit(1621683591.376:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15584 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 560.975825][T15646] FAULT_INJECTION: forcing a failure. [ 560.975825][T15646] name failslab, interval 1, probability 0, space 0, times 0 [ 560.988585][T15646] CPU: 1 PID: 15646 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 560.997330][T15646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.007370][T15646] Call Trace: [ 561.010650][T15646] dump_stack+0x137/0x19d [ 561.014989][T15646] should_fail+0x23c/0x250 [ 561.019394][T15646] ? __alloc_file+0x2e/0x1a0 [ 561.023977][T15646] __should_failslab+0x81/0x90 [ 561.028738][T15646] should_failslab+0x5/0x20 [ 561.033306][T15646] kmem_cache_alloc+0x46/0x2f0 [ 561.038071][T15646] __alloc_file+0x2e/0x1a0 [ 561.042504][T15646] alloc_empty_file+0xcd/0x1c0 [ 561.047250][T15646] alloc_file+0x3a/0x280 [ 561.051493][T15646] alloc_file_pseudo+0xe2/0x130 [ 561.056324][T15646] anon_inode_getfile+0x9f/0x120 [ 561.061264][T15646] __se_sys_perf_event_open+0xb4e/0x2740 [ 561.066885][T15646] ? vfs_write+0x50c/0x770 [ 561.071293][T15646] __x64_sys_perf_event_open+0x63/0x70 [ 561.076784][T15646] do_syscall_64+0x4a/0x90 [ 561.081198][T15646] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.087145][T15646] RIP: 0033:0x4665d9 [ 561.091014][T15646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.110598][T15646] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 561.119162][T15646] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 561.127115][T15646] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 561.135062][T15646] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 561.143010][T15646] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 561.150961][T15646] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 561.174582][ T25] audit: type=1326 audit(1621683591.666:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15643 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x1100000000000000, 0x0) 11:39:51 executing program 2 (fault-call:1 fault-nth:16): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 561.298909][ T25] audit: type=1326 audit(1621683591.796:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15662 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 561.347419][T15670] FAULT_INJECTION: forcing a failure. [ 561.347419][T15670] name failslab, interval 1, probability 0, space 0, times 0 [ 561.360176][T15670] CPU: 1 PID: 15670 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 561.368948][T15670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.378997][T15670] Call Trace: [ 561.379850][T15658] loop5: detected capacity change from 0 to 264192 [ 561.382267][T15670] dump_stack+0x137/0x19d 11:39:51 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, 0x0, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:51 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 561.389492][T15658] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 561.393076][T15670] should_fail+0x23c/0x250 [ 561.406511][T15670] ? security_file_alloc+0x30/0x190 [ 561.411701][T15670] __should_failslab+0x81/0x90 [ 561.416489][T15670] should_failslab+0x5/0x20 [ 561.420990][T15670] kmem_cache_alloc+0x46/0x2f0 [ 561.425777][T15670] security_file_alloc+0x30/0x190 [ 561.430805][T15670] __alloc_file+0x83/0x1a0 [ 561.435291][T15670] alloc_empty_file+0xcd/0x1c0 [ 561.440054][T15670] alloc_file+0x3a/0x280 [ 561.444335][T15670] alloc_file_pseudo+0xe2/0x130 [ 561.449185][T15670] anon_inode_getfile+0x9f/0x120 [ 561.454110][T15670] __se_sys_perf_event_open+0xb4e/0x2740 [ 561.459735][T15670] ? vfs_write+0x50c/0x770 [ 561.464140][T15670] __x64_sys_perf_event_open+0x63/0x70 [ 561.469591][T15670] do_syscall_64+0x4a/0x90 [ 561.474011][T15670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.479967][T15670] RIP: 0033:0x4665d9 [ 561.483858][T15670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.503617][T15670] RSP: 002b:00007fbf11b22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 561.512020][T15670] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 561.519982][T15670] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 561.527944][T15670] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 561.535908][T15670] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 561.543865][T15670] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:52 executing program 2 (fault-call:1 fault-nth:17): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 561.618791][T15686] FAULT_INJECTION: forcing a failure. [ 561.618791][T15686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 561.631967][T15686] CPU: 1 PID: 15686 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 561.640729][T15686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.650796][T15686] Call Trace: [ 561.654124][T15686] dump_stack+0x137/0x19d [ 561.658527][T15686] should_fail+0x23c/0x250 [ 561.662979][T15686] should_fail_usercopy+0x16/0x20 [ 561.668075][T15686] _copy_to_user+0x1c/0x90 [ 561.672488][T15686] simple_read_from_buffer+0xab/0x120 [ 561.677942][T15686] proc_fail_nth_read+0xf6/0x140 [ 561.683401][T15686] ? rw_verify_area+0x136/0x250 [ 561.688292][T15686] ? proc_fault_inject_write+0x200/0x200 [ 561.693921][T15686] vfs_read+0x154/0x5d0 [ 561.698067][T15686] ? __fget_light+0x21b/0x260 [ 561.702803][T15686] ? __cond_resched+0x11/0x40 [ 561.707489][T15686] ksys_read+0xce/0x180 [ 561.711633][T15686] __x64_sys_read+0x3e/0x50 [ 561.716125][T15686] do_syscall_64+0x4a/0x90 [ 561.720615][T15686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.726508][T15686] RIP: 0033:0x41935c [ 561.730392][T15686] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 561.735231][T15658] loop5: detected capacity change from 0 to 264192 [ 561.749984][T15686] RSP: 002b:00007fbf11b22170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 11:39:52 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x8403000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 561.750000][T15686] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000041935c [ 561.750009][T15686] RDX: 000000000000000f RSI: 00007fbf11b221e0 RDI: 0000000000000004 [ 561.750019][T15686] RBP: 00007fbf11b221d0 R08: 0000000000000000 R09: 0000000000000000 [ 561.750029][T15686] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 561.750043][T15686] R13: 00007ffda0b61faf R14: 00007fbf11b22300 R15: 0000000000022000 11:39:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, 0x0, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 561.851074][T15658] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x24000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x1200000000000000, 0x0) 11:39:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, 0x0, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:52 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x8703000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 562.127575][ T25] audit: type=1326 audit(1621683592.616:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15662 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 562.151233][T15713] loop5: detected capacity change from 0 to 264192 [ 562.161194][T15713] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 562.226486][ T25] audit: type=1326 audit(1621683592.716:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15724 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x25000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x200001f0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 562.555628][T15763] loop5: detected capacity change from 0 to 264192 [ 562.564978][T15763] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 563.032785][ T25] audit: type=1326 audit(1621683593.526:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15724 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x2500000000000000, 0x0) 11:39:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100), 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:53 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x26000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 563.131157][ T25] audit: type=1326 audit(1621683593.626:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15777 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100), 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 563.296553][T15785] loop5: detected capacity change from 0 to 264192 [ 563.328573][T15785] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 563.443190][T15785] loop5: detected capacity change from 0 to 264192 [ 563.451633][T15785] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x3f00000000000000, 0x0) 11:39:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:54 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x97ffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:54 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100), 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x27000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 563.960000][ T25] audit: type=1326 audit(1621683594.456:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15777 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 564.192259][T15845] loop5: detected capacity change from 0 to 264192 [ 564.201095][T15845] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 564.343172][T15845] loop5: detected capacity change from 0 to 264192 [ 564.350197][T15845] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:55 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x0) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x4000000000000000, 0x0) 11:39:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xa, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x28000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:55 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xa601000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xb, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:55 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x0) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 565.137960][T15891] loop5: detected capacity change from 0 to 264192 [ 565.180458][T15891] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 565.293969][T15891] loop5: detected capacity change from 0 to 264192 11:39:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x4800000000000000, 0x0) 11:39:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:56 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xa701000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x10, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x29000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x0) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 565.804782][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 565.804793][ T25] audit: type=1326 audit(1621683596.296:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15893 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x11, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 565.902758][ T25] audit: type=1326 audit(1621683596.396:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15956 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x12, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r0, 0x407, 0x20ffffd) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) [ 566.059367][T15955] loop5: detected capacity change from 0 to 264192 [ 566.077299][T15955] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 566.225859][T15955] loop5: detected capacity change from 0 to 264192 [ 566.233084][T15955] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x4c00000000000000, 0x0) 11:39:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x48, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r0, 0x407, 0x20ffffd) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) 11:39:57 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xba01000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2a000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 566.733375][ T25] audit: type=1326 audit(1621683597.226:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15956 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x4c, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 566.818740][ T25] audit: type=1326 audit(1621683597.306:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15996 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x68, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r0, 0x407, 0x20ffffd) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) 11:39:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x6c, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 566.948887][T16009] loop5: detected capacity change from 0 to 264192 [ 566.981556][T16009] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 567.102833][T16009] loop5: detected capacity change from 0 to 264192 [ 567.111184][T16009] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:39:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x6800000000000000, 0x0) 11:39:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x74, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2b000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:58 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xdaffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 567.644655][ T25] audit: type=1326 audit(1621683598.136:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15996 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x7a, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 567.733138][ T25] audit: type=1326 audit(1621683598.226:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16049 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 567.952880][T16058] loop5: detected capacity change from 0 to 264192 [ 567.962858][T16058] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 568.063271][T16058] loop5: detected capacity change from 0 to 264192 [ 568.074988][T16058] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 568.561719][ T25] audit: type=1326 audit(1621683599.056:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16049 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x6c00000000000000, 0x0) 11:39:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:59 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xe626000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:59 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2c000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:39:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 568.652616][ T25] audit: type=1326 audit(1621683599.146:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16099 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:39:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:39:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 568.827423][T16103] loop5: detected capacity change from 0 to 264192 [ 568.839786][T16103] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 568.974582][T16103] loop5: detected capacity change from 0 to 264192 [ 568.981641][T16103] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x7400000000000000, 0x0) 11:40:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:00 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:00 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xe903000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:00 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2d000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 569.481937][ T25] audit: type=1326 audit(1621683599.976:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16099 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 569.587933][ T25] audit: type=1326 audit(1621683600.086:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:00 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 569.795546][T16152] loop5: detected capacity change from 0 to 264192 [ 569.803998][T16152] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 569.952678][T16152] loop5: detected capacity change from 0 to 264192 [ 569.959950][T16152] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x7a00000000000000, 0x0) 11:40:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xa, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:00 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:00 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xea03000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:00 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xd, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 570.647004][T16202] loop5: detected capacity change from 0 to 264192 [ 570.655374][T16202] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x8e00000000000000, 0x0) 11:40:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xeb03000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2f000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 571.316442][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 571.316451][ T25] audit: type=1326 audit(1621683601.806:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16193 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x11, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 571.427436][ T25] audit: type=1326 audit(1621683601.916:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16251 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x12, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x27, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 571.554927][T16252] loop5: detected capacity change from 0 to 264192 [ 571.563911][T16252] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 571.675091][T16252] loop5: detected capacity change from 0 to 264192 [ 571.682399][T16252] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 572.246906][ T25] audit: type=1326 audit(1621683602.736:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16251 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xa1ffffff00000000, 0x0) 11:40:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x48, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x30000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:02 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xec03000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x4c, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x68, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 572.357845][ T25] audit: type=1326 audit(1621683602.846:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16297 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x6c, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x74, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 572.545885][T16310] loop5: detected capacity change from 0 to 264192 [ 572.557232][T16310] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 572.703281][T16310] loop5: detected capacity change from 0 to 264192 [ 572.711770][T16310] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xb003000000000000, 0x0) 11:40:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x7a, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:03 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xed03000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:03 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x31000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 573.181290][ T25] audit: type=1326 audit(1621683603.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16297 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 573.277822][ T25] audit: type=1326 audit(1621683603.766:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16351 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 573.456075][T16361] loop5: detected capacity change from 0 to 264192 [ 573.482006][T16361] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 573.561411][T16361] loop5: detected capacity change from 0 to 264192 [ 573.568983][T16361] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 574.106802][ T25] audit: type=1326 audit(1621683604.596:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16351 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xb078130000000000, 0x0) 11:40:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:04 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x32000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:04 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xee03000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 574.195515][ T25] audit: type=1326 audit(1621683604.686:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16404 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 574.324113][T16408] loop5: detected capacity change from 0 to 264192 [ 574.345233][T16408] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 574.480524][T16408] loop5: detected capacity change from 0 to 264192 [ 575.024938][ T25] audit: type=1326 audit(1621683605.516:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16404 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xc602000000000000, 0x0) 11:40:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:05 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xef03000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:05 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x33000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 575.122513][ T25] audit: type=1326 audit(1621683605.616:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16456 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xa, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xb, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 575.292062][T16463] loop5: detected capacity change from 0 to 264192 [ 575.318594][T16463] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 575.408029][T16463] loop5: detected capacity change from 0 to 264192 [ 575.416063][T16463] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xeaffffff00000000, 0x0) 11:40:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:06 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x34000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:06 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf003000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) 11:40:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x10, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x11, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 576.156507][T16513] loop5: detected capacity change from 0 to 264192 [ 576.164700][T16513] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 576.281909][T16513] loop5: detected capacity change from 0 to 264192 11:40:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xf803000000000000, 0x0) 11:40:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x27, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:07 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x35000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:07 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf0ffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) [ 576.881564][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 576.881575][ T25] audit: type=1326 audit(1621683607.376:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16507 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x48, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 576.982616][ T25] audit: type=1326 audit(1621683607.476:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16553 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x4c, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x23}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x68, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x6c, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 577.143902][T16563] loop5: detected capacity change from 0 to 264192 [ 577.150934][T16563] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 577.306788][T16563] loop5: detected capacity change from 0 to 264192 [ 577.315137][T16563] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xfeffffff00000000, 0x0) 11:40:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x74, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:08 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf103000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:08 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x36000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) [ 577.807443][ T25] audit: type=1326 audit(1621683608.296:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16553 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x7a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 577.912741][ T25] audit: type=1326 audit(1621683608.406:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16613 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 578.078316][T16615] loop5: detected capacity change from 0 to 264192 [ 578.102940][T16615] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 578.213969][T16615] loop5: detected capacity change from 0 to 264192 [ 578.221261][T16615] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xffffc90000929000, 0x0) 11:40:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:09 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf203000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:09 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x37000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:09 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, 0x0, 0x0) [ 578.745161][ T25] audit: type=1326 audit(1621683609.236:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16613 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 578.847588][ T25] audit: type=1326 audit(1621683609.336:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16665 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 578.955010][T16666] loop5: detected capacity change from 0 to 264192 [ 578.962308][T16666] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 579.677260][ T25] audit: type=1326 audit(1621683610.166:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16665 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0xffffffff00000000, 0x0) 11:40:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:10 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x38000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:10 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf303000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:10 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, 0x0, 0x0) 11:40:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 579.774439][ T25] audit: type=1326 audit(1621683610.266:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16712 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 579.943432][T16717] loop5: detected capacity change from 0 to 264192 [ 579.954589][T16717] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 580.052325][T16717] loop5: detected capacity change from 0 to 264192 [ 580.061214][T16717] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x2) 11:40:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:11 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x39000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:11 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf403000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:11 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, 0x0, 0x0) [ 580.607586][ T25] audit: type=1326 audit(1621683611.096:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16712 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 580.717393][ T25] audit: type=1326 audit(1621683611.206:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16766 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 580.840627][T16767] loop5: detected capacity change from 0 to 264192 [ 580.849517][T16767] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x3) 11:40:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:12 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3a000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:12 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf4ffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:12 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x27, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:12 executing program 0: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x48, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 581.771162][T16817] loop5: detected capacity change from 0 to 264192 [ 581.790928][T16817] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 581.983422][T16817] loop5: detected capacity change from 0 to 264192 [ 581.990533][T16817] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x4) 11:40:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:13 executing program 0: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:13 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf503000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:13 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3b000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 582.471676][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 582.471683][ T25] audit: type=1326 audit(1621683612.966:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16816 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x68, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 582.611064][ T25] audit: type=1326 audit(1621683613.106:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16875 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x6c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:13 executing program 0 (fault-call:4 fault-nth:0): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x74, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 582.769313][T16898] FAULT_INJECTION: forcing a failure. [ 582.769313][T16898] name failslab, interval 1, probability 0, space 0, times 0 [ 582.782112][T16898] CPU: 0 PID: 16898 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 582.790947][T16898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.800996][T16898] Call Trace: [ 582.804255][T16898] dump_stack+0x137/0x19d [ 582.808591][T16898] should_fail+0x23c/0x250 [ 582.812989][T16898] ? kmalloc_array+0x2d/0x40 [ 582.817559][T16898] __should_failslab+0x81/0x90 [ 582.822313][T16898] should_failslab+0x5/0x20 [ 582.826924][T16898] __kmalloc+0x66/0x340 [ 582.831051][T16898] ? get_page_from_freelist+0x53e/0x800 [ 582.836579][T16898] kmalloc_array+0x2d/0x40 [ 582.840968][T16898] iter_file_splice_write+0xc1/0x750 [ 582.846226][T16898] ? avc_policy_seqno+0x22/0x30 [ 582.851050][T16898] ? selinux_file_permission+0x22e/0x530 [ 582.856655][T16898] ? fsnotify_perm+0x59/0x2e0 [ 582.861307][T16898] ? rw_verify_area+0xf0/0x250 [ 582.866099][T16898] ? splice_from_pipe+0xc0/0xc0 [ 582.870939][T16898] do_splice+0x9aa/0xd30 [ 582.875218][T16898] ? vfs_write+0x50c/0x770 [ 582.879615][T16898] ? __fget_light+0x21b/0x260 [ 582.884311][T16898] __se_sys_splice+0x2a6/0x390 [ 582.889057][T16898] __x64_sys_splice+0x74/0x80 [ 582.893756][T16898] do_syscall_64+0x4a/0x90 [ 582.898157][T16898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 582.904043][T16898] RIP: 0033:0x4665d9 [ 582.907914][T16898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 582.927572][T16898] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 582.935974][T16898] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 582.943987][T16898] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 582.951932][T16898] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 582.959881][T16898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 582.967841][T16898] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 583.005777][T16877] loop5: detected capacity change from 0 to 264192 [ 583.014285][T16877] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 583.109629][T16877] loop5: detected capacity change from 0 to 264192 [ 583.118810][T16877] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x5) 11:40:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:13 executing program 0 (fault-call:4 fault-nth:1): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:13 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf67f000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:13 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3c000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 583.417676][ T25] audit: type=1326 audit(1621683613.916:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16875 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 583.519239][ T25] audit: type=1326 audit(1621683614.016:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16921 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 583.656290][T16925] loop5: detected capacity change from 0 to 264192 [ 583.663469][T16925] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 583.687586][T16922] FAULT_INJECTION: forcing a failure. [ 583.687586][T16922] name failslab, interval 1, probability 0, space 0, times 0 [ 583.700327][T16922] CPU: 0 PID: 16922 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 583.709091][T16922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.719181][T16922] Call Trace: [ 583.722438][T16922] dump_stack+0x137/0x19d [ 583.726749][T16922] should_fail+0x23c/0x250 [ 583.731141][T16922] ? kmalloc_array+0x2d/0x40 [ 583.735747][T16922] __should_failslab+0x81/0x90 [ 583.740522][T16922] should_failslab+0x5/0x20 [ 583.745002][T16922] __kmalloc+0x66/0x340 [ 583.749132][T16922] kmalloc_array+0x2d/0x40 [ 583.753539][T16922] iter_file_splice_write+0x600/0x750 [ 583.758902][T16922] ? selinux_file_permission+0x22e/0x530 [ 583.764521][T16922] ? fsnotify_perm+0x59/0x2e0 [ 583.769175][T16922] ? rw_verify_area+0xf0/0x250 [ 583.773930][T16922] ? splice_from_pipe+0xc0/0xc0 [ 583.778804][T16922] do_splice+0x9aa/0xd30 [ 583.783042][T16922] ? vfs_write+0x50c/0x770 [ 583.787490][T16922] ? __fget_light+0x21b/0x260 [ 583.792253][T16922] __se_sys_splice+0x2a6/0x390 [ 583.796998][T16922] __x64_sys_splice+0x74/0x80 [ 583.801653][T16922] do_syscall_64+0x4a/0x90 [ 583.806042][T16922] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 583.811912][T16922] RIP: 0033:0x4665d9 [ 583.815790][T16922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 583.835375][T16922] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 583.843765][T16922] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 11:40:14 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3d000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 583.851773][T16922] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 583.859910][T16922] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 583.867882][T16922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 583.875829][T16922] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 584.037547][T16955] loop5: detected capacity change from 0 to 264192 [ 584.047997][T16955] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 584.128365][T16955] loop5: detected capacity change from 0 to 264192 [ 584.135552][T16955] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x6) 11:40:14 executing program 0 (fault-call:4 fault-nth:2): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:14 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:14 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3e000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 584.345167][ T25] audit: type=1326 audit(1621683614.836:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16921 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 584.437151][ T25] audit: type=1326 audit(1621683614.926:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16969 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 584.622400][T16985] FAULT_INJECTION: forcing a failure. [ 584.622400][T16985] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 584.635629][T16985] CPU: 0 PID: 16985 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 584.644364][T16985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.654395][T16985] Call Trace: [ 584.657668][T16985] dump_stack+0x137/0x19d [ 584.661980][T16985] should_fail+0x23c/0x250 [ 584.666394][T16985] __alloc_pages+0x102/0x320 [ 584.671112][T16985] kmem_getpages+0x1a/0xd0 [ 584.675546][T16985] cache_grow_begin+0x4c/0x1a0 [ 584.680305][T16985] cache_alloc_refill+0x326/0x3d0 [ 584.685344][T16985] __kmalloc+0x2ba/0x340 [ 584.689601][T16985] ? kmalloc_array+0x2d/0x40 [ 584.694221][T16985] kmalloc_array+0x2d/0x40 [ 584.698671][T16985] iter_file_splice_write+0x600/0x750 [ 584.704036][T16985] ? selinux_file_permission+0x22e/0x530 [ 584.709745][T16985] ? fsnotify_perm+0x59/0x2e0 [ 584.714416][T16985] ? rw_verify_area+0xf0/0x250 [ 584.719157][T16985] ? splice_from_pipe+0xc0/0xc0 [ 584.723980][T16985] do_splice+0x9aa/0xd30 [ 584.728244][T16985] ? vfs_write+0x50c/0x770 [ 584.732637][T16985] ? __fget_light+0x21b/0x260 [ 584.737333][T16985] __se_sys_splice+0x2a6/0x390 [ 584.742209][T16985] __x64_sys_splice+0x74/0x80 [ 584.746980][T16985] do_syscall_64+0x4a/0x90 [ 584.751375][T16985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 584.757384][T16985] RIP: 0033:0x4665d9 [ 584.761360][T16985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 584.780971][T16985] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 584.789355][T16985] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 584.797338][T16985] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 584.805280][T16985] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 584.813226][T16985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 11:40:15 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf77f000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 584.821172][T16985] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 584.838030][T16980] loop5: detected capacity change from 0 to 264192 [ 584.849774][T16980] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 584.948730][T16980] loop5: detected capacity change from 0 to 264192 [ 584.956840][T16980] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 585.257633][ T25] audit: type=1326 audit(1621683615.757:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16969 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x7) 11:40:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:15 executing program 0 (fault-call:4 fault-nth:3): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:15 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:15 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf87f000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 585.358701][ T25] audit: type=1326 audit(1621683615.857:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17032 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 585.471842][T17036] FAULT_INJECTION: forcing a failure. [ 585.471842][T17036] name failslab, interval 1, probability 0, space 0, times 0 [ 585.484501][T17036] CPU: 0 PID: 17036 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 585.493318][T17036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.503353][T17036] Call Trace: [ 585.506635][T17036] dump_stack+0x137/0x19d [ 585.511020][T17036] should_fail+0x23c/0x250 [ 585.515413][T17036] ? kcalloc+0x32/0x50 [ 585.519461][T17036] __should_failslab+0x81/0x90 [ 585.524217][T17036] should_failslab+0x5/0x20 [ 585.528850][T17036] __kmalloc+0x66/0x340 [ 585.533015][T17036] kcalloc+0x32/0x50 [ 585.537033][T17036] ext4_find_extent+0x21c/0x7f0 [ 585.541873][T17036] ext4_ext_map_blocks+0xd9/0x1f00 [ 585.547054][T17036] ? __find_get_block+0x6fd/0x900 [ 585.552056][T17036] ? __down_read_common+0x16b/0x5a0 [ 585.557238][T17036] ? percpu_counter_add_batch+0x69/0xd0 [ 585.562844][T17036] ? ext4_es_lookup_extent+0x206/0x490 [ 585.568293][T17036] ext4_map_blocks+0x1be/0xef0 [ 585.573042][T17036] ? ext4_iomap_begin+0x3e2/0x620 [ 585.578060][T17036] ? __cond_resched+0x11/0x40 [ 585.582729][T17036] ext4_iomap_begin+0x4a3/0x620 [ 585.587566][T17036] iomap_apply+0x8d/0x400 [ 585.591893][T17036] __iomap_dio_rw+0x5af/0xad0 [ 585.596602][T17036] ? __iomap_dio_rw+0xad0/0xad0 [ 585.601453][T17036] iomap_dio_rw+0x30/0x70 [ 585.605759][T17036] ? ext4_file_write_iter+0x4e1/0x11d0 [ 585.611196][T17036] ext4_file_write_iter+0xa4f/0x11d0 [ 585.616469][T17036] ? ext4_file_write_iter+0x4e1/0x11d0 [ 585.621908][T17036] do_iter_readv_writev+0x2cb/0x360 [ 585.627082][T17036] do_iter_write+0x112/0x4c0 [ 585.631643][T17036] ? kcsan_setup_watchpoint+0x26e/0x470 [ 585.637175][T17036] vfs_iter_write+0x4c/0x70 [ 585.641648][T17036] iter_file_splice_write+0x40a/0x750 [ 585.647059][T17036] ? rw_verify_area+0xf0/0x250 [ 585.651831][T17036] ? splice_from_pipe+0xc0/0xc0 [ 585.656660][T17036] do_splice+0x9aa/0xd30 [ 585.660888][T17036] ? vfs_write+0x50c/0x770 [ 585.665287][T17036] ? __fget_light+0x21b/0x260 [ 585.669954][T17036] __se_sys_splice+0x2a6/0x390 [ 585.674694][T17036] __x64_sys_splice+0x74/0x80 [ 585.679375][T17036] do_syscall_64+0x4a/0x90 [ 585.683786][T17036] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 585.689682][T17036] RIP: 0033:0x4665d9 [ 585.693554][T17036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 585.713220][T17036] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 11:40:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 585.721621][T17036] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 585.729572][T17036] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 585.737543][T17036] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 585.745590][T17036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.753693][T17036] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:16 executing program 0 (fault-call:4 fault-nth:4): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 585.855504][T17037] loop5: detected capacity change from 0 to 264192 [ 585.883965][T17037] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 585.992261][T17068] FAULT_INJECTION: forcing a failure. [ 585.992261][T17068] name failslab, interval 1, probability 0, space 0, times 0 [ 586.001504][T17037] loop5: detected capacity change from 0 to 264192 [ 586.004995][T17068] CPU: 0 PID: 17068 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 586.020187][T17068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.030219][T17068] Call Trace: [ 586.033475][T17068] dump_stack+0x137/0x19d [ 586.037806][T17068] should_fail+0x23c/0x250 [ 586.042209][T17068] ? kcalloc+0x32/0x50 [ 586.046257][T17068] __should_failslab+0x81/0x90 [ 586.051066][T17068] should_failslab+0x5/0x20 [ 586.055549][T17068] __kmalloc+0x66/0x340 [ 586.059759][T17068] kcalloc+0x32/0x50 [ 586.063647][T17068] ext4_find_extent+0x21c/0x7f0 [ 586.068540][T17068] ext4_ext_map_blocks+0xd9/0x1f00 [ 586.073625][T17068] ? __find_get_block+0x82c/0x900 [ 586.078623][T17068] ? __down_read_common+0x16b/0x5a0 [ 586.083879][T17068] ? percpu_counter_add_batch+0x69/0xd0 [ 586.089467][T17068] ? ext4_es_lookup_extent+0x206/0x490 [ 586.094919][T17068] ext4_map_blocks+0x1be/0xef0 [ 586.099665][T17068] ? ext4_iomap_begin+0x3e2/0x620 [ 586.104682][T17068] ? __cond_resched+0x11/0x40 [ 586.109338][T17068] ext4_iomap_begin+0x4a3/0x620 [ 586.114181][T17068] iomap_apply+0x8d/0x400 [ 586.118484][T17068] __iomap_dio_rw+0x5af/0xad0 [ 586.123139][T17068] ? __iomap_dio_rw+0xad0/0xad0 [ 586.127991][T17068] iomap_dio_rw+0x30/0x70 [ 586.132296][T17068] ? ext4_file_write_iter+0x4e1/0x11d0 [ 586.137747][T17068] ext4_file_write_iter+0xa4f/0x11d0 [ 586.143013][T17068] ? ext4_file_write_iter+0x4e1/0x11d0 [ 586.148453][T17068] do_iter_readv_writev+0x2cb/0x360 [ 586.153624][T17068] do_iter_write+0x112/0x4c0 [ 586.158204][T17068] ? kcsan_setup_watchpoint+0x26e/0x470 [ 586.163730][T17068] vfs_iter_write+0x4c/0x70 [ 586.168275][T17068] iter_file_splice_write+0x40a/0x750 [ 586.173638][T17068] ? rw_verify_area+0xf0/0x250 [ 586.178378][T17068] ? splice_from_pipe+0xc0/0xc0 [ 586.183202][T17068] do_splice+0x9aa/0xd30 [ 586.187458][T17068] ? vfs_write+0x50c/0x770 [ 586.191847][T17068] ? __fget_light+0x21b/0x260 [ 586.196511][T17068] __se_sys_splice+0x2a6/0x390 [ 586.201276][T17068] __x64_sys_splice+0x74/0x80 [ 586.205993][T17068] do_syscall_64+0x4a/0x90 [ 586.210385][T17068] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 586.216315][T17068] RIP: 0033:0x4665d9 [ 586.220207][T17068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.239858][T17068] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 586.248333][T17068] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 586.256294][T17068] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 586.264252][T17068] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 586.272250][T17068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 586.280222][T17068] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x8) 11:40:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:16 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf9fdffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:16 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 586.289055][ T25] audit: type=1326 audit(1621683616.787:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17032 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 586.315313][T17037] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:16 executing program 0 (fault-call:4 fault-nth:5): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 586.377132][ T25] audit: type=1326 audit(1621683616.867:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17080 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 586.558378][T17088] FAULT_INJECTION: forcing a failure. [ 586.558378][T17088] name failslab, interval 1, probability 0, space 0, times 0 [ 586.571049][T17088] CPU: 0 PID: 17088 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 586.579807][T17088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.589838][T17088] Call Trace: [ 586.593163][T17088] dump_stack+0x137/0x19d [ 586.597484][T17088] should_fail+0x23c/0x250 [ 586.601900][T17088] ? kcalloc+0x32/0x50 [ 586.605949][T17088] __should_failslab+0x81/0x90 [ 586.610770][T17088] should_failslab+0x5/0x20 [ 586.615308][T17088] __kmalloc+0x66/0x340 [ 586.619532][T17088] ? kcalloc+0x32/0x50 [ 586.623580][T17088] kcalloc+0x32/0x50 [ 586.627456][T17088] ext4_find_extent+0x21c/0x7f0 [ 586.632355][T17088] ? kfree+0xf0/0x1d0 [ 586.636370][T17088] ext4_ext_map_blocks+0xd9/0x1f00 [ 586.641457][T17088] ? kcsan_setup_watchpoint+0x26e/0x470 [ 586.646980][T17088] ? __down_write_common+0x45/0x890 [ 586.652210][T17088] ? __down_read_common+0x16b/0x5a0 [ 586.657410][T17088] ? percpu_counter_add_batch+0x69/0xd0 [ 586.662933][T17088] ? ext4_es_lookup_extent+0x206/0x490 [ 586.668397][T17088] ext4_map_blocks+0x70d/0xef0 [ 586.673137][T17088] ? ext4_iomap_begin+0x3e2/0x620 [ 586.678143][T17088] ? __cond_resched+0x11/0x40 [ 586.682806][T17088] ext4_iomap_begin+0x4a3/0x620 [ 586.687636][T17088] iomap_apply+0x8d/0x400 [ 586.692015][T17088] __iomap_dio_rw+0x5af/0xad0 [ 586.696667][T17088] ? __iomap_dio_rw+0xad0/0xad0 [ 586.701493][T17088] iomap_dio_rw+0x30/0x70 [ 586.705795][T17088] ? ext4_file_write_iter+0x4e1/0x11d0 [ 586.711270][T17088] ext4_file_write_iter+0xa4f/0x11d0 [ 586.716601][T17088] ? ext4_file_write_iter+0x4e1/0x11d0 [ 586.722145][T17088] do_iter_readv_writev+0x2cb/0x360 [ 586.727324][T17088] do_iter_write+0x112/0x4c0 [ 586.731888][T17088] ? kcsan_setup_watchpoint+0x26e/0x470 [ 586.737412][T17088] vfs_iter_write+0x4c/0x70 [ 586.741888][T17088] iter_file_splice_write+0x40a/0x750 [ 586.747238][T17088] ? rw_verify_area+0xf0/0x250 [ 586.752133][T17088] ? splice_from_pipe+0xc0/0xc0 [ 586.756958][T17088] do_splice+0x9aa/0xd30 [ 586.761187][T17088] ? vfs_write+0x50c/0x770 [ 586.765578][T17088] ? __fget_light+0x21b/0x260 [ 586.770235][T17088] __se_sys_splice+0x2a6/0x390 [ 586.774976][T17088] __x64_sys_splice+0x74/0x80 [ 586.779644][T17088] do_syscall_64+0x4a/0x90 [ 586.784035][T17088] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 586.789945][T17088] RIP: 0033:0x4665d9 [ 586.793816][T17088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.813444][T17088] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 586.821844][T17088] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 586.829793][T17088] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 586.837739][T17088] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 586.845687][T17088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 11:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 586.853638][T17088] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 586.961594][T17108] loop5: detected capacity change from 0 to 264192 [ 586.971909][T17108] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9) 11:40:17 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfb3f000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:17 executing program 0 (fault-call:4 fault-nth:6): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x5c02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:17 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x40000800, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x6602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 587.456336][T17138] FAULT_INJECTION: forcing a failure. [ 587.456336][T17138] name failslab, interval 1, probability 0, space 0, times 0 [ 587.468984][T17138] CPU: 1 PID: 17138 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 587.477743][T17138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.487797][T17138] Call Trace: [ 587.491069][T17138] dump_stack+0x137/0x19d [ 587.495385][T17138] should_fail+0x23c/0x250 [ 587.499830][T17138] ? ext4_mb_new_blocks+0x2e7/0x1f90 11:40:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 587.505133][T17138] __should_failslab+0x81/0x90 [ 587.509889][T17138] should_failslab+0x5/0x20 [ 587.514465][T17138] kmem_cache_alloc+0x46/0x2f0 [ 587.519309][T17138] ext4_mb_new_blocks+0x2e7/0x1f90 [ 587.524412][T17138] ? ext4_find_extent+0x6cf/0x7f0 [ 587.529473][T17138] ? ext4_ext_search_right+0x300/0x540 [ 587.534923][T17138] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 587.540655][T17138] ext4_ext_map_blocks+0x1569/0x1f00 [ 587.546000][T17138] ? __down_read_common+0x16b/0x5a0 [ 587.551194][T17138] ? percpu_counter_add_batch+0x69/0xd0 [ 587.556748][T17138] ? ext4_es_lookup_extent+0x206/0x490 [ 587.562234][T17138] ext4_map_blocks+0x70d/0xef0 [ 587.567026][T17138] ? ext4_iomap_begin+0x3e2/0x620 [ 587.572116][T17138] ? __cond_resched+0x11/0x40 [ 587.576821][T17138] ext4_iomap_begin+0x4a3/0x620 [ 587.581668][T17138] iomap_apply+0x8d/0x400 [ 587.586034][T17138] __iomap_dio_rw+0x5af/0xad0 [ 587.590729][T17138] ? __iomap_dio_rw+0xad0/0xad0 [ 587.595600][T17138] iomap_dio_rw+0x30/0x70 [ 587.599923][T17138] ? ext4_file_write_iter+0x4e1/0x11d0 [ 587.605372][T17138] ext4_file_write_iter+0xa4f/0x11d0 [ 587.610649][T17138] ? ext4_file_write_iter+0x4e1/0x11d0 [ 587.616113][T17138] do_iter_readv_writev+0x2cb/0x360 [ 587.621363][T17138] do_iter_write+0x112/0x4c0 [ 587.625946][T17138] ? kcsan_setup_watchpoint+0x26e/0x470 [ 587.631532][T17138] vfs_iter_write+0x4c/0x70 [ 587.636029][T17138] iter_file_splice_write+0x40a/0x750 [ 587.641405][T17138] ? rw_verify_area+0xf0/0x250 [ 587.645369][T17133] loop5: detected capacity change from 0 to 264192 [ 587.646167][T17138] ? splice_from_pipe+0xc0/0xc0 [ 587.657488][T17138] do_splice+0x9aa/0xd30 [ 587.661768][T17138] ? vfs_write+0x50c/0x770 [ 587.666190][T17138] ? __fget_light+0x21b/0x260 [ 587.670852][T17138] __se_sys_splice+0x2a6/0x390 [ 587.675612][T17138] __x64_sys_splice+0x74/0x80 [ 587.680272][T17138] do_syscall_64+0x4a/0x90 [ 587.684730][T17138] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 587.690603][T17138] RIP: 0033:0x4665d9 [ 587.694512][T17138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 587.714097][T17138] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 587.722541][T17138] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 587.730557][T17138] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 587.738505][T17138] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 587.746465][T17138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.754500][T17138] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 587.776914][T17133] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 587.907823][T17133] loop5: detected capacity change from 0 to 264192 [ 587.915834][T17133] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xa) 11:40:18 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfbffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:18 executing program 0 (fault-call:4 fault-nth:7): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:18 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x41615252, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 588.141005][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 588.141012][ T25] audit: type=1326 audit(1621683618.637:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17132 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 588.248496][ T25] audit: type=1326 audit(1621683618.747:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17187 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 588.403787][T17189] loop5: detected capacity change from 0 to 264192 [ 588.417852][T17189] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 588.428555][T17191] FAULT_INJECTION: forcing a failure. [ 588.428555][T17191] name failslab, interval 1, probability 0, space 0, times 0 [ 588.441155][T17191] CPU: 0 PID: 17191 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 588.449986][T17191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.460037][T17191] Call Trace: [ 588.463313][T17191] dump_stack+0x137/0x19d [ 588.467773][T17191] should_fail+0x23c/0x250 [ 588.472199][T17191] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 588.477524][T17191] __should_failslab+0x81/0x90 [ 588.482387][T17191] should_failslab+0x5/0x20 [ 588.486900][T17191] kmem_cache_alloc+0x46/0x2f0 [ 588.491819][T17191] ext4_mb_new_blocks+0x70f/0x1f90 [ 588.496926][T17191] ? ext4_find_extent+0x6cf/0x7f0 [ 588.502054][T17191] ? ext4_ext_search_right+0x300/0x540 [ 588.507536][T17191] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 588.513240][T17191] ext4_ext_map_blocks+0x1569/0x1f00 [ 588.518521][T17191] ? __down_read_common+0x16b/0x5a0 [ 588.523714][T17191] ? percpu_counter_add_batch+0x69/0xd0 [ 588.529268][T17191] ? ext4_es_lookup_extent+0x206/0x490 [ 588.534827][T17191] ext4_map_blocks+0x70d/0xef0 [ 588.539574][T17191] ? ext4_iomap_begin+0x3e2/0x620 [ 588.544621][T17191] ? __cond_resched+0x11/0x40 [ 588.549432][T17191] ext4_iomap_begin+0x4a3/0x620 [ 588.554264][T17191] iomap_apply+0x8d/0x400 [ 588.558581][T17191] __iomap_dio_rw+0x5af/0xad0 [ 588.563261][T17191] ? __iomap_dio_rw+0xad0/0xad0 [ 588.568152][T17191] iomap_dio_rw+0x30/0x70 [ 588.572502][T17191] ? ext4_file_write_iter+0x4e1/0x11d0 [ 588.577945][T17191] ext4_file_write_iter+0xa4f/0x11d0 [ 588.583248][T17191] ? ext4_file_write_iter+0x4e1/0x11d0 [ 588.588699][T17191] do_iter_readv_writev+0x2cb/0x360 [ 588.593933][T17191] do_iter_write+0x112/0x4c0 [ 588.598500][T17191] ? kcsan_setup_watchpoint+0x26e/0x470 [ 588.604035][T17191] vfs_iter_write+0x4c/0x70 [ 588.608514][T17191] iter_file_splice_write+0x40a/0x750 [ 588.613867][T17191] ? rw_verify_area+0xf0/0x250 [ 588.618687][T17191] ? splice_from_pipe+0xc0/0xc0 [ 588.623564][T17191] do_splice+0x9aa/0xd30 [ 588.627783][T17191] ? vfs_write+0x50c/0x770 [ 588.632202][T17191] ? __fget_light+0x21b/0x260 [ 588.636980][T17191] __se_sys_splice+0x2a6/0x390 [ 588.641780][T17191] __x64_sys_splice+0x74/0x80 [ 588.646491][T17191] do_syscall_64+0x4a/0x90 [ 588.650907][T17191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 588.656796][T17191] RIP: 0033:0x4665d9 [ 588.660700][T17191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 588.680301][T17191] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 588.688703][T17191] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 588.696658][T17191] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:19 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfc3f000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:19 executing program 0 (fault-call:4 fault-nth:8): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 588.704608][T17191] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 588.712637][T17191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 588.720590][T17191] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 588.868182][T17224] FAULT_INJECTION: forcing a failure. [ 588.868182][T17224] name failslab, interval 1, probability 0, space 0, times 0 [ 588.880816][T17224] CPU: 0 PID: 17224 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 588.889579][T17224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.899648][T17224] Call Trace: [ 588.902931][T17224] dump_stack+0x137/0x19d [ 588.907284][T17224] should_fail+0x23c/0x250 [ 588.911695][T17224] ? __es_insert_extent+0x51f/0xe70 [ 588.916893][T17224] __should_failslab+0x81/0x90 [ 588.921672][T17224] should_failslab+0x5/0x20 [ 588.926193][T17224] kmem_cache_alloc+0x46/0x2f0 [ 588.931038][T17224] __es_insert_extent+0x51f/0xe70 [ 588.936052][T17224] ? ext4_ext_map_blocks+0x10a8/0x1f00 [ 588.941580][T17224] ext4_es_insert_extent+0x1bb/0x19d0 [ 588.946957][T17224] ? percpu_counter_add_batch+0x69/0xd0 [ 588.952490][T17224] ? ext4_es_lookup_extent+0x206/0x490 [ 588.957954][T17224] ext4_map_blocks+0xa4c/0xef0 [ 588.962820][T17224] ? ext4_iomap_begin+0x3e2/0x620 [ 588.967920][T17224] ? __cond_resched+0x11/0x40 [ 588.972589][T17224] ext4_iomap_begin+0x4a3/0x620 [ 588.977445][T17224] iomap_apply+0x8d/0x400 [ 588.981988][T17224] __iomap_dio_rw+0x5af/0xad0 [ 588.986761][T17224] ? __iomap_dio_rw+0xad0/0xad0 [ 588.991627][T17224] iomap_dio_rw+0x30/0x70 [ 588.995934][T17224] ? ext4_file_write_iter+0x4e1/0x11d0 [ 589.001374][T17224] ext4_file_write_iter+0xa4f/0x11d0 [ 589.006716][T17224] ? ext4_file_write_iter+0x4e1/0x11d0 [ 589.012227][T17224] do_iter_readv_writev+0x2cb/0x360 [ 589.017497][T17224] do_iter_write+0x112/0x4c0 [ 589.022078][T17224] ? kcsan_setup_watchpoint+0x26e/0x470 [ 589.027652][T17224] vfs_iter_write+0x4c/0x70 [ 589.032216][T17224] iter_file_splice_write+0x40a/0x750 [ 589.037612][T17224] ? rw_verify_area+0xf0/0x250 [ 589.042401][T17224] ? splice_from_pipe+0xc0/0xc0 [ 589.047339][T17224] do_splice+0x9aa/0xd30 [ 589.051634][T17224] ? vfs_write+0x50c/0x770 [ 589.056111][T17224] ? __fget_light+0x21b/0x260 [ 589.060767][T17224] __se_sys_splice+0x2a6/0x390 [ 589.065507][T17224] __x64_sys_splice+0x74/0x80 [ 589.070251][T17224] do_syscall_64+0x4a/0x90 [ 589.074661][T17224] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 589.080533][T17224] RIP: 0033:0x4665d9 [ 589.084409][T17224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.103999][T17224] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 11:40:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xb) 11:40:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:19 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:19 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 589.112420][T17224] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 589.120368][T17224] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 589.128314][T17224] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 589.136264][T17224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.144219][T17224] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:19 executing program 0 (fault-call:4 fault-nth:9): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 589.207839][ T25] audit: type=1326 audit(1621683619.707:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17229 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 589.381578][T17243] FAULT_INJECTION: forcing a failure. [ 589.381578][T17243] name failslab, interval 1, probability 0, space 0, times 0 [ 589.394404][T17243] CPU: 0 PID: 17243 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 589.403203][T17243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.413258][T17243] Call Trace: [ 589.416560][T17243] dump_stack+0x137/0x19d [ 589.421014][T17243] should_fail+0x23c/0x250 [ 589.425431][T17243] ? mempool_alloc_slab+0x16/0x20 11:40:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 589.430539][T17243] __should_failslab+0x81/0x90 [ 589.435319][T17243] should_failslab+0x5/0x20 [ 589.439824][T17243] kmem_cache_alloc+0x46/0x2f0 [ 589.444586][T17243] mempool_alloc_slab+0x16/0x20 [ 589.449441][T17243] ? mempool_free+0x130/0x130 [ 589.454114][T17243] mempool_alloc+0x8c/0x300 [ 589.458621][T17243] ? iov_iter_alignment+0x77a/0x800 [ 589.463830][T17243] bio_alloc_bioset+0xcc/0x480 [ 589.468589][T17243] iomap_dio_bio_actor+0x511/0xb50 [ 589.473711][T17243] iomap_dio_actor+0x26e/0x3b0 [ 589.478476][T17243] iomap_apply+0x1e2/0x400 [ 589.482961][T17243] __iomap_dio_rw+0x5af/0xad0 [ 589.487619][T17243] ? __iomap_dio_rw+0xad0/0xad0 [ 589.492526][T17243] iomap_dio_rw+0x30/0x70 [ 589.496844][T17243] ? ext4_file_write_iter+0x4e1/0x11d0 [ 589.502323][T17243] ext4_file_write_iter+0xa4f/0x11d0 [ 589.507663][T17243] ? ext4_file_write_iter+0x4e1/0x11d0 [ 589.513156][T17243] do_iter_readv_writev+0x2cb/0x360 [ 589.518338][T17243] do_iter_write+0x112/0x4c0 [ 589.522933][T17243] ? kcsan_setup_watchpoint+0x26e/0x470 [ 589.528549][T17243] vfs_iter_write+0x4c/0x70 [ 589.533031][T17243] iter_file_splice_write+0x40a/0x750 [ 589.538395][T17243] ? rw_verify_area+0xf0/0x250 [ 589.543160][T17243] ? splice_from_pipe+0xc0/0xc0 [ 589.547992][T17243] do_splice+0x9aa/0xd30 [ 589.552224][T17243] ? vfs_write+0x50c/0x770 [ 589.556617][T17243] ? __fget_light+0x21b/0x260 [ 589.561285][T17243] __se_sys_splice+0x2a6/0x390 [ 589.566081][T17243] __x64_sys_splice+0x74/0x80 [ 589.570739][T17243] do_syscall_64+0x4a/0x90 [ 589.575133][T17243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 589.581010][T17243] RIP: 0033:0x4665d9 [ 589.584895][T17243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.604494][T17243] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 589.612896][T17243] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 589.620864][T17243] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:20 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfdffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 589.628824][T17243] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 589.636797][T17243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 589.644774][T17243] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 589.658487][T17236] loop5: detected capacity change from 0 to 264192 [ 589.672713][T17236] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 589.811350][T17236] loop5: detected capacity change from 0 to 264192 [ 589.819762][T17236] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 590.028993][ T25] audit: type=1326 audit(1621683620.527:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17229 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xc) 11:40:20 executing program 0 (fault-call:4 fault-nth:10): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:20 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:20 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 590.141568][ T25] audit: type=1326 audit(1621683620.637:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17289 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 590.273119][T17284] FAULT_INJECTION: forcing a failure. [ 590.273119][T17284] name failslab, interval 1, probability 0, space 0, times 0 [ 590.285785][T17284] CPU: 0 PID: 17284 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 590.294640][T17284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.303331][T17292] loop5: detected capacity change from 0 to 264192 [ 590.304684][T17284] Call Trace: [ 590.304691][T17284] dump_stack+0x137/0x19d [ 590.304710][T17284] should_fail+0x23c/0x250 [ 590.304726][T17284] __should_failslab+0x81/0x90 [ 590.328010][T17284] should_failslab+0x5/0x20 [ 590.332593][T17284] kmem_cache_alloc_node+0x58/0x2b0 [ 590.337774][T17284] ? __next_zones_zonelist+0x4f/0x90 [ 590.343109][T17284] ? create_task_io_context+0x36/0x210 [ 590.348566][T17284] create_task_io_context+0x36/0x210 [ 590.353840][T17284] submit_bio_checks+0x778/0x800 [ 590.358848][T17284] ? kmem_cache_alloc+0x201/0x2f0 [ 590.363904][T17284] ? mempool_alloc_slab+0x16/0x20 [ 590.368912][T17284] submit_bio_noacct+0x33/0x7e0 [ 590.373854][T17284] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 590.379402][T17284] ? mempool_alloc+0x99/0x300 [ 590.384061][T17284] submit_bio+0x16d/0x2b0 [ 590.388471][T17284] ? bio_alloc_bioset+0x402/0x480 [ 590.393491][T17284] iomap_dio_bio_actor+0x91d/0xb50 [ 590.398593][T17284] iomap_dio_actor+0x26e/0x3b0 [ 590.403344][T17284] iomap_apply+0x1e2/0x400 [ 590.407734][T17284] __iomap_dio_rw+0x5af/0xad0 [ 590.412405][T17284] ? __iomap_dio_rw+0xad0/0xad0 [ 590.417236][T17284] iomap_dio_rw+0x30/0x70 [ 590.421542][T17284] ? ext4_file_write_iter+0x4e1/0x11d0 [ 590.427050][T17284] ext4_file_write_iter+0xa4f/0x11d0 [ 590.432314][T17284] ? ext4_file_write_iter+0x4e1/0x11d0 [ 590.437755][T17284] do_iter_readv_writev+0x2cb/0x360 [ 590.442949][T17284] do_iter_write+0x112/0x4c0 [ 590.447516][T17284] ? kcsan_setup_watchpoint+0x26e/0x470 [ 590.453088][T17284] vfs_iter_write+0x4c/0x70 [ 590.457577][T17284] iter_file_splice_write+0x40a/0x750 [ 590.462932][T17284] ? rw_verify_area+0xf0/0x250 [ 590.467681][T17284] ? splice_from_pipe+0xc0/0xc0 [ 590.472513][T17284] do_splice+0x9aa/0xd30 [ 590.476736][T17284] ? vfs_write+0x50c/0x770 [ 590.481134][T17284] ? __fget_light+0x21b/0x260 [ 590.485927][T17284] __se_sys_splice+0x2a6/0x390 [ 590.490870][T17284] __x64_sys_splice+0x74/0x80 [ 590.495551][T17284] do_syscall_64+0x4a/0x90 [ 590.500017][T17284] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 590.505899][T17284] RIP: 0033:0x4665d9 [ 590.509774][T17284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.529366][T17284] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 590.537761][T17284] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 590.545714][T17284] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 590.553666][T17284] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 590.561625][T17284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 11:40:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 590.569579][T17284] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 590.581075][T17292] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 590.781942][T17292] loop5: detected capacity change from 0 to 264192 [ 590.790015][T17292] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xd) 11:40:21 executing program 0 (fault-call:4 fault-nth:11): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 590.969275][ T25] audit: type=1326 audit(1621683621.467:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17289 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:21 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfeffffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:21 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x52526141, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 591.068903][ T25] audit: type=1326 audit(1621683621.567:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17341 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 591.237415][T17347] FAULT_INJECTION: forcing a failure. [ 591.237415][T17347] name failslab, interval 1, probability 0, space 0, times 0 [ 591.250058][T17347] CPU: 1 PID: 17347 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 591.258871][T17347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.268928][T17347] Call Trace: [ 591.272243][T17347] dump_stack+0x137/0x19d [ 591.276582][T17347] should_fail+0x23c/0x250 [ 591.281028][T17347] ? mempool_alloc_slab+0x16/0x20 [ 591.286085][T17347] __should_failslab+0x81/0x90 [ 591.290852][T17347] should_failslab+0x5/0x20 [ 591.295398][T17347] kmem_cache_alloc+0x46/0x2f0 [ 591.300166][T17347] ? ext4_inode_csum+0x3a6/0x430 [ 591.305093][T17347] mempool_alloc_slab+0x16/0x20 [ 591.309945][T17347] ? mempool_free+0x130/0x130 [ 591.314616][T17347] mempool_alloc+0x8c/0x300 [ 591.319115][T17347] ? ext4_mark_iloc_dirty+0x160a/0x1750 [ 591.324677][T17347] bio_clone_fast+0xa1/0x2b0 [ 591.329259][T17347] bio_split+0x9b/0x320 11:40:21 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xff0f000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 591.333442][T17347] __blk_queue_split+0xab2/0xc50 [ 591.338401][T17347] blk_mq_submit_bio+0xd3/0xe90 [ 591.343271][T17347] ? submit_bio_checks+0x661/0x800 [ 591.348552][T17347] submit_bio_noacct+0x6f2/0x7e0 [ 591.353529][T17347] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 591.359121][T17347] ? mempool_alloc+0x99/0x300 [ 591.363843][T17347] submit_bio+0x16d/0x2b0 [ 591.368657][T17347] ? bio_alloc_bioset+0x402/0x480 [ 591.373683][T17347] iomap_dio_bio_actor+0x91d/0xb50 [ 591.378795][T17347] iomap_dio_actor+0x26e/0x3b0 [ 591.383621][T17347] iomap_apply+0x1e2/0x400 [ 591.388060][T17347] __iomap_dio_rw+0x5af/0xad0 [ 591.392740][T17347] ? __iomap_dio_rw+0xad0/0xad0 [ 591.397587][T17347] iomap_dio_rw+0x30/0x70 [ 591.401908][T17347] ? ext4_file_write_iter+0x4e1/0x11d0 [ 591.407367][T17347] ext4_file_write_iter+0xa4f/0x11d0 [ 591.412715][T17347] ? ext4_file_write_iter+0x4e1/0x11d0 [ 591.418180][T17347] do_iter_readv_writev+0x2cb/0x360 [ 591.423520][T17347] do_iter_write+0x112/0x4c0 [ 591.428105][T17347] ? kcsan_setup_watchpoint+0x26e/0x470 [ 591.433654][T17347] vfs_iter_write+0x4c/0x70 [ 591.438205][T17347] iter_file_splice_write+0x40a/0x750 [ 591.443660][T17347] ? rw_verify_area+0xf0/0x250 [ 591.448548][T17347] ? splice_from_pipe+0xc0/0xc0 [ 591.453399][T17347] do_splice+0x9aa/0xd30 [ 591.457662][T17347] ? vfs_write+0x50c/0x770 [ 591.462079][T17347] ? __fget_light+0x21b/0x260 [ 591.466830][T17347] __se_sys_splice+0x2a6/0x390 [ 591.471716][T17347] __x64_sys_splice+0x74/0x80 [ 591.476398][T17347] do_syscall_64+0x4a/0x90 [ 591.480835][T17347] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 591.486736][T17347] RIP: 0033:0x4665d9 [ 591.490689][T17347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 591.510372][T17347] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 591.518860][T17347] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 591.526826][T17347] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 591.534795][T17347] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 591.542759][T17347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 591.550747][T17347] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 591.573750][T17345] loop5: detected capacity change from 0 to 264192 [ 591.593179][T17345] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 591.670061][T17345] loop5: detected capacity change from 0 to 264192 [ 591.677378][T17345] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 591.897251][ T25] audit: type=1326 audit(1621683622.387:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17341 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xe) 11:40:22 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffbffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:22 executing program 0 (fault-call:4 fault-nth:12): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:22 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x60000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 592.006468][ T25] audit: type=1326 audit(1621683622.497:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17388 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 592.124420][T17391] FAULT_INJECTION: forcing a failure. [ 592.124420][T17391] name failslab, interval 1, probability 0, space 0, times 0 [ 592.137085][T17391] CPU: 0 PID: 17391 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 592.145929][T17391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.155976][T17391] Call Trace: [ 592.159244][T17391] dump_stack+0x137/0x19d [ 592.163598][T17391] should_fail+0x23c/0x250 [ 592.168007][T17391] ? mempool_alloc_slab+0x16/0x20 [ 592.173041][T17391] __should_failslab+0x81/0x90 [ 592.177803][T17391] should_failslab+0x5/0x20 [ 592.182298][T17391] kmem_cache_alloc+0x46/0x2f0 [ 592.187065][T17391] ? mempool_alloc_slab+0x16/0x20 [ 592.192083][T17391] mempool_alloc_slab+0x16/0x20 [ 592.196947][T17391] ? mempool_free+0x130/0x130 [ 592.201620][T17391] mempool_alloc+0x8c/0x300 [ 592.206157][T17391] ? sbitmap_get+0x387/0x410 [ 592.210772][T17391] bio_clone_fast+0xa1/0x2b0 [ 592.215419][T17391] bio_split+0x9b/0x320 [ 592.219613][T17391] ? __blk_mq_get_tag+0x106/0x2a0 [ 592.224638][T17391] __blk_queue_split+0xab2/0xc50 [ 592.229609][T17391] blk_mq_submit_bio+0xd3/0xe90 [ 592.234451][T17391] submit_bio_noacct+0x6f2/0x7e0 [ 592.239438][T17391] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 592.245014][T17391] ? mempool_alloc+0x99/0x300 [ 592.249674][T17391] submit_bio+0x16d/0x2b0 [ 592.254083][T17391] ? kcsan_setup_watchpoint+0x26e/0x470 [ 592.259660][T17391] iomap_dio_bio_actor+0x91d/0xb50 [ 592.264761][T17391] iomap_dio_actor+0x26e/0x3b0 [ 592.269515][T17391] iomap_apply+0x1e2/0x400 [ 592.274017][T17391] __iomap_dio_rw+0x5af/0xad0 [ 592.278687][T17391] ? __iomap_dio_rw+0xad0/0xad0 [ 592.283403][T17393] loop5: detected capacity change from 0 to 264192 [ 592.283592][T17391] iomap_dio_rw+0x30/0x70 [ 592.294380][T17391] ? ext4_file_write_iter+0x4e1/0x11d0 [ 592.299893][T17391] ext4_file_write_iter+0xa4f/0x11d0 [ 592.305234][T17391] ? ext4_file_write_iter+0x4e1/0x11d0 [ 592.310759][T17391] do_iter_readv_writev+0x2cb/0x360 [ 592.315991][T17391] do_iter_write+0x112/0x4c0 [ 592.320556][T17391] ? kcsan_setup_watchpoint+0x26e/0x470 [ 592.326101][T17391] vfs_iter_write+0x4c/0x70 [ 592.330591][T17391] iter_file_splice_write+0x40a/0x750 [ 592.335940][T17391] ? rw_verify_area+0xf0/0x250 [ 592.340867][T17391] ? splice_from_pipe+0xc0/0xc0 [ 592.345707][T17391] do_splice+0x9aa/0xd30 [ 592.350080][T17391] ? vfs_write+0x50c/0x770 [ 592.354632][T17391] ? __fget_light+0x21b/0x260 [ 592.359313][T17391] __se_sys_splice+0x2a6/0x390 [ 592.364066][T17391] __x64_sys_splice+0x74/0x80 [ 592.368731][T17391] do_syscall_64+0x4a/0x90 [ 592.373148][T17391] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 592.379041][T17391] RIP: 0033:0x4665d9 [ 592.382916][T17391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 592.402534][T17391] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 592.411006][T17391] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 11:40:22 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffdffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 592.418970][T17391] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 592.426916][T17391] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 592.434948][T17391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 592.442974][T17391] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 592.470684][T17393] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 592.641843][T17393] loop5: detected capacity change from 0 to 264192 [ 592.649284][T17393] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 592.833763][ T25] audit: type=1326 audit(1621683623.327:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17388 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x10) 11:40:23 executing program 0 (fault-call:4 fault-nth:13): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:23 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x61417272, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:23 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffff1f0000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x25a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 593.060204][T17440] FAULT_INJECTION: forcing a failure. [ 593.060204][T17440] name failslab, interval 1, probability 0, space 0, times 0 [ 593.072900][T17440] CPU: 1 PID: 17440 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 593.081653][T17440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.091714][T17440] Call Trace: [ 593.094996][T17440] dump_stack+0x137/0x19d [ 593.099315][T17440] should_fail+0x23c/0x250 [ 593.103750][T17440] ? mempool_alloc_slab+0x16/0x20 11:40:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x23000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 593.108825][T17440] __should_failslab+0x81/0x90 [ 593.113624][T17440] should_failslab+0x5/0x20 [ 593.118110][T17440] kmem_cache_alloc+0x46/0x2f0 [ 593.122888][T17440] mempool_alloc_slab+0x16/0x20 [ 593.127831][T17440] ? mempool_free+0x130/0x130 [ 593.132553][T17440] mempool_alloc+0x8c/0x300 [ 593.137125][T17440] sg_pool_alloc+0x74/0x90 [ 593.141535][T17440] __sg_alloc_table+0xce/0x290 [ 593.146449][T17440] sg_alloc_table_chained+0xaf/0x140 [ 593.151729][T17440] ? sg_alloc_table_chained+0x140/0x140 [ 593.157376][T17440] scsi_alloc_sgtables+0x180/0x500 [ 593.162489][T17440] sd_init_command+0x935/0x15f0 [ 593.167385][T17440] scsi_queue_rq+0x10e0/0x15a0 [ 593.172156][T17440] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 593.177757][T17440] ? deadline_remove_request+0x158/0x180 [ 593.183373][T17440] ? dd_dispatch_request+0x2e1/0x3d0 [ 593.188647][T17440] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 593.194201][T17440] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 593.200455][T17440] blk_mq_sched_dispatch_requests+0x9f/0x110 11:40:23 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 593.206480][T17440] __blk_mq_run_hw_queue+0xbc/0x140 [ 593.211672][T17440] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 593.217559][T17440] ? dd_insert_request+0x255/0x330 [ 593.222673][T17440] blk_mq_run_hw_queue+0x22c/0x250 [ 593.227808][T17440] ? dd_finish_request+0x10/0x10 [ 593.232737][T17440] blk_mq_sched_insert_requests+0x13f/0x200 [ 593.238646][T17440] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 593.244080][T17440] blk_flush_plug_list+0x235/0x260 [ 593.249191][T17440] ? __blk_mq_alloc_request+0x270/0x290 [ 593.254742][T17440] blk_mq_submit_bio+0x68a/0xe90 [ 593.259673][T17440] submit_bio_noacct+0x6f2/0x7e0 [ 593.259890][T17444] loop5: detected capacity change from 0 to 264192 [ 593.264688][T17440] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 593.264707][T17440] ? mempool_alloc+0x99/0x300 [ 593.264722][T17440] submit_bio+0x16d/0x2b0 [ 593.264738][T17440] ? bio_alloc_bioset+0x402/0x480 [ 593.264752][T17440] iomap_dio_bio_actor+0x91d/0xb50 [ 593.295791][T17440] iomap_dio_actor+0x26e/0x3b0 [ 593.300545][T17440] iomap_apply+0x1e2/0x400 [ 593.305003][T17440] __iomap_dio_rw+0x5af/0xad0 [ 593.309662][T17440] ? __iomap_dio_rw+0xad0/0xad0 [ 593.314488][T17440] iomap_dio_rw+0x30/0x70 [ 593.318853][T17440] ? ext4_file_write_iter+0x4e1/0x11d0 [ 593.324289][T17440] ext4_file_write_iter+0xa4f/0x11d0 [ 593.329596][T17440] ? ext4_file_write_iter+0x4e1/0x11d0 [ 593.335048][T17440] do_iter_readv_writev+0x2cb/0x360 [ 593.340226][T17440] do_iter_write+0x112/0x4c0 [ 593.344813][T17440] ? kcsan_setup_watchpoint+0x26e/0x470 [ 593.350342][T17440] vfs_iter_write+0x4c/0x70 [ 593.354858][T17440] iter_file_splice_write+0x40a/0x750 [ 593.360271][T17440] ? rw_verify_area+0xf0/0x250 [ 593.365284][T17440] ? splice_from_pipe+0xc0/0xc0 [ 593.370182][T17440] do_splice+0x9aa/0xd30 [ 593.374444][T17440] ? vfs_write+0x50c/0x770 [ 593.378852][T17440] ? __fget_light+0x21b/0x260 [ 593.383523][T17440] __se_sys_splice+0x2a6/0x390 [ 593.388268][T17440] __x64_sys_splice+0x74/0x80 [ 593.392928][T17440] do_syscall_64+0x4a/0x90 [ 593.397342][T17440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 593.403220][T17440] RIP: 0033:0x4665d9 [ 593.407095][T17440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 593.426682][T17440] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 593.435065][T17440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 593.443015][T17440] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 593.451012][T17440] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 593.458961][T17440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 593.466928][T17440] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 593.487175][T17444] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 593.591508][T17444] loop5: detected capacity change from 0 to 264192 [ 593.617778][T17444] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x11) 11:40:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:24 executing program 0 (fault-call:4 fault-nth:14): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:24 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:24 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 593.733621][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 593.733631][ T25] audit: type=1326 audit(1621683624.227:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17434 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 593.844319][ T25] audit: type=1326 audit(1621683624.337:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17491 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 593.975606][T17493] FAULT_INJECTION: forcing a failure. [ 593.975606][T17493] name failslab, interval 1, probability 0, space 0, times 0 [ 593.988417][T17493] CPU: 0 PID: 17493 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 593.997174][T17493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.007216][T17493] Call Trace: [ 594.010485][T17493] dump_stack+0x137/0x19d [ 594.015240][T17493] should_fail+0x23c/0x250 [ 594.019640][T17493] ? mempool_alloc_slab+0x16/0x20 11:40:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 594.024711][T17493] __should_failslab+0x81/0x90 [ 594.029832][T17493] should_failslab+0x5/0x20 [ 594.034345][T17493] kmem_cache_alloc+0x46/0x2f0 [ 594.039109][T17493] mempool_alloc_slab+0x16/0x20 [ 594.043968][T17493] ? mempool_free+0x130/0x130 [ 594.048644][T17493] mempool_alloc+0x8c/0x300 [ 594.053144][T17493] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 594.059358][T17493] ? __blk_mq_run_hw_queue+0xea/0x140 [ 594.064779][T17493] bio_clone_fast+0xa1/0x2b0 [ 594.069387][T17493] bio_split+0x9b/0x320 [ 594.073552][T17493] __blk_queue_split+0xab2/0xc50 [ 594.078555][T17493] blk_mq_submit_bio+0xd3/0xe90 [ 594.083404][T17493] submit_bio_noacct+0x6f2/0x7e0 [ 594.088332][T17493] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 594.093891][T17493] ? mempool_alloc+0x99/0x300 [ 594.098553][T17493] submit_bio+0x16d/0x2b0 [ 594.102887][T17493] ? bio_alloc_bioset+0x402/0x480 [ 594.107967][T17493] iomap_dio_bio_actor+0x91d/0xb50 [ 594.113149][T17493] iomap_dio_actor+0x26e/0x3b0 [ 594.117924][T17493] iomap_apply+0x1e2/0x400 [ 594.122331][T17493] __iomap_dio_rw+0x5af/0xad0 [ 594.127004][T17493] ? __iomap_dio_rw+0xad0/0xad0 [ 594.131836][T17493] iomap_dio_rw+0x30/0x70 [ 594.136174][T17493] ? ext4_file_write_iter+0x4e1/0x11d0 [ 594.141635][T17493] ext4_file_write_iter+0xa4f/0x11d0 [ 594.146915][T17493] ? ext4_file_write_iter+0x4e1/0x11d0 [ 594.152363][T17493] do_iter_readv_writev+0x2cb/0x360 [ 594.157548][T17493] do_iter_write+0x112/0x4c0 [ 594.162115][T17493] ? kcsan_setup_watchpoint+0x26e/0x470 [ 594.167646][T17493] vfs_iter_write+0x4c/0x70 [ 594.172128][T17493] iter_file_splice_write+0x40a/0x750 [ 594.177478][T17493] ? rw_verify_area+0xf0/0x250 [ 594.182278][T17493] ? splice_from_pipe+0xc0/0xc0 [ 594.187106][T17493] do_splice+0x9aa/0xd30 [ 594.191370][T17493] ? vfs_write+0x50c/0x770 [ 594.195901][T17493] ? __fget_light+0x21b/0x260 [ 594.200557][T17493] __se_sys_splice+0x2a6/0x390 [ 594.205296][T17493] __x64_sys_splice+0x74/0x80 [ 594.210019][T17493] do_syscall_64+0x4a/0x90 [ 594.214412][T17493] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 594.220337][T17493] RIP: 0033:0x4665d9 [ 594.224219][T17493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 594.243865][T17493] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 594.252254][T17493] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 594.260254][T17493] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 594.268203][T17493] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:24 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 594.276152][T17493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 594.284113][T17493] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 594.297463][T17496] loop5: detected capacity change from 0 to 264192 [ 594.315701][T17496] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 594.427775][T17496] loop5: detected capacity change from 0 to 264192 11:40:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x12) 11:40:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:25 executing program 0 (fault-call:4 fault-nth:15): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:25 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:25 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 594.677369][ T25] audit: type=1326 audit(1621683625.167:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17491 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 594.781714][ T25] audit: type=1326 audit(1621683625.277:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17537 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 594.924444][T17546] FAULT_INJECTION: forcing a failure. [ 594.924444][T17546] name failslab, interval 1, probability 0, space 0, times 0 [ 594.937125][T17546] CPU: 0 PID: 17546 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 594.945872][T17546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.955924][T17546] Call Trace: [ 594.959193][T17546] dump_stack+0x137/0x19d [ 594.963533][T17546] should_fail+0x23c/0x250 [ 594.968050][T17546] ? mempool_alloc_slab+0x16/0x20 [ 594.973064][T17546] __should_failslab+0x81/0x90 [ 594.977851][T17546] should_failslab+0x5/0x20 [ 594.982371][T17546] kmem_cache_alloc+0x46/0x2f0 [ 594.985136][T17545] loop5: detected capacity change from 0 to 264192 [ 594.987124][T17546] mempool_alloc_slab+0x16/0x20 [ 594.998484][T17546] ? mempool_free+0x130/0x130 [ 595.003282][T17546] mempool_alloc+0x8c/0x300 [ 595.007778][T17546] sg_pool_alloc+0x74/0x90 [ 595.012315][T17546] __sg_alloc_table+0xce/0x290 [ 595.017064][T17546] sg_alloc_table_chained+0xaf/0x140 [ 595.022325][T17546] ? sg_alloc_table_chained+0x140/0x140 [ 595.027850][T17546] scsi_alloc_sgtables+0x180/0x500 [ 595.033003][T17546] sd_init_command+0x935/0x15f0 [ 595.037847][T17546] scsi_queue_rq+0x10e0/0x15a0 [ 595.042590][T17546] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 595.048166][T17546] ? deadline_remove_request+0x158/0x180 [ 595.053792][T17546] ? dd_dispatch_request+0x2e1/0x3d0 [ 595.059109][T17546] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 595.064654][T17546] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 595.070945][T17546] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 595.076901][T17546] __blk_mq_run_hw_queue+0xbc/0x140 [ 595.082082][T17546] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 595.087970][T17546] ? dd_insert_request+0x255/0x330 [ 595.093127][T17546] blk_mq_run_hw_queue+0x22c/0x250 [ 595.098231][T17546] ? dd_finish_request+0x10/0x10 [ 595.103142][T17546] blk_mq_sched_insert_requests+0x13f/0x200 [ 595.109016][T17546] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 595.114460][T17546] blk_flush_plug_list+0x235/0x260 [ 595.119557][T17546] ? __blk_mq_alloc_request+0x270/0x290 [ 595.125109][T17546] blk_mq_submit_bio+0x68a/0xe90 [ 595.130034][T17546] submit_bio_noacct+0x6f2/0x7e0 [ 595.135026][T17546] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 595.140559][T17546] ? mempool_alloc+0x99/0x300 [ 595.145342][T17546] submit_bio+0x16d/0x2b0 [ 595.149662][T17546] ? bio_alloc_bioset+0x402/0x480 [ 595.154662][T17546] iomap_dio_bio_actor+0x91d/0xb50 [ 595.159752][T17546] iomap_dio_actor+0x26e/0x3b0 [ 595.164501][T17546] iomap_apply+0x1e2/0x400 [ 595.168894][T17546] __iomap_dio_rw+0x5af/0xad0 [ 595.173550][T17546] ? __iomap_dio_rw+0xad0/0xad0 [ 595.178414][T17546] iomap_dio_rw+0x30/0x70 [ 595.182752][T17546] ? ext4_file_write_iter+0x4e1/0x11d0 [ 595.188222][T17546] ext4_file_write_iter+0xa4f/0x11d0 [ 595.193503][T17546] ? ext4_file_write_iter+0x4e1/0x11d0 [ 595.198942][T17546] do_iter_readv_writev+0x2cb/0x360 [ 595.204117][T17546] do_iter_write+0x112/0x4c0 [ 595.208684][T17546] ? kcsan_setup_watchpoint+0x26e/0x470 [ 595.214210][T17546] vfs_iter_write+0x4c/0x70 [ 595.218687][T17546] iter_file_splice_write+0x40a/0x750 [ 595.224165][T17546] ? rw_verify_area+0xf0/0x250 [ 595.228938][T17546] ? splice_from_pipe+0xc0/0xc0 [ 595.233776][T17546] do_splice+0x9aa/0xd30 [ 595.238000][T17546] ? vfs_write+0x50c/0x770 [ 595.242458][T17546] ? __fget_light+0x21b/0x260 [ 595.247117][T17546] __se_sys_splice+0x2a6/0x390 [ 595.251893][T17546] __x64_sys_splice+0x74/0x80 [ 595.256545][T17546] do_syscall_64+0x4a/0x90 [ 595.260936][T17546] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 595.266816][T17546] RIP: 0033:0x4665d9 [ 595.270694][T17546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 595.290277][T17546] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 595.298714][T17546] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 595.306663][T17546] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 595.314700][T17546] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 595.322656][T17546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 595.330756][T17546] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 595.389020][T17545] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 595.540813][T17545] loop5: detected capacity change from 0 to 264192 [ 595.548327][T17545] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x25) 11:40:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:26 executing program 0 (fault-call:4 fault-nth:16): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:26 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:26 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x72724161, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 595.603434][ T25] audit: type=1326 audit(1621683626.097:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17537 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 595.704476][ T25] audit: type=1326 audit(1621683626.197:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17588 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 595.836943][T17600] FAULT_INJECTION: forcing a failure. [ 595.836943][T17600] name failslab, interval 1, probability 0, space 0, times 0 [ 595.849583][T17600] CPU: 0 PID: 17600 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 595.858338][T17600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.868391][T17600] Call Trace: [ 595.871676][T17600] dump_stack+0x137/0x19d [ 595.876070][T17600] should_fail+0x23c/0x250 [ 595.880472][T17600] ? mempool_alloc_slab+0x16/0x20 [ 595.885498][T17600] __should_failslab+0x81/0x90 [ 595.890319][T17600] should_failslab+0x5/0x20 [ 595.894815][T17600] kmem_cache_alloc+0x46/0x2f0 [ 595.899575][T17600] mempool_alloc_slab+0x16/0x20 [ 595.904417][T17600] ? mempool_free+0x130/0x130 [ 595.909158][T17600] mempool_alloc+0x8c/0x300 [ 595.913653][T17600] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 595.919823][T17600] ? __blk_mq_run_hw_queue+0xea/0x140 [ 595.925179][T17600] bio_clone_fast+0xa1/0x2b0 [ 595.929756][T17600] bio_split+0x9b/0x320 [ 595.933896][T17600] __blk_queue_split+0xab2/0xc50 [ 595.938821][T17600] blk_mq_submit_bio+0xd3/0xe90 [ 595.943656][T17600] submit_bio_noacct+0x6f2/0x7e0 [ 595.948580][T17600] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 595.954173][T17600] ? mempool_alloc+0x99/0x300 [ 595.958972][T17600] submit_bio+0x16d/0x2b0 [ 595.963295][T17600] ? bio_alloc_bioset+0x402/0x480 [ 595.968346][T17600] iomap_dio_bio_actor+0x91d/0xb50 [ 595.973484][T17600] iomap_dio_actor+0x26e/0x3b0 [ 595.978229][T17600] iomap_apply+0x1e2/0x400 [ 595.982625][T17600] __iomap_dio_rw+0x5af/0xad0 [ 595.987282][T17600] ? __iomap_dio_rw+0xad0/0xad0 [ 595.992115][T17600] iomap_dio_rw+0x30/0x70 [ 595.996428][T17600] ? ext4_file_write_iter+0x4e1/0x11d0 [ 596.001876][T17600] ext4_file_write_iter+0xa4f/0x11d0 [ 596.007256][T17600] ? ext4_file_write_iter+0x4e1/0x11d0 [ 596.012762][T17600] do_iter_readv_writev+0x2cb/0x360 [ 596.017956][T17600] do_iter_write+0x112/0x4c0 [ 596.022659][T17600] vfs_iter_write+0x4c/0x70 [ 596.027200][T17600] iter_file_splice_write+0x40a/0x750 [ 596.032590][T17600] ? rw_verify_area+0xf0/0x250 [ 596.037339][T17600] ? splice_from_pipe+0xc0/0xc0 [ 596.042186][T17600] do_splice+0x9aa/0xd30 [ 596.046415][T17600] ? vfs_write+0x50c/0x770 [ 596.050813][T17600] ? __fget_light+0x21b/0x260 [ 596.055539][T17600] __se_sys_splice+0x2a6/0x390 [ 596.060331][T17600] __x64_sys_splice+0x74/0x80 [ 596.064988][T17600] do_syscall_64+0x4a/0x90 [ 596.069387][T17600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 596.075278][T17600] RIP: 0033:0x4665d9 [ 596.079170][T17600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 596.098756][T17600] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 596.107211][T17600] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 596.115204][T17600] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 596.123168][T17600] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 596.131120][T17600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 596.139120][T17600] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 596.189882][T17595] loop5: detected capacity change from 0 to 264192 [ 596.202597][T17595] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 596.309953][T17595] loop5: detected capacity change from 0 to 264192 [ 596.317041][T17595] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 596.532839][ T25] audit: type=1326 audit(1621683627.027:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17588 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x48) 11:40:27 executing program 0 (fault-call:4 fault-nth:17): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:27 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 596.619898][ T25] audit: type=1326 audit(1621683627.117:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17647 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 596.725552][T17646] FAULT_INJECTION: forcing a failure. [ 596.725552][T17646] name failslab, interval 1, probability 0, space 0, times 0 [ 596.738231][T17646] CPU: 0 PID: 17646 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 596.747004][T17646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.748109][T17651] loop5: detected capacity change from 0 to 264192 [ 596.757045][T17646] Call Trace: [ 596.757053][T17646] dump_stack+0x137/0x19d [ 596.771137][T17646] should_fail+0x23c/0x250 [ 596.775661][T17646] ? mempool_alloc_slab+0x16/0x20 [ 596.780670][T17646] __should_failslab+0x81/0x90 [ 596.785464][T17646] should_failslab+0x5/0x20 [ 596.789952][T17646] kmem_cache_alloc+0x46/0x2f0 [ 596.794707][T17646] mempool_alloc_slab+0x16/0x20 [ 596.799564][T17646] ? mempool_free+0x130/0x130 [ 596.804241][T17646] mempool_alloc+0x8c/0x300 [ 596.808733][T17646] sg_pool_alloc+0x74/0x90 [ 596.813150][T17646] __sg_alloc_table+0xce/0x290 [ 596.817908][T17646] sg_alloc_table_chained+0xaf/0x140 [ 596.823192][T17646] ? sg_alloc_table_chained+0x140/0x140 [ 596.828734][T17646] scsi_alloc_sgtables+0x180/0x500 [ 596.833833][T17646] sd_init_command+0x935/0x15f0 [ 596.838693][T17646] scsi_queue_rq+0x10e0/0x15a0 [ 596.843445][T17646] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 596.849048][T17646] ? deadline_remove_request+0x158/0x180 [ 596.854689][T17646] ? dd_dispatch_request+0x2e1/0x3d0 [ 596.859951][T17646] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 596.865491][T17646] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 596.871727][T17646] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 596.877739][T17646] __blk_mq_run_hw_queue+0xbc/0x140 [ 596.882954][T17646] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 596.888781][T17646] ? dd_insert_request+0x255/0x330 [ 596.893873][T17646] blk_mq_run_hw_queue+0x22c/0x250 [ 596.899002][T17646] ? dd_finish_request+0x10/0x10 [ 596.903946][T17646] blk_mq_sched_insert_requests+0x13f/0x200 [ 596.909845][T17646] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 596.915222][T17646] blk_flush_plug_list+0x235/0x260 [ 596.920309][T17646] ? __blk_mq_alloc_request+0x270/0x290 [ 596.925836][T17646] blk_mq_submit_bio+0x68a/0xe90 [ 596.930760][T17646] submit_bio_noacct+0x6f2/0x7e0 [ 596.935682][T17646] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 596.941287][T17646] ? mempool_alloc+0x99/0x300 [ 596.946069][T17646] submit_bio+0x16d/0x2b0 [ 596.950423][T17646] ? kcsan_setup_watchpoint+0x26e/0x470 [ 596.956075][T17646] iomap_dio_bio_actor+0x91d/0xb50 [ 596.961167][T17646] iomap_dio_actor+0x26e/0x3b0 [ 596.965912][T17646] iomap_apply+0x1e2/0x400 [ 596.970315][T17646] __iomap_dio_rw+0x5af/0xad0 [ 596.974966][T17646] ? __iomap_dio_rw+0xad0/0xad0 [ 596.979806][T17646] iomap_dio_rw+0x30/0x70 [ 596.984132][T17646] ? ext4_file_write_iter+0x4e1/0x11d0 [ 596.989575][T17646] ext4_file_write_iter+0xa4f/0x11d0 [ 596.996578][T17646] ? ext4_file_write_iter+0x4e1/0x11d0 [ 597.002067][T17646] do_iter_readv_writev+0x2cb/0x360 [ 597.007243][T17646] do_iter_write+0x112/0x4c0 [ 597.011812][T17646] ? kcsan_setup_watchpoint+0x26e/0x470 [ 597.017401][T17646] vfs_iter_write+0x4c/0x70 [ 597.021881][T17646] iter_file_splice_write+0x40a/0x750 [ 597.027233][T17646] ? rw_verify_area+0xf0/0x250 [ 597.031986][T17646] ? splice_from_pipe+0xc0/0xc0 [ 597.036814][T17646] do_splice+0x9aa/0xd30 [ 597.041052][T17646] ? vfs_write+0x50c/0x770 [ 597.045480][T17646] ? __fget_light+0x21b/0x260 [ 597.050224][T17646] __se_sys_splice+0x2a6/0x390 [ 597.054967][T17646] __x64_sys_splice+0x74/0x80 [ 597.059624][T17646] do_syscall_64+0x4a/0x90 [ 597.064067][T17646] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 597.070026][T17646] RIP: 0033:0x4665d9 [ 597.073899][T17646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.093603][T17646] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 597.101991][T17646] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 597.110059][T17646] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 597.118042][T17646] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5a02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 597.125993][T17646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 597.133943][T17646] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 597.174170][T17651] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 597.361197][T17651] loop5: detected capacity change from 0 to 264192 [ 597.368521][T17651] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x4c) 11:40:28 executing program 0 (fault-call:4 fault-nth:18): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:28 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x78000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 597.450018][ T25] audit: type=1326 audit(1621683627.947:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17647 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 597.514628][ T25] audit: type=1326 audit(1621683628.007:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17692 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7a00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 597.670463][T17701] loop5: detected capacity change from 0 to 264192 [ 597.695110][T17701] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 597.710185][T17705] FAULT_INJECTION: forcing a failure. [ 597.710185][T17705] name failslab, interval 1, probability 0, space 0, times 0 [ 597.722832][T17705] CPU: 0 PID: 17705 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 597.731591][T17705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.741784][T17705] Call Trace: [ 597.745045][T17705] dump_stack+0x137/0x19d [ 597.749460][T17705] should_fail+0x23c/0x250 [ 597.753851][T17705] ? mempool_alloc_slab+0x16/0x20 [ 597.758905][T17705] __should_failslab+0x81/0x90 [ 597.763731][T17705] should_failslab+0x5/0x20 [ 597.768231][T17705] kmem_cache_alloc+0x46/0x2f0 [ 597.773093][T17705] mempool_alloc_slab+0x16/0x20 [ 597.777922][T17705] ? mempool_free+0x130/0x130 [ 597.782574][T17705] mempool_alloc+0x8c/0x300 [ 597.787132][T17705] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 597.793279][T17705] ? __blk_mq_run_hw_queue+0xea/0x140 [ 597.798668][T17705] bio_clone_fast+0xa1/0x2b0 [ 597.803246][T17705] bio_split+0x9b/0x320 [ 597.807400][T17705] __blk_queue_split+0xab2/0xc50 [ 597.812353][T17705] blk_mq_submit_bio+0xd3/0xe90 [ 597.817189][T17705] submit_bio_noacct+0x6f2/0x7e0 [ 597.822139][T17705] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 597.827714][T17705] ? mempool_alloc+0x99/0x300 [ 597.832386][T17705] submit_bio+0x16d/0x2b0 [ 597.836722][T17705] ? bio_alloc_bioset+0x402/0x480 [ 597.841723][T17705] iomap_dio_bio_actor+0x91d/0xb50 [ 597.846821][T17705] iomap_dio_actor+0x26e/0x3b0 [ 597.851626][T17705] iomap_apply+0x1e2/0x400 [ 597.856020][T17705] __iomap_dio_rw+0x5af/0xad0 [ 597.860686][T17705] ? __iomap_dio_rw+0xad0/0xad0 [ 597.865515][T17705] iomap_dio_rw+0x30/0x70 [ 597.869821][T17705] ? ext4_file_write_iter+0x4e1/0x11d0 [ 597.875265][T17705] ext4_file_write_iter+0xa4f/0x11d0 [ 597.880574][T17705] ? ext4_file_write_iter+0x4e1/0x11d0 [ 597.886184][T17705] do_iter_readv_writev+0x2cb/0x360 [ 597.891374][T17705] do_iter_write+0x112/0x4c0 [ 597.896061][T17705] ? kcsan_setup_watchpoint+0x26e/0x470 [ 597.901598][T17705] vfs_iter_write+0x4c/0x70 [ 597.906082][T17705] iter_file_splice_write+0x40a/0x750 [ 597.911434][T17705] ? rw_verify_area+0xf0/0x250 [ 597.916180][T17705] ? splice_from_pipe+0xc0/0xc0 [ 597.921016][T17705] do_splice+0x9aa/0xd30 [ 597.925233][T17705] ? vfs_write+0x50c/0x770 [ 597.929623][T17705] ? __fget_light+0x21b/0x260 [ 597.934279][T17705] __se_sys_splice+0x2a6/0x390 [ 597.939045][T17705] __x64_sys_splice+0x74/0x80 [ 597.943702][T17705] do_syscall_64+0x4a/0x90 [ 597.948100][T17705] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 597.954033][T17705] RIP: 0033:0x4665d9 [ 597.957902][T17705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.977484][T17705] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 597.985872][T17705] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 597.993822][T17705] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 598.001771][T17705] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 598.009789][T17705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 11:40:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 598.017802][T17705] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x68) 11:40:28 executing program 0 (fault-call:4 fault-nth:19): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:28 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb301, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 598.564369][T17752] FAULT_INJECTION: forcing a failure. [ 598.564369][T17752] name failslab, interval 1, probability 0, space 0, times 0 [ 598.577147][T17752] CPU: 0 PID: 17752 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 598.585904][T17752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.595960][T17752] Call Trace: [ 598.599239][T17752] dump_stack+0x137/0x19d [ 598.603621][T17752] should_fail+0x23c/0x250 [ 598.608047][T17752] ? mempool_alloc_slab+0x16/0x20 [ 598.613137][T17752] __should_failslab+0x81/0x90 [ 598.617898][T17752] should_failslab+0x5/0x20 [ 598.622400][T17752] kmem_cache_alloc+0x46/0x2f0 [ 598.627163][T17752] mempool_alloc_slab+0x16/0x20 [ 598.632006][T17752] ? mempool_free+0x130/0x130 [ 598.636674][T17752] mempool_alloc+0x8c/0x300 [ 598.641175][T17752] sg_pool_alloc+0x74/0x90 [ 598.645585][T17752] __sg_alloc_table+0xce/0x290 [ 598.650350][T17752] sg_alloc_table_chained+0xaf/0x140 [ 598.655619][T17752] ? sg_alloc_table_chained+0x140/0x140 11:40:29 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x7, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 598.661157][T17752] scsi_alloc_sgtables+0x180/0x500 [ 598.666256][T17752] sd_init_command+0x935/0x15f0 [ 598.671101][T17752] scsi_queue_rq+0x10e0/0x15a0 [ 598.675870][T17752] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 598.681405][T17752] ? deadline_remove_request+0x158/0x180 [ 598.687033][T17752] ? dd_dispatch_request+0x2e1/0x3d0 [ 598.692356][T17752] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 598.697898][T17752] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 598.704137][T17752] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 598.710307][T17752] __blk_mq_run_hw_queue+0xbc/0x140 [ 598.715617][T17752] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 598.721457][T17752] ? dd_insert_request+0x255/0x330 [ 598.726562][T17752] blk_mq_run_hw_queue+0x22c/0x250 [ 598.732097][T17752] ? dd_finish_request+0x10/0x10 [ 598.737054][T17752] blk_mq_sched_insert_requests+0x13f/0x200 [ 598.743024][T17752] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 598.748390][T17752] blk_flush_plug_list+0x235/0x260 [ 598.753513][T17752] ? __blk_mq_alloc_request+0x270/0x290 [ 598.759071][T17752] blk_mq_submit_bio+0x68a/0xe90 [ 598.764002][T17752] submit_bio_noacct+0x6f2/0x7e0 [ 598.768960][T17752] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 598.774502][T17752] ? mempool_alloc+0x99/0x300 [ 598.779284][T17752] submit_bio+0x16d/0x2b0 [ 598.783632][T17752] ? bio_alloc_bioset+0x402/0x480 [ 598.788707][T17752] iomap_dio_bio_actor+0x91d/0xb50 [ 598.793821][T17752] iomap_dio_actor+0x26e/0x3b0 [ 598.798649][T17752] iomap_apply+0x1e2/0x400 [ 598.803073][T17752] __iomap_dio_rw+0x5af/0xad0 [ 598.807738][T17752] ? __iomap_dio_rw+0xad0/0xad0 [ 598.812644][T17752] iomap_dio_rw+0x30/0x70 [ 598.816977][T17752] ? ext4_file_write_iter+0x4e1/0x11d0 [ 598.822462][T17752] ext4_file_write_iter+0xa4f/0x11d0 [ 598.827751][T17752] ? ext4_file_write_iter+0x4e1/0x11d0 [ 598.833257][T17752] do_iter_readv_writev+0x2cb/0x360 [ 598.838459][T17752] do_iter_write+0x112/0x4c0 [ 598.843036][T17752] ? kcsan_setup_watchpoint+0x26e/0x470 [ 598.844485][T17750] loop5: detected capacity change from 0 to 264192 [ 598.848586][T17752] vfs_iter_write+0x4c/0x70 [ 598.848613][T17752] iter_file_splice_write+0x40a/0x750 [ 598.865097][T17752] ? rw_verify_area+0xf0/0x250 [ 598.869929][T17752] ? splice_from_pipe+0xc0/0xc0 [ 598.874769][T17752] do_splice+0x9aa/0xd30 [ 598.878992][T17752] ? vfs_write+0x50c/0x770 [ 598.883386][T17752] ? __fget_light+0x21b/0x260 [ 598.888040][T17752] __se_sys_splice+0x2a6/0x390 [ 598.892839][T17752] __x64_sys_splice+0x74/0x80 [ 598.897501][T17752] do_syscall_64+0x4a/0x90 [ 598.901937][T17752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 598.907870][T17752] RIP: 0033:0x4665d9 [ 598.911753][T17752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 598.931339][T17752] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 598.939771][T17752] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 598.947721][T17752] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 598.955670][T17752] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 598.963616][T17752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 598.971568][T17752] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 598.987539][T17750] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 599.101835][T17750] loop5: detected capacity change from 0 to 264192 11:40:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x6c) 11:40:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:29 executing program 0 (fault-call:4 fault-nth:20): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:29 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x8, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:29 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7ea74fce, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 599.271772][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 599.271782][ T25] audit: type=1326 audit(1621683629.767:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17747 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 599.366677][ T25] audit: type=1326 audit(1621683629.857:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17799 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 599.499045][T17804] FAULT_INJECTION: forcing a failure. [ 599.499045][T17804] name failslab, interval 1, probability 0, space 0, times 0 [ 599.512033][T17804] CPU: 1 PID: 17804 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 599.520801][T17804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.530857][T17804] Call Trace: [ 599.534258][T17804] dump_stack+0x137/0x19d [ 599.538615][T17804] should_fail+0x23c/0x250 [ 599.543030][T17804] ? mempool_alloc_slab+0x16/0x20 [ 599.548086][T17804] __should_failslab+0x81/0x90 [ 599.552896][T17804] should_failslab+0x5/0x20 [ 599.557590][T17804] kmem_cache_alloc+0x46/0x2f0 [ 599.562359][T17804] mempool_alloc_slab+0x16/0x20 [ 599.567204][T17804] ? mempool_free+0x130/0x130 [ 599.571980][T17804] mempool_alloc+0x8c/0x300 [ 599.576597][T17804] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 599.582758][T17804] ? __blk_mq_run_hw_queue+0xea/0x140 [ 599.588188][T17804] bio_clone_fast+0xa1/0x2b0 [ 599.592779][T17804] bio_split+0x9b/0x320 [ 599.596940][T17804] __blk_queue_split+0xab2/0xc50 [ 599.602002][T17804] blk_mq_submit_bio+0xd3/0xe90 [ 599.606875][T17804] submit_bio_noacct+0x6f2/0x7e0 [ 599.611857][T17804] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 599.617397][T17804] ? mempool_alloc+0x99/0x300 [ 599.622115][T17804] submit_bio+0x16d/0x2b0 [ 599.626512][T17804] ? bio_alloc_bioset+0x402/0x480 [ 599.631526][T17804] iomap_dio_bio_actor+0x91d/0xb50 [ 599.636634][T17804] iomap_dio_actor+0x26e/0x3b0 [ 599.641390][T17804] iomap_apply+0x1e2/0x400 [ 599.645804][T17804] __iomap_dio_rw+0x5af/0xad0 [ 599.650491][T17804] ? __iomap_dio_rw+0xad0/0xad0 [ 599.655377][T17804] iomap_dio_rw+0x30/0x70 [ 599.659703][T17804] ? ext4_file_write_iter+0x4e1/0x11d0 [ 599.665161][T17804] ext4_file_write_iter+0xa4f/0x11d0 [ 599.670601][T17804] ? ext4_file_write_iter+0x4e1/0x11d0 [ 599.676053][T17804] do_iter_readv_writev+0x2cb/0x360 [ 599.681394][T17804] do_iter_write+0x112/0x4c0 [ 599.685997][T17804] ? kcsan_setup_watchpoint+0x26e/0x470 [ 599.691593][T17804] vfs_iter_write+0x4c/0x70 11:40:30 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xa, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 599.696100][T17804] iter_file_splice_write+0x40a/0x750 [ 599.701511][T17804] ? rw_verify_area+0xf0/0x250 [ 599.706271][T17804] ? splice_from_pipe+0xc0/0xc0 [ 599.711117][T17804] do_splice+0x9aa/0xd30 [ 599.715352][T17804] ? vfs_write+0x50c/0x770 [ 599.719761][T17804] ? __fget_light+0x21b/0x260 [ 599.724470][T17804] __se_sys_splice+0x2a6/0x390 [ 599.729295][T17804] __x64_sys_splice+0x74/0x80 [ 599.733967][T17804] do_syscall_64+0x4a/0x90 [ 599.738378][T17804] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 599.744264][T17804] RIP: 0033:0x4665d9 [ 599.748146][T17804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 599.767743][T17804] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 599.776165][T17804] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 599.784223][T17804] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 599.792244][T17804] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 599.800211][T17804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 599.808178][T17804] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 599.823143][T17801] loop5: detected capacity change from 0 to 264192 [ 599.831259][T17801] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 599.983845][ C1] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.994946][T17801] FAT-fs (loop5): unable to read boot sector [ 600.193281][ T25] audit: type=1326 audit(1621683630.687:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17799 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x74) 11:40:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:30 executing program 0 (fault-call:4 fault-nth:21): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:30 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xe, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 600.289276][ T25] audit: type=1326 audit(1621683630.787:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17847 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 600.428826][T17854] FAULT_INJECTION: forcing a failure. [ 600.428826][T17854] name failslab, interval 1, probability 0, space 0, times 0 [ 600.441595][T17854] CPU: 1 PID: 17854 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 600.450347][T17854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.460462][T17854] Call Trace: [ 600.463795][T17854] dump_stack+0x137/0x19d [ 600.468283][T17854] should_fail+0x23c/0x250 [ 600.472702][T17854] ? mempool_alloc_slab+0x16/0x20 [ 600.477727][T17854] __should_failslab+0x81/0x90 [ 600.482540][T17854] should_failslab+0x5/0x20 [ 600.487046][T17854] kmem_cache_alloc+0x46/0x2f0 [ 600.491804][T17854] mempool_alloc_slab+0x16/0x20 [ 600.496728][T17854] ? mempool_free+0x130/0x130 [ 600.501487][T17854] mempool_alloc+0x8c/0x300 [ 600.506059][T17854] sg_pool_alloc+0x74/0x90 [ 600.510468][T17854] __sg_alloc_table+0xce/0x290 [ 600.515255][T17854] sg_alloc_table_chained+0xaf/0x140 [ 600.520535][T17854] ? sg_alloc_table_chained+0x140/0x140 [ 600.526270][T17854] scsi_alloc_sgtables+0x180/0x500 [ 600.531373][T17854] sd_init_command+0x935/0x15f0 [ 600.536240][T17854] scsi_queue_rq+0x10e0/0x15a0 [ 600.541091][T17854] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 600.546632][T17854] ? deadline_remove_request+0x158/0x180 [ 600.552288][T17854] ? dd_dispatch_request+0x2e1/0x3d0 [ 600.557568][T17854] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 600.563190][T17854] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 600.569431][T17854] blk_mq_sched_dispatch_requests+0x9f/0x110 11:40:31 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xf, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 600.570272][T17850] loop5: detected capacity change from 0 to 264192 [ 600.575406][T17854] __blk_mq_run_hw_queue+0xbc/0x140 [ 600.575424][T17854] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 600.592937][T17854] ? dd_insert_request+0x255/0x330 [ 600.598215][T17854] blk_mq_run_hw_queue+0x22c/0x250 [ 600.603394][T17854] ? dd_finish_request+0x10/0x10 [ 600.608329][T17854] blk_mq_sched_insert_requests+0x13f/0x200 [ 600.614210][T17854] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 600.619583][T17854] blk_flush_plug_list+0x235/0x260 [ 600.624737][T17854] ? __blk_mq_alloc_request+0x270/0x290 [ 600.630276][T17854] blk_mq_submit_bio+0x68a/0xe90 [ 600.635282][T17854] submit_bio_noacct+0x6f2/0x7e0 [ 600.640219][T17854] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 600.645754][T17854] ? mempool_alloc+0x99/0x300 [ 600.650419][T17854] submit_bio+0x16d/0x2b0 [ 600.654729][T17854] ? bio_alloc_bioset+0x402/0x480 [ 600.659846][T17854] iomap_dio_bio_actor+0x91d/0xb50 [ 600.664963][T17854] iomap_dio_actor+0x26e/0x3b0 [ 600.669791][T17854] iomap_apply+0x1e2/0x400 [ 600.674227][T17854] __iomap_dio_rw+0x5af/0xad0 [ 600.678924][T17854] ? __iomap_dio_rw+0xad0/0xad0 [ 600.683755][T17854] iomap_dio_rw+0x30/0x70 [ 600.688150][T17854] ? ext4_file_write_iter+0x4e1/0x11d0 [ 600.693593][T17854] ext4_file_write_iter+0xa4f/0x11d0 [ 600.698862][T17854] ? ext4_file_write_iter+0x4e1/0x11d0 [ 600.704303][T17854] do_iter_readv_writev+0x2cb/0x360 [ 600.709558][T17854] do_iter_write+0x112/0x4c0 [ 600.714170][T17854] ? kcsan_setup_watchpoint+0x26e/0x470 [ 600.719989][T17854] vfs_iter_write+0x4c/0x70 [ 600.724477][T17854] iter_file_splice_write+0x40a/0x750 [ 600.729869][T17854] ? rw_verify_area+0xf0/0x250 [ 600.734621][T17854] ? splice_from_pipe+0xc0/0xc0 [ 600.739446][T17854] do_splice+0x9aa/0xd30 [ 600.743748][T17854] ? vfs_write+0x50c/0x770 [ 600.748167][T17854] ? __fget_light+0x21b/0x260 [ 600.752831][T17854] __se_sys_splice+0x2a6/0x390 [ 600.757650][T17854] __x64_sys_splice+0x74/0x80 [ 600.762328][T17854] do_syscall_64+0x4a/0x90 [ 600.766750][T17854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 600.772655][T17854] RIP: 0033:0x4665d9 [ 600.776536][T17854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 600.796117][T17854] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 600.804522][T17854] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 600.812471][T17854] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 600.820421][T17854] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 600.828632][T17854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 600.836580][T17854] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 600.874152][T17850] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 601.047537][T17850] loop5: detected capacity change from 0 to 264192 [ 601.056101][T17850] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 601.119678][ T25] audit: type=1326 audit(1621683631.617:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17847 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x7a) 11:40:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:31 executing program 0 (fault-call:4 fault-nth:22): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:31 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x97ffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:31 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x10, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 601.200986][ T25] audit: type=1326 audit(1621683631.697:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17897 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 601.379836][T17907] FAULT_INJECTION: forcing a failure. [ 601.379836][T17907] name failslab, interval 1, probability 0, space 0, times 0 [ 601.392571][T17907] CPU: 0 PID: 17907 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 601.401478][T17907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.411577][T17907] Call Trace: [ 601.415035][T17907] dump_stack+0x137/0x19d [ 601.419404][T17907] should_fail+0x23c/0x250 [ 601.421055][T17906] loop5: detected capacity change from 0 to 264192 [ 601.423814][T17907] ? mempool_alloc_slab+0x16/0x20 [ 601.423838][T17907] __should_failslab+0x81/0x90 [ 601.440071][T17907] should_failslab+0x5/0x20 [ 601.444743][T17907] kmem_cache_alloc+0x46/0x2f0 [ 601.449530][T17907] mempool_alloc_slab+0x16/0x20 [ 601.454367][T17907] ? mempool_free+0x130/0x130 [ 601.459069][T17907] mempool_alloc+0x8c/0x300 [ 601.463551][T17907] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 601.469780][T17907] ? __blk_mq_run_hw_queue+0xea/0x140 [ 601.475129][T17907] bio_clone_fast+0xa1/0x2b0 [ 601.479877][T17907] bio_split+0x9b/0x320 [ 601.484082][T17907] __blk_queue_split+0xab2/0xc50 [ 601.489050][T17907] blk_mq_submit_bio+0xd3/0xe90 [ 601.493893][T17907] submit_bio_noacct+0x6f2/0x7e0 [ 601.498873][T17907] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 601.504487][T17907] ? mempool_alloc+0x99/0x300 [ 601.509148][T17907] submit_bio+0x16d/0x2b0 [ 601.513467][T17907] ? bio_alloc_bioset+0x402/0x480 [ 601.518477][T17907] iomap_dio_bio_actor+0x91d/0xb50 [ 601.523582][T17907] iomap_dio_actor+0x26e/0x3b0 [ 601.528345][T17907] iomap_apply+0x1e2/0x400 [ 601.532744][T17907] __iomap_dio_rw+0x5af/0xad0 [ 601.537400][T17907] ? __iomap_dio_rw+0xad0/0xad0 [ 601.542257][T17907] iomap_dio_rw+0x30/0x70 [ 601.546570][T17907] ? ext4_file_write_iter+0x4e1/0x11d0 [ 601.552012][T17907] ext4_file_write_iter+0xa4f/0x11d0 [ 601.557363][T17907] ? ext4_file_write_iter+0x4e1/0x11d0 [ 601.562890][T17907] do_iter_readv_writev+0x2cb/0x360 [ 601.568095][T17907] do_iter_write+0x112/0x4c0 [ 601.572698][T17907] ? kcsan_setup_watchpoint+0x26e/0x470 [ 601.578303][T17907] vfs_iter_write+0x4c/0x70 [ 601.582785][T17907] iter_file_splice_write+0x40a/0x750 [ 601.588177][T17907] ? rw_verify_area+0xf0/0x250 [ 601.592928][T17907] ? splice_from_pipe+0xc0/0xc0 [ 601.597767][T17907] do_splice+0x9aa/0xd30 [ 601.602057][T17907] ? vfs_write+0x50c/0x770 [ 601.606467][T17907] ? __fget_light+0x21b/0x260 [ 601.611136][T17907] __se_sys_splice+0x2a6/0x390 [ 601.615885][T17907] __x64_sys_splice+0x74/0x80 [ 601.620543][T17907] do_syscall_64+0x4a/0x90 [ 601.625081][T17907] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 601.630960][T17907] RIP: 0033:0x4665d9 [ 601.634885][T17907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.654467][T17907] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 601.662870][T17907] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 601.670829][T17907] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:32 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x64, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 601.678781][T17907] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 601.686729][T17907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 601.694709][T17907] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 601.730920][T17906] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 601.831462][T17906] loop5: detected capacity change from 0 to 264192 [ 601.840156][T17906] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x8e) 11:40:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:32 executing program 0 (fault-call:4 fault-nth:23): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:32 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:32 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xfe, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 602.033575][ T25] audit: type=1326 audit(1621683632.527:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17897 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 602.127975][ T25] audit: type=1326 audit(1621683632.627:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17955 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 602.262351][T17951] FAULT_INJECTION: forcing a failure. [ 602.262351][T17951] name failslab, interval 1, probability 0, space 0, times 0 [ 602.275245][T17951] CPU: 1 PID: 17951 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 602.284011][T17951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.294062][T17951] Call Trace: [ 602.297344][T17951] dump_stack+0x137/0x19d [ 602.301684][T17951] should_fail+0x23c/0x250 [ 602.306197][T17951] ? mempool_alloc_slab+0x16/0x20 [ 602.311221][T17951] __should_failslab+0x81/0x90 [ 602.316008][T17951] should_failslab+0x5/0x20 [ 602.320509][T17951] kmem_cache_alloc+0x46/0x2f0 [ 602.325290][T17951] mempool_alloc_slab+0x16/0x20 [ 602.330203][T17951] ? mempool_free+0x130/0x130 [ 602.334887][T17951] mempool_alloc+0x8c/0x300 [ 602.339386][T17951] sg_pool_alloc+0x74/0x90 [ 602.343819][T17951] __sg_alloc_table+0xce/0x290 [ 602.348715][T17951] sg_alloc_table_chained+0xaf/0x140 [ 602.354006][T17951] ? sg_alloc_table_chained+0x140/0x140 [ 602.359538][T17951] scsi_alloc_sgtables+0x180/0x500 [ 602.364643][T17951] sd_init_command+0x935/0x15f0 [ 602.369509][T17951] scsi_queue_rq+0x10e0/0x15a0 [ 602.374280][T17951] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 602.379877][T17951] ? deadline_remove_request+0x158/0x180 [ 602.385580][T17951] ? dd_dispatch_request+0x2e1/0x3d0 [ 602.390945][T17951] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 602.396485][T17951] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 602.402722][T17951] blk_mq_sched_dispatch_requests+0x9f/0x110 11:40:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:32 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x10e, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 602.408701][T17951] __blk_mq_run_hw_queue+0xbc/0x140 [ 602.413933][T17951] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 602.419728][T17951] ? dd_insert_request+0x255/0x330 [ 602.424826][T17951] blk_mq_run_hw_queue+0x22c/0x250 [ 602.429948][T17951] ? dd_finish_request+0x10/0x10 [ 602.434869][T17951] blk_mq_sched_insert_requests+0x13f/0x200 [ 602.440757][T17951] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 602.446226][T17951] blk_flush_plug_list+0x235/0x260 [ 602.451413][T17951] ? __blk_mq_alloc_request+0x270/0x290 [ 602.456690][T17954] loop5: detected capacity change from 0 to 264192 [ 602.456975][T17951] blk_mq_submit_bio+0x68a/0xe90 [ 602.468474][T17951] submit_bio_noacct+0x6f2/0x7e0 [ 602.473404][T17951] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 602.479034][T17951] ? mempool_alloc+0x99/0x300 [ 602.483699][T17951] submit_bio+0x16d/0x2b0 [ 602.488112][T17951] ? bio_alloc_bioset+0x402/0x480 [ 602.493207][T17951] iomap_dio_bio_actor+0x91d/0xb50 [ 602.498315][T17951] iomap_dio_actor+0x26e/0x3b0 [ 602.503324][T17951] iomap_apply+0x1e2/0x400 [ 602.507739][T17951] __iomap_dio_rw+0x5af/0xad0 [ 602.512463][T17951] ? __iomap_dio_rw+0xad0/0xad0 [ 602.517363][T17951] iomap_dio_rw+0x30/0x70 [ 602.521676][T17951] ? ext4_file_write_iter+0x4e1/0x11d0 [ 602.527229][T17951] ext4_file_write_iter+0xa4f/0x11d0 [ 602.532533][T17951] ? ext4_file_write_iter+0x4e1/0x11d0 [ 602.537976][T17951] do_iter_readv_writev+0x2cb/0x360 [ 602.543156][T17951] do_iter_write+0x112/0x4c0 [ 602.547724][T17951] ? kcsan_setup_watchpoint+0x26e/0x470 [ 602.553414][T17951] vfs_iter_write+0x4c/0x70 [ 602.557896][T17951] iter_file_splice_write+0x40a/0x750 [ 602.563251][T17951] ? rw_verify_area+0xf0/0x250 [ 602.568022][T17951] ? splice_from_pipe+0xc0/0xc0 [ 602.572853][T17951] do_splice+0x9aa/0xd30 [ 602.577223][T17951] ? vfs_write+0x50c/0x770 [ 602.581799][T17951] ? __fget_light+0x21b/0x260 [ 602.586516][T17951] __se_sys_splice+0x2a6/0x390 [ 602.591322][T17951] __x64_sys_splice+0x74/0x80 [ 602.595998][T17951] do_syscall_64+0x4a/0x90 [ 602.600489][T17951] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 602.606364][T17951] RIP: 0033:0x4665d9 [ 602.610238][T17951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.629917][T17951] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 602.638328][T17951] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 602.646375][T17951] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 602.654360][T17951] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 602.662313][T17951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.670263][T17951] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 602.699988][T17954] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 602.853698][T17954] loop5: detected capacity change from 0 to 264192 [ 602.862142][T17954] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x2c6) 11:40:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:33 executing program 0 (fault-call:4 fault-nth:24): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xce4fa77e, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:33 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x110, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 602.958315][ T25] audit: type=1326 audit(1621683633.457:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17955 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 603.053661][ T25] audit: type=1326 audit(1621683633.547:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18003 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 603.153402][T18008] loop5: detected capacity change from 0 to 264192 [ 603.188832][T18008] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 603.214378][T18006] FAULT_INJECTION: forcing a failure. [ 603.214378][T18006] name failslab, interval 1, probability 0, space 0, times 0 [ 603.227049][T18006] CPU: 0 PID: 18006 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 603.235898][T18006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.246651][T18006] Call Trace: [ 603.249922][T18006] dump_stack+0x137/0x19d [ 603.254247][T18006] should_fail+0x23c/0x250 [ 603.258677][T18006] ? mempool_alloc_slab+0x16/0x20 [ 603.263777][T18006] __should_failslab+0x81/0x90 [ 603.268617][T18006] should_failslab+0x5/0x20 [ 603.273130][T18006] kmem_cache_alloc+0x46/0x2f0 [ 603.277891][T18006] mempool_alloc_slab+0x16/0x20 [ 603.282728][T18006] ? mempool_free+0x130/0x130 [ 603.287400][T18006] mempool_alloc+0x8c/0x300 [ 603.291927][T18006] sg_pool_alloc+0x74/0x90 [ 603.296329][T18006] __sg_alloc_table+0xce/0x290 [ 603.301139][T18006] sg_alloc_table_chained+0xaf/0x140 [ 603.306416][T18006] ? sg_alloc_table_chained+0x140/0x140 11:40:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x27000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 603.312038][T18006] scsi_alloc_sgtables+0x180/0x500 [ 603.317141][T18006] sd_init_command+0x935/0x15f0 [ 603.322008][T18006] scsi_queue_rq+0x10e0/0x15a0 [ 603.326761][T18006] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 603.332326][T18006] ? deadline_remove_request+0x158/0x180 [ 603.337960][T18006] ? dd_dispatch_request+0x2e1/0x3d0 [ 603.343250][T18006] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 603.348828][T18006] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 603.355061][T18006] blk_mq_sched_dispatch_requests+0x9f/0x110 11:40:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xdaffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 603.361053][T18006] __blk_mq_run_hw_queue+0xbc/0x140 [ 603.366246][T18006] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 603.372134][T18006] ? dd_insert_request+0x255/0x330 [ 603.377277][T18006] blk_mq_run_hw_queue+0x22c/0x250 [ 603.382385][T18006] ? dd_finish_request+0x10/0x10 [ 603.387417][T18006] blk_mq_sched_insert_requests+0x13f/0x200 [ 603.393313][T18006] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 603.398674][T18006] blk_flush_plug_list+0x235/0x260 [ 603.403790][T18006] ? __blk_mq_alloc_request+0x270/0x290 [ 603.409364][T18006] blk_mq_submit_bio+0x68a/0xe90 [ 603.414303][T18006] submit_bio_noacct+0x6f2/0x7e0 [ 603.419325][T18006] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 603.424873][T18006] ? mempool_alloc+0x99/0x300 [ 603.429534][T18006] submit_bio+0x16d/0x2b0 [ 603.433943][T18006] ? bio_alloc_bioset+0x402/0x480 [ 603.439021][T18006] iomap_dio_bio_actor+0x91d/0xb50 [ 603.444202][T18006] iomap_dio_actor+0x26e/0x3b0 [ 603.449068][T18006] iomap_apply+0x1e2/0x400 [ 603.453586][T18006] __iomap_dio_rw+0x5af/0xad0 [ 603.458245][T18006] ? __iomap_dio_rw+0xad0/0xad0 [ 603.463170][T18006] iomap_dio_rw+0x30/0x70 [ 603.467555][T18006] ? ext4_file_write_iter+0x4e1/0x11d0 [ 603.473008][T18006] ext4_file_write_iter+0xa4f/0x11d0 [ 603.478417][T18006] ? ext4_file_write_iter+0x4e1/0x11d0 [ 603.483983][T18006] do_iter_readv_writev+0x2cb/0x360 [ 603.489253][T18006] do_iter_write+0x112/0x4c0 [ 603.493838][T18006] ? kcsan_setup_watchpoint+0x26e/0x470 [ 603.499372][T18006] vfs_iter_write+0x4c/0x70 [ 603.503897][T18006] iter_file_splice_write+0x40a/0x750 [ 603.509293][T18006] ? rw_verify_area+0xf0/0x250 [ 603.514136][T18006] ? splice_from_pipe+0xc0/0xc0 [ 603.519069][T18006] do_splice+0x9aa/0xd30 [ 603.523320][T18006] ? vfs_write+0x50c/0x770 [ 603.527725][T18006] ? __fget_light+0x21b/0x260 [ 603.532425][T18006] __se_sys_splice+0x2a6/0x390 [ 603.537177][T18006] __x64_sys_splice+0x74/0x80 [ 603.541953][T18006] do_syscall_64+0x4a/0x90 [ 603.546403][T18006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 603.552348][T18006] RIP: 0033:0x4665d9 [ 603.556232][T18006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 603.575831][T18006] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 603.584244][T18006] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 603.592216][T18006] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 603.600182][T18006] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 603.608139][T18006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 603.616111][T18006] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 603.679386][T18033] loop5: detected capacity change from 0 to 264192 11:40:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x300) 11:40:34 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x3c00, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:34 executing program 0 (fault-call:4 fault-nth:25): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:34 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf0ffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x48000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5a020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 604.087028][T18060] loop5: detected capacity change from 0 to 264192 [ 604.100425][T18054] FAULT_INJECTION: forcing a failure. [ 604.100425][T18054] name failslab, interval 1, probability 0, space 0, times 0 [ 604.113039][T18054] CPU: 0 PID: 18054 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 604.121795][T18054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.131836][T18054] Call Trace: [ 604.135107][T18054] dump_stack+0x137/0x19d [ 604.139423][T18054] should_fail+0x23c/0x250 [ 604.143826][T18054] ? mempool_alloc_slab+0x16/0x20 [ 604.148874][T18054] __should_failslab+0x81/0x90 [ 604.153621][T18054] should_failslab+0x5/0x20 [ 604.158148][T18054] kmem_cache_alloc+0x46/0x2f0 [ 604.162903][T18054] mempool_alloc_slab+0x16/0x20 [ 604.167782][T18054] ? mempool_free+0x130/0x130 [ 604.172445][T18054] mempool_alloc+0x8c/0x300 [ 604.176929][T18054] sg_pool_alloc+0x74/0x90 [ 604.181327][T18054] __sg_alloc_table+0xce/0x290 [ 604.186071][T18054] sg_alloc_table_chained+0xaf/0x140 [ 604.191345][T18054] ? sg_alloc_table_chained+0x140/0x140 [ 604.196865][T18054] scsi_alloc_sgtables+0x180/0x500 [ 604.201968][T18054] sd_init_command+0x935/0x15f0 [ 604.206865][T18054] scsi_queue_rq+0x10e0/0x15a0 [ 604.211611][T18054] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 604.217151][T18054] ? deadline_remove_request+0x158/0x180 [ 604.222758][T18054] ? dd_dispatch_request+0x2e1/0x3d0 [ 604.228024][T18054] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 604.233618][T18054] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 604.239848][T18054] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 604.245900][T18054] __blk_mq_run_hw_queue+0xbc/0x140 [ 604.251103][T18054] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 604.256889][T18054] ? dd_insert_request+0x255/0x330 [ 604.261980][T18054] blk_mq_run_hw_queue+0x22c/0x250 [ 604.267085][T18054] ? dd_finish_request+0x10/0x10 [ 604.272054][T18054] blk_mq_sched_insert_requests+0x13f/0x200 [ 604.277933][T18054] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 604.283291][T18054] blk_flush_plug_list+0x235/0x260 [ 604.288378][T18054] ? __blk_mq_alloc_request+0x270/0x290 [ 604.293911][T18054] blk_mq_submit_bio+0x68a/0xe90 [ 604.298826][T18054] submit_bio_noacct+0x6f2/0x7e0 [ 604.303887][T18054] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 604.309490][T18054] ? mempool_alloc+0x99/0x300 [ 604.314152][T18054] submit_bio+0x16d/0x2b0 [ 604.318530][T18054] ? bio_alloc_bioset+0x402/0x480 [ 604.323550][T18054] iomap_dio_bio_actor+0x91d/0xb50 [ 604.328648][T18054] iomap_dio_actor+0x26e/0x3b0 [ 604.333390][T18054] iomap_apply+0x1e2/0x400 [ 604.337787][T18054] __iomap_dio_rw+0x5af/0xad0 [ 604.342446][T18054] ? __iomap_dio_rw+0xad0/0xad0 [ 604.347314][T18054] iomap_dio_rw+0x30/0x70 [ 604.351763][T18054] ? ext4_file_write_iter+0x4e1/0x11d0 [ 604.357206][T18054] ext4_file_write_iter+0xa4f/0x11d0 [ 604.362472][T18054] ? ext4_file_write_iter+0x4e1/0x11d0 [ 604.367976][T18054] do_iter_readv_writev+0x2cb/0x360 [ 604.373160][T18054] do_iter_write+0x112/0x4c0 [ 604.377826][T18054] ? kcsan_setup_watchpoint+0x26e/0x470 [ 604.383414][T18054] vfs_iter_write+0x4c/0x70 [ 604.387909][T18054] iter_file_splice_write+0x40a/0x750 [ 604.393301][T18054] ? rw_verify_area+0xf0/0x250 [ 604.398104][T18054] ? splice_from_pipe+0xc0/0xc0 [ 604.402994][T18054] do_splice+0x9aa/0xd30 [ 604.407214][T18054] ? vfs_write+0x50c/0x770 [ 604.411604][T18054] ? __fget_light+0x21b/0x260 [ 604.416329][T18054] __se_sys_splice+0x2a6/0x390 [ 604.421067][T18054] __x64_sys_splice+0x74/0x80 [ 604.425728][T18054] do_syscall_64+0x4a/0x90 [ 604.430121][T18054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.435995][T18054] RIP: 0033:0x4665d9 [ 604.439866][T18054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 604.459453][T18054] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 604.467992][T18054] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 604.476028][T18054] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 604.484087][T18054] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 604.492047][T18054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 604.500008][T18054] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 604.512709][T18060] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x68000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 604.599982][T18060] loop5: detected capacity change from 0 to 264192 [ 604.620731][T18060] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x3b0) 11:40:35 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf4ffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:35 executing program 0 (fault-call:4 fault-nth:26): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:35 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x3ffb, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 604.792138][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 604.792147][ T25] audit: type=1326 audit(1621683635.287:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18047 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x74000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 604.883124][ T25] audit: type=1326 audit(1621683635.377:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18104 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7a000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 605.026414][T18109] loop5: detected capacity change from 0 to 264192 [ 605.050429][T18113] FAULT_INJECTION: forcing a failure. [ 605.050429][T18113] name failslab, interval 1, probability 0, space 0, times 0 [ 605.063223][T18113] CPU: 0 PID: 18113 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 605.071988][T18113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.082029][T18113] Call Trace: [ 605.085310][T18113] dump_stack+0x137/0x19d [ 605.089629][T18113] should_fail+0x23c/0x250 [ 605.094041][T18113] ? mempool_alloc_slab+0x16/0x20 [ 605.099071][T18113] __should_failslab+0x81/0x90 [ 605.103849][T18113] should_failslab+0x5/0x20 [ 605.108349][T18113] kmem_cache_alloc+0x46/0x2f0 [ 605.113115][T18113] mempool_alloc_slab+0x16/0x20 [ 605.118033][T18113] ? mempool_free+0x130/0x130 [ 605.122705][T18113] mempool_alloc+0x8c/0x300 [ 605.127264][T18113] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 605.133541][T18113] ? __blk_mq_run_hw_queue+0xea/0x140 [ 605.138914][T18113] bio_clone_fast+0xa1/0x2b0 [ 605.143539][T18113] bio_split+0x9b/0x320 [ 605.147686][T18113] __blk_queue_split+0xab2/0xc50 [ 605.152618][T18113] blk_mq_submit_bio+0xd3/0xe90 [ 605.157463][T18113] submit_bio_noacct+0x6f2/0x7e0 [ 605.162393][T18113] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 605.167936][T18113] ? mempool_alloc+0x99/0x300 [ 605.172650][T18113] submit_bio+0x16d/0x2b0 [ 605.177040][T18113] ? bio_alloc_bioset+0x402/0x480 [ 605.182063][T18113] iomap_dio_bio_actor+0x91d/0xb50 [ 605.187176][T18113] iomap_dio_actor+0x26e/0x3b0 [ 605.191934][T18113] iomap_apply+0x1e2/0x400 [ 605.196351][T18113] __iomap_dio_rw+0x5af/0xad0 [ 605.201017][T18113] ? __iomap_dio_rw+0xad0/0xad0 [ 605.205875][T18113] iomap_dio_rw+0x30/0x70 [ 605.210269][T18113] ? ext4_file_write_iter+0x4e1/0x11d0 [ 605.215769][T18113] ext4_file_write_iter+0xa4f/0x11d0 [ 605.221111][T18113] ? ext4_file_write_iter+0x4e1/0x11d0 [ 605.226595][T18113] do_iter_readv_writev+0x2cb/0x360 [ 605.231795][T18113] do_iter_write+0x112/0x4c0 [ 605.236378][T18113] ? kcsan_setup_watchpoint+0x26e/0x470 [ 605.241963][T18113] vfs_iter_write+0x4c/0x70 [ 605.246456][T18113] iter_file_splice_write+0x40a/0x750 [ 605.251821][T18113] ? rw_verify_area+0xf0/0x250 [ 605.256707][T18113] ? splice_from_pipe+0xc0/0xc0 [ 605.259062][T18109] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 605.261609][T18113] do_splice+0x9aa/0xd30 [ 605.261630][T18113] ? vfs_write+0x50c/0x770 [ 605.261644][T18113] ? __fget_light+0x21b/0x260 [ 605.284223][T18113] __se_sys_splice+0x2a6/0x390 [ 605.288987][T18113] __x64_sys_splice+0x74/0x80 [ 605.293649][T18113] do_syscall_64+0x4a/0x90 [ 605.298051][T18113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 605.303928][T18113] RIP: 0033:0x4665d9 [ 605.307809][T18113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:40:35 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x3ffc, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa4010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 605.327513][T18113] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 605.335923][T18113] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 605.343885][T18113] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 605.351950][T18113] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 605.359947][T18113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 605.368000][T18113] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 605.537960][T18109] loop5: detected capacity change from 0 to 264192 [ 605.549820][T18109] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x3f8) 11:40:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb3010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:36 executing program 0 (fault-call:4 fault-nth:27): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:36 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf67f0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:36 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x7ff6, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 605.711551][ T25] audit: type=1326 audit(1621683636.207:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18104 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 605.787030][ T25] audit: type=1326 audit(1621683636.277:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18165 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 605.909624][T18176] loop5: detected capacity change from 0 to 264192 [ 605.925101][T18176] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 605.988553][T18177] FAULT_INJECTION: forcing a failure. [ 605.988553][T18177] name failslab, interval 1, probability 0, space 0, times 0 [ 606.001213][T18177] CPU: 0 PID: 18177 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 606.009974][T18177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.020017][T18177] Call Trace: [ 606.023370][T18177] dump_stack+0x137/0x19d [ 606.027696][T18177] should_fail+0x23c/0x250 [ 606.032166][T18177] ? mempool_alloc_slab+0x16/0x20 [ 606.037195][T18177] __should_failslab+0x81/0x90 [ 606.042043][T18177] should_failslab+0x5/0x20 [ 606.046553][T18177] kmem_cache_alloc+0x46/0x2f0 [ 606.051382][T18177] mempool_alloc_slab+0x16/0x20 [ 606.056302][T18177] ? mempool_free+0x130/0x130 [ 606.060975][T18177] mempool_alloc+0x8c/0x300 [ 606.065474][T18177] sg_pool_alloc+0x74/0x90 [ 606.069882][T18177] __sg_alloc_table+0xce/0x290 [ 606.074636][T18177] sg_alloc_table_chained+0xaf/0x140 [ 606.079917][T18177] ? sg_alloc_table_chained+0x140/0x140 [ 606.085547][T18177] scsi_alloc_sgtables+0x180/0x500 [ 606.090652][T18177] sd_init_command+0x935/0x15f0 [ 606.095495][T18177] scsi_queue_rq+0x10e0/0x15a0 [ 606.100385][T18177] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 606.105949][T18177] ? deadline_remove_request+0x158/0x180 [ 606.111562][T18177] ? dd_dispatch_request+0x2e1/0x3d0 [ 606.116828][T18177] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 606.122438][T18177] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 606.128672][T18177] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 606.134650][T18177] __blk_mq_run_hw_queue+0xbc/0x140 [ 606.139904][T18177] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 606.145716][T18177] ? dd_insert_request+0x255/0x330 [ 606.150803][T18177] blk_mq_run_hw_queue+0x22c/0x250 [ 606.155991][T18177] ? dd_finish_request+0x10/0x10 [ 606.160979][T18177] blk_mq_sched_insert_requests+0x13f/0x200 [ 606.166923][T18177] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 606.172274][T18177] blk_flush_plug_list+0x235/0x260 [ 606.177398][T18177] ? __blk_mq_alloc_request+0x270/0x290 [ 606.182963][T18177] blk_mq_submit_bio+0x68a/0xe90 [ 606.187885][T18177] submit_bio_noacct+0x6f2/0x7e0 [ 606.192894][T18177] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 606.198427][T18177] ? mempool_alloc+0x99/0x300 [ 606.203082][T18177] submit_bio+0x16d/0x2b0 [ 606.207474][T18177] ? bio_alloc_bioset+0x402/0x480 [ 606.212480][T18177] iomap_dio_bio_actor+0x91d/0xb50 [ 606.217658][T18177] iomap_dio_actor+0x26e/0x3b0 [ 606.222452][T18177] iomap_apply+0x1e2/0x400 [ 606.226848][T18177] __iomap_dio_rw+0x5af/0xad0 [ 606.231504][T18177] ? __iomap_dio_rw+0xad0/0xad0 [ 606.236332][T18177] iomap_dio_rw+0x30/0x70 [ 606.240651][T18177] ? ext4_file_write_iter+0x4e1/0x11d0 [ 606.246129][T18177] ext4_file_write_iter+0xa4f/0x11d0 [ 606.251405][T18177] ? ext4_file_write_iter+0x4e1/0x11d0 [ 606.256845][T18177] do_iter_readv_writev+0x2cb/0x360 [ 606.262483][T18177] do_iter_write+0x112/0x4c0 [ 606.267055][T18177] ? kcsan_setup_watchpoint+0x26e/0x470 [ 606.272588][T18177] vfs_iter_write+0x4c/0x70 [ 606.277093][T18177] iter_file_splice_write+0x40a/0x750 [ 606.282510][T18177] ? rw_verify_area+0xf0/0x250 [ 606.287298][T18177] ? splice_from_pipe+0xc0/0xc0 [ 606.292142][T18177] do_splice+0x9aa/0xd30 [ 606.296364][T18177] ? vfs_write+0x50c/0x770 [ 606.300756][T18177] ? __fget_light+0x21b/0x260 [ 606.305504][T18177] __se_sys_splice+0x2a6/0x390 [ 606.310269][T18177] __x64_sys_splice+0x74/0x80 [ 606.314971][T18177] do_syscall_64+0x4a/0x90 [ 606.319367][T18177] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 606.325239][T18177] RIP: 0033:0x4665d9 [ 606.329136][T18177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 606.348737][T18177] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 606.357131][T18177] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 606.365088][T18177] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 606.373056][T18177] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 606.381008][T18177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 606.388956][T18177] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 606.616733][ T25] audit: type=1326 audit(1621683637.107:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18165 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x500) 11:40:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:37 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:37 executing program 0 (fault-call:4 fault-nth:28): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:37 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x7ff8, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 606.719863][ T25] audit: type=1326 audit(1621683637.217:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18216 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 606.856057][T18219] FAULT_INJECTION: forcing a failure. [ 606.856057][T18219] name failslab, interval 1, probability 0, space 0, times 0 [ 606.867069][T18217] loop5: detected capacity change from 0 to 264192 [ 606.868769][T18219] CPU: 0 PID: 18219 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 606.883945][T18219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.894069][T18219] Call Trace: [ 606.897331][T18219] dump_stack+0x137/0x19d [ 606.901653][T18219] should_fail+0x23c/0x250 [ 606.906052][T18219] ? mempool_alloc_slab+0x16/0x20 [ 606.911058][T18219] __should_failslab+0x81/0x90 [ 606.915808][T18219] should_failslab+0x5/0x20 [ 606.920303][T18219] kmem_cache_alloc+0x46/0x2f0 [ 606.925486][T18219] mempool_alloc_slab+0x16/0x20 [ 606.930385][T18219] ? mempool_free+0x130/0x130 [ 606.935042][T18219] mempool_alloc+0x8c/0x300 [ 606.939587][T18219] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 606.945741][T18219] ? __blk_mq_run_hw_queue+0xea/0x140 [ 606.951092][T18219] bio_clone_fast+0xa1/0x2b0 [ 606.955664][T18219] bio_split+0x9b/0x320 [ 606.959815][T18219] __blk_queue_split+0xab2/0xc50 [ 606.964737][T18219] blk_mq_submit_bio+0xd3/0xe90 [ 606.969571][T18219] submit_bio_noacct+0x6f2/0x7e0 [ 606.974493][T18219] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 606.980026][T18219] ? mempool_alloc+0x99/0x300 [ 606.984683][T18219] submit_bio+0x16d/0x2b0 [ 606.989071][T18219] ? bio_alloc_bioset+0x402/0x480 [ 606.994075][T18219] iomap_dio_bio_actor+0x91d/0xb50 [ 606.999210][T18219] iomap_dio_actor+0x26e/0x3b0 [ 607.004036][T18219] iomap_apply+0x1e2/0x400 [ 607.008449][T18219] __iomap_dio_rw+0x5af/0xad0 [ 607.013106][T18219] ? __iomap_dio_rw+0xad0/0xad0 [ 607.017940][T18219] iomap_dio_rw+0x30/0x70 [ 607.022335][T18219] ? ext4_file_write_iter+0x4e1/0x11d0 [ 607.027809][T18219] ext4_file_write_iter+0xa4f/0x11d0 [ 607.033083][T18219] ? ext4_file_write_iter+0x4e1/0x11d0 [ 607.038555][T18219] do_iter_readv_writev+0x2cb/0x360 [ 607.043732][T18219] do_iter_write+0x112/0x4c0 [ 607.048309][T18219] ? kcsan_setup_watchpoint+0x26e/0x470 [ 607.053871][T18219] vfs_iter_write+0x4c/0x70 [ 607.058361][T18219] iter_file_splice_write+0x40a/0x750 [ 607.063805][T18219] ? rw_verify_area+0xf0/0x250 [ 607.068554][T18219] ? splice_from_pipe+0xc0/0xc0 [ 607.073463][T18219] do_splice+0x9aa/0xd30 [ 607.077695][T18219] ? vfs_write+0x50c/0x770 [ 607.082094][T18219] ? __fget_light+0x21b/0x260 [ 607.086755][T18219] __se_sys_splice+0x2a6/0x390 [ 607.091515][T18219] __x64_sys_splice+0x74/0x80 [ 607.096197][T18219] do_syscall_64+0x4a/0x90 [ 607.100593][T18219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 607.106476][T18219] RIP: 0033:0x4665d9 [ 607.110350][T18219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 607.129994][T18219] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 607.138386][T18219] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 607.146338][T18219] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 607.154288][T18219] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 607.162315][T18219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 607.170267][T18219] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 607.252468][T18217] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 607.381753][T18217] loop5: detected capacity change from 0 to 264192 [ 607.389984][T18217] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x600) 11:40:38 executing program 0 (fault-call:4 fault-nth:29): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:38 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf77f0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:38 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xff01, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 607.549104][ T25] audit: type=1326 audit(1621683638.047:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18216 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 607.631775][ T25] audit: type=1326 audit(1621683638.127:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18265 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 607.783782][T18271] loop5: detected capacity change from 0 to 264192 [ 607.800428][T18274] FAULT_INJECTION: forcing a failure. [ 607.800428][T18274] name failslab, interval 1, probability 0, space 0, times 0 [ 607.813273][T18274] CPU: 1 PID: 18274 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 607.822060][T18274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.832117][T18274] Call Trace: [ 607.835390][T18274] dump_stack+0x137/0x19d [ 607.839784][T18274] should_fail+0x23c/0x250 [ 607.844196][T18274] ? mempool_alloc_slab+0x16/0x20 [ 607.849219][T18274] __should_failslab+0x81/0x90 [ 607.854088][T18274] should_failslab+0x5/0x20 [ 607.858633][T18274] kmem_cache_alloc+0x46/0x2f0 [ 607.863400][T18274] mempool_alloc_slab+0x16/0x20 [ 607.868238][T18274] ? mempool_free+0x130/0x130 [ 607.872903][T18274] mempool_alloc+0x8c/0x300 [ 607.877399][T18274] sg_pool_alloc+0x74/0x90 [ 607.881803][T18274] __sg_alloc_table+0xce/0x290 [ 607.886559][T18274] sg_alloc_table_chained+0xaf/0x140 [ 607.891828][T18274] ? sg_alloc_table_chained+0x140/0x140 [ 607.897359][T18274] scsi_alloc_sgtables+0x180/0x500 [ 607.902454][T18274] sd_init_command+0x935/0x15f0 [ 607.907377][T18274] scsi_queue_rq+0x10e0/0x15a0 [ 607.912171][T18274] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 607.917732][T18274] ? deadline_remove_request+0x158/0x180 [ 607.923369][T18274] ? dd_dispatch_request+0x2e1/0x3d0 [ 607.928652][T18274] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 607.934201][T18274] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 607.940450][T18274] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 607.946467][T18274] __blk_mq_run_hw_queue+0xbc/0x140 [ 607.951659][T18274] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 607.957466][T18274] ? dd_insert_request+0x255/0x330 [ 607.962563][T18274] blk_mq_run_hw_queue+0x22c/0x250 [ 607.967738][T18274] ? dd_finish_request+0x10/0x10 [ 607.972660][T18274] blk_mq_sched_insert_requests+0x13f/0x200 [ 607.978547][T18274] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 607.983921][T18274] blk_flush_plug_list+0x235/0x260 [ 607.989035][T18274] ? __blk_mq_alloc_request+0x270/0x290 [ 607.994577][T18274] blk_mq_submit_bio+0x68a/0xe90 [ 607.999502][T18274] submit_bio_noacct+0x6f2/0x7e0 [ 608.004484][T18274] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 608.010029][T18274] ? mempool_alloc+0x99/0x300 [ 608.014815][T18274] submit_bio+0x16d/0x2b0 [ 608.019161][T18274] ? bio_alloc_bioset+0x402/0x480 [ 608.024176][T18274] iomap_dio_bio_actor+0x91d/0xb50 [ 608.029390][T18274] iomap_dio_actor+0x26e/0x3b0 [ 608.034254][T18274] iomap_apply+0x1e2/0x400 [ 608.038691][T18274] __iomap_dio_rw+0x5af/0xad0 [ 608.043362][T18274] ? __iomap_dio_rw+0xad0/0xad0 [ 608.048228][T18274] iomap_dio_rw+0x30/0x70 [ 608.052577][T18274] ? ext4_file_write_iter+0x4e1/0x11d0 [ 608.058082][T18274] ext4_file_write_iter+0xa4f/0x11d0 [ 608.063420][T18274] ? ext4_file_write_iter+0x4e1/0x11d0 [ 608.068928][T18274] do_iter_readv_writev+0x2cb/0x360 [ 608.074139][T18274] do_iter_write+0x112/0x4c0 [ 608.078890][T18274] ? kcsan_setup_watchpoint+0x26e/0x470 [ 608.084473][T18274] vfs_iter_write+0x4c/0x70 [ 608.088974][T18274] iter_file_splice_write+0x40a/0x750 [ 608.094343][T18274] ? rw_verify_area+0xf0/0x250 [ 608.099096][T18274] ? splice_from_pipe+0xc0/0xc0 [ 608.103931][T18274] do_splice+0x9aa/0xd30 [ 608.108255][T18274] ? vfs_write+0x50c/0x770 [ 608.112660][T18274] ? __fget_light+0x21b/0x260 [ 608.117329][T18274] __se_sys_splice+0x2a6/0x390 [ 608.122174][T18274] __x64_sys_splice+0x74/0x80 [ 608.126885][T18274] do_syscall_64+0x4a/0x90 [ 608.131287][T18274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 608.137188][T18274] RIP: 0033:0x4665d9 [ 608.141119][T18274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 608.160786][T18274] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 608.169206][T18274] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 608.177175][T18274] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 608.185126][T18274] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 608.193077][T18274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 608.201028][T18274] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 608.256025][T18271] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 608.398633][T18271] loop5: detected capacity change from 0 to 264192 [ 608.406996][T18271] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x700) 11:40:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:39 executing program 0 (fault-call:4 fault-nth:30): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:39 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:39 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf87f0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 608.458858][ T25] audit: type=1326 audit(1621683638.957:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18265 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 608.556642][ T25] audit: type=1326 audit(1621683639.047:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18319 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 608.716510][T18326] FAULT_INJECTION: forcing a failure. [ 608.716510][T18326] name failslab, interval 1, probability 0, space 0, times 0 [ 608.729139][T18326] CPU: 0 PID: 18326 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 608.737922][T18326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.747971][T18326] Call Trace: [ 608.751335][T18326] dump_stack+0x137/0x19d [ 608.753428][T18325] loop5: detected capacity change from 0 to 264192 [ 608.755662][T18326] should_fail+0x23c/0x250 [ 608.766657][T18326] ? mempool_alloc_slab+0x16/0x20 [ 608.771699][T18326] __should_failslab+0x81/0x90 [ 608.776462][T18326] should_failslab+0x5/0x20 [ 608.780948][T18326] kmem_cache_alloc+0x46/0x2f0 [ 608.785695][T18326] mempool_alloc_slab+0x16/0x20 [ 608.790530][T18326] ? mempool_free+0x130/0x130 [ 608.795186][T18326] mempool_alloc+0x8c/0x300 [ 608.799667][T18326] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 608.805826][T18326] ? __blk_mq_run_hw_queue+0xea/0x140 [ 608.811235][T18326] bio_clone_fast+0xa1/0x2b0 [ 608.815816][T18326] bio_split+0x9b/0x320 [ 608.819950][T18326] __blk_queue_split+0xab2/0xc50 [ 608.824913][T18326] blk_mq_submit_bio+0xd3/0xe90 [ 608.829746][T18326] submit_bio_noacct+0x6f2/0x7e0 [ 608.834677][T18326] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 608.840201][T18326] ? mempool_alloc+0x99/0x300 [ 608.845028][T18326] submit_bio+0x16d/0x2b0 [ 608.849359][T18326] ? bio_alloc_bioset+0x402/0x480 [ 608.854372][T18326] iomap_dio_bio_actor+0x91d/0xb50 [ 608.859481][T18326] iomap_dio_actor+0x26e/0x3b0 [ 608.864271][T18326] iomap_apply+0x1e2/0x400 [ 608.868665][T18326] __iomap_dio_rw+0x5af/0xad0 [ 608.873336][T18326] ? __iomap_dio_rw+0xad0/0xad0 [ 608.878165][T18326] iomap_dio_rw+0x30/0x70 [ 608.882470][T18326] ? ext4_file_write_iter+0x4e1/0x11d0 [ 608.888062][T18326] ext4_file_write_iter+0xa4f/0x11d0 [ 608.893386][T18326] ? ext4_file_write_iter+0x4e1/0x11d0 [ 608.898882][T18326] do_iter_readv_writev+0x2cb/0x360 [ 608.904065][T18326] do_iter_write+0x112/0x4c0 [ 608.908689][T18326] ? kcsan_setup_watchpoint+0x26e/0x470 [ 608.914358][T18326] vfs_iter_write+0x4c/0x70 [ 608.918837][T18326] iter_file_splice_write+0x40a/0x750 [ 608.924331][T18326] ? rw_verify_area+0xf0/0x250 [ 608.929110][T18326] ? splice_from_pipe+0xc0/0xc0 [ 608.933937][T18326] do_splice+0x9aa/0xd30 [ 608.938156][T18326] ? vfs_write+0x50c/0x770 [ 608.942601][T18326] ? __fget_light+0x21b/0x260 [ 608.947321][T18326] __se_sys_splice+0x2a6/0x390 [ 608.952068][T18326] __x64_sys_splice+0x74/0x80 [ 608.956723][T18326] do_syscall_64+0x4a/0x90 [ 608.961121][T18326] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 608.966996][T18326] RIP: 0033:0x4665d9 [ 608.970892][T18326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 608.990538][T18326] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 608.998994][T18326] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 609.006950][T18326] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 11:40:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 609.014969][T18326] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 609.023025][T18326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 609.030979][T18326] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 609.064258][T18325] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 609.242874][T18325] loop5: detected capacity change from 0 to 264192 [ 609.251280][T18325] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x900) 11:40:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:39 executing program 0 (fault-call:4 fault-nth:31): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:40 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xfffe, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:40 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 609.579468][T18376] FAULT_INJECTION: forcing a failure. [ 609.579468][T18376] name failslab, interval 1, probability 0, space 0, times 0 [ 609.592465][T18376] CPU: 0 PID: 18376 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 609.601217][T18376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.611353][T18376] Call Trace: [ 609.614626][T18376] dump_stack+0x137/0x19d [ 609.618956][T18376] should_fail+0x23c/0x250 [ 609.623366][T18376] ? mempool_alloc_slab+0x16/0x20 [ 609.628434][T18376] __should_failslab+0x81/0x90 [ 609.633204][T18376] should_failslab+0x5/0x20 [ 609.637768][T18376] kmem_cache_alloc+0x46/0x2f0 [ 609.642541][T18376] mempool_alloc_slab+0x16/0x20 [ 609.647464][T18376] ? mempool_free+0x130/0x130 [ 609.652128][T18376] mempool_alloc+0x8c/0x300 [ 609.656630][T18376] sg_pool_alloc+0x74/0x90 [ 609.661031][T18376] __sg_alloc_table+0xce/0x290 [ 609.665787][T18376] sg_alloc_table_chained+0xaf/0x140 [ 609.671052][T18376] ? sg_alloc_table_chained+0x140/0x140 [ 609.676581][T18376] scsi_alloc_sgtables+0x180/0x500 [ 609.681690][T18376] sd_init_command+0x935/0x15f0 [ 609.686543][T18376] scsi_queue_rq+0x10e0/0x15a0 [ 609.691294][T18376] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 609.696924][T18376] ? deadline_remove_request+0x158/0x180 [ 609.702564][T18376] ? dd_dispatch_request+0x2e1/0x3d0 [ 609.707842][T18376] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 609.713382][T18376] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 609.719618][T18376] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 609.725604][T18376] __blk_mq_run_hw_queue+0xbc/0x140 [ 609.729056][T18388] loop5: detected capacity change from 0 to 264192 [ 609.730803][T18376] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 609.743102][T18376] ? dd_insert_request+0x255/0x330 [ 609.748212][T18376] blk_mq_run_hw_queue+0x22c/0x250 [ 609.753334][T18376] ? dd_finish_request+0x10/0x10 [ 609.758340][T18376] blk_mq_sched_insert_requests+0x13f/0x200 [ 609.764247][T18376] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 609.769627][T18376] blk_flush_plug_list+0x235/0x260 [ 609.774712][T18376] ? __blk_mq_alloc_request+0x270/0x290 [ 609.780306][T18376] blk_mq_submit_bio+0x68a/0xe90 [ 609.785220][T18376] submit_bio_noacct+0x6f2/0x7e0 [ 609.790167][T18376] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 609.795778][T18376] ? mempool_alloc+0x99/0x300 [ 609.800433][T18376] submit_bio+0x16d/0x2b0 [ 609.804745][T18376] ? bio_alloc_bioset+0x402/0x480 [ 609.809828][T18376] iomap_dio_bio_actor+0x91d/0xb50 [ 609.814923][T18376] iomap_dio_actor+0x26e/0x3b0 [ 609.819683][T18376] iomap_apply+0x1e2/0x400 [ 609.824075][T18376] __iomap_dio_rw+0x5af/0xad0 [ 609.828735][T18376] ? __iomap_dio_rw+0xad0/0xad0 [ 609.833562][T18376] iomap_dio_rw+0x30/0x70 [ 609.837881][T18376] ? ext4_file_write_iter+0x4e1/0x11d0 [ 609.843342][T18376] ext4_file_write_iter+0xa4f/0x11d0 [ 609.848675][T18376] ? ext4_file_write_iter+0x4e1/0x11d0 [ 609.854165][T18376] do_iter_readv_writev+0x2cb/0x360 [ 609.859349][T18376] do_iter_write+0x112/0x4c0 [ 609.863915][T18376] ? kcsan_setup_watchpoint+0x26e/0x470 [ 609.869439][T18376] vfs_iter_write+0x4c/0x70 [ 609.873916][T18376] iter_file_splice_write+0x40a/0x750 [ 609.879267][T18376] ? rw_verify_area+0xf0/0x250 [ 609.884058][T18376] ? splice_from_pipe+0xc0/0xc0 [ 609.888966][T18376] do_splice+0x9aa/0xd30 [ 609.893208][T18376] ? vfs_write+0x50c/0x770 [ 609.897606][T18376] ? __fget_light+0x21b/0x260 [ 609.902261][T18376] __se_sys_splice+0x2a6/0x390 [ 609.907010][T18376] __x64_sys_splice+0x74/0x80 [ 609.911668][T18376] do_syscall_64+0x4a/0x90 [ 609.916070][T18376] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 609.921943][T18376] RIP: 0033:0x4665d9 [ 609.925814][T18376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 609.945398][T18376] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 609.953787][T18376] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 609.961739][T18376] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 609.969717][T18376] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 609.977667][T18376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 609.985611][T18376] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:40 executing program 0 (fault-call:4 fault-nth:32): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 610.098943][T18388] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 610.286333][T18410] FAULT_INJECTION: forcing a failure. [ 610.286333][T18410] name failslab, interval 1, probability 0, space 0, times 0 [ 610.298996][T18410] CPU: 0 PID: 18410 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 610.307812][T18410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.317909][T18410] Call Trace: [ 610.321179][T18410] dump_stack+0x137/0x19d [ 610.325647][T18410] should_fail+0x23c/0x250 [ 610.330063][T18410] ? mempool_alloc_slab+0x16/0x20 [ 610.335083][T18410] __should_failslab+0x81/0x90 [ 610.339846][T18410] should_failslab+0x5/0x20 [ 610.344425][T18410] kmem_cache_alloc+0x46/0x2f0 [ 610.349215][T18410] mempool_alloc_slab+0x16/0x20 [ 610.354058][T18410] ? mempool_free+0x130/0x130 [ 610.358909][T18410] mempool_alloc+0x8c/0x300 [ 610.363487][T18410] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 610.369656][T18410] ? __blk_mq_run_hw_queue+0xea/0x140 [ 610.375083][T18410] bio_clone_fast+0xa1/0x2b0 [ 610.379664][T18410] bio_split+0x9b/0x320 [ 610.383802][T18410] __blk_queue_split+0xab2/0xc50 [ 610.388833][T18410] blk_mq_submit_bio+0xd3/0xe90 [ 610.393702][T18410] submit_bio_noacct+0x6f2/0x7e0 [ 610.398627][T18410] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 610.404172][T18410] ? mempool_alloc+0x99/0x300 [ 610.408884][T18410] submit_bio+0x16d/0x2b0 [ 610.413201][T18410] ? bio_alloc_bioset+0x402/0x480 [ 610.418220][T18410] iomap_dio_bio_actor+0x91d/0xb50 [ 610.423326][T18410] iomap_dio_actor+0x26e/0x3b0 [ 610.428158][T18410] iomap_apply+0x1e2/0x400 [ 610.432568][T18410] __iomap_dio_rw+0x5af/0xad0 [ 610.437319][T18410] ? __iomap_dio_rw+0xad0/0xad0 [ 610.442149][T18410] iomap_dio_rw+0x30/0x70 [ 610.446478][T18410] ? ext4_file_write_iter+0x4e1/0x11d0 [ 610.451930][T18410] ext4_file_write_iter+0xa4f/0x11d0 [ 610.457255][T18410] ? ext4_file_write_iter+0x4e1/0x11d0 [ 610.462711][T18410] do_iter_readv_writev+0x2cb/0x360 [ 610.468093][T18410] do_iter_write+0x112/0x4c0 [ 610.472671][T18410] ? kcsan_setup_watchpoint+0x26e/0x470 [ 610.478223][T18410] vfs_iter_write+0x4c/0x70 11:40:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xa00) 11:40:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:40 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfb3f0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:40 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2b800, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 610.482745][T18410] iter_file_splice_write+0x40a/0x750 [ 610.488174][T18410] ? rw_verify_area+0xf0/0x250 [ 610.492935][T18410] ? splice_from_pipe+0xc0/0xc0 [ 610.497829][T18410] do_splice+0x9aa/0xd30 [ 610.502075][T18410] ? vfs_write+0x50c/0x770 [ 610.506477][T18410] ? __fget_light+0x21b/0x260 [ 610.511201][T18410] __se_sys_splice+0x2a6/0x390 [ 610.515955][T18410] __x64_sys_splice+0x74/0x80 [ 610.520610][T18410] do_syscall_64+0x4a/0x90 [ 610.525057][T18410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 610.530953][T18410] RIP: 0033:0x4665d9 [ 610.534897][T18410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.554630][T18410] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 610.563047][T18410] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 610.571014][T18410] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 610.579080][T18410] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 610.587043][T18410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 610.595030][T18410] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 610.603898][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 610.603906][ T25] audit: type=1326 audit(1621683641.097:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18421 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xb00) 11:40:41 executing program 0 (fault-call:4 fault-nth:33): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 610.762380][ T25] audit: type=1326 audit(1621683641.257:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18438 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 610.931110][T18448] FAULT_INJECTION: forcing a failure. [ 610.931110][T18448] name failslab, interval 1, probability 0, space 0, times 0 [ 610.943756][T18448] CPU: 0 PID: 18448 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 610.952513][T18448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.962559][T18448] Call Trace: [ 610.964313][T18455] loop5: detected capacity change from 0 to 264192 [ 610.965833][T18448] dump_stack+0x137/0x19d [ 610.976642][T18448] should_fail+0x23c/0x250 [ 610.981040][T18448] ? mempool_alloc_slab+0x16/0x20 [ 610.986044][T18448] __should_failslab+0x81/0x90 [ 610.990791][T18448] should_failslab+0x5/0x20 [ 610.995365][T18448] kmem_cache_alloc+0x46/0x2f0 [ 611.000110][T18448] mempool_alloc_slab+0x16/0x20 [ 611.004939][T18448] ? mempool_free+0x130/0x130 [ 611.009593][T18448] mempool_alloc+0x8c/0x300 [ 611.014075][T18448] sg_pool_alloc+0x74/0x90 [ 611.018467][T18448] __sg_alloc_table+0xce/0x290 [ 611.023211][T18448] sg_alloc_table_chained+0xaf/0x140 [ 611.028484][T18448] ? sg_alloc_table_chained+0x140/0x140 [ 611.034013][T18448] scsi_alloc_sgtables+0x180/0x500 [ 611.039109][T18448] sd_init_command+0x935/0x15f0 [ 611.043944][T18448] scsi_queue_rq+0x10e0/0x15a0 [ 611.048686][T18448] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 611.054255][T18448] ? deadline_remove_request+0x158/0x180 [ 611.059881][T18448] ? dd_dispatch_request+0x2e1/0x3d0 [ 611.065149][T18448] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 611.070763][T18448] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 611.076989][T18448] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 611.082957][T18448] __blk_mq_run_hw_queue+0xbc/0x140 [ 611.088136][T18448] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 611.094044][T18448] ? dd_insert_request+0x255/0x330 [ 611.099149][T18448] blk_mq_run_hw_queue+0x22c/0x250 [ 611.104251][T18448] ? dd_finish_request+0x10/0x10 [ 611.109168][T18448] blk_mq_sched_insert_requests+0x13f/0x200 [ 611.115166][T18448] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 611.120527][T18448] blk_flush_plug_list+0x235/0x260 [ 611.125680][T18448] ? __blk_mq_alloc_request+0x270/0x290 [ 611.131258][T18448] blk_mq_submit_bio+0x68a/0xe90 [ 611.136244][T18448] submit_bio_noacct+0x6f2/0x7e0 [ 611.141216][T18448] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 611.146739][T18448] ? mempool_alloc+0x99/0x300 [ 611.151509][T18448] submit_bio+0x16d/0x2b0 [ 611.155841][T18448] ? bio_alloc_bioset+0x402/0x480 [ 611.160840][T18448] iomap_dio_bio_actor+0x91d/0xb50 [ 611.165930][T18448] iomap_dio_actor+0x26e/0x3b0 [ 611.170680][T18448] iomap_apply+0x1e2/0x400 [ 611.175133][T18448] __iomap_dio_rw+0x5af/0xad0 [ 611.179789][T18448] ? __iomap_dio_rw+0xad0/0xad0 [ 611.184671][T18448] iomap_dio_rw+0x30/0x70 [ 611.188978][T18448] ? ext4_file_write_iter+0x4e1/0x11d0 [ 611.194551][T18448] ext4_file_write_iter+0xa4f/0x11d0 [ 611.199821][T18448] ? ext4_file_write_iter+0x4e1/0x11d0 [ 611.205277][T18448] do_iter_readv_writev+0x2cb/0x360 [ 611.210456][T18448] do_iter_write+0x112/0x4c0 [ 611.215026][T18448] ? kcsan_setup_watchpoint+0x26e/0x470 [ 611.220551][T18448] vfs_iter_write+0x4c/0x70 [ 611.225048][T18448] iter_file_splice_write+0x40a/0x750 [ 611.230455][T18448] ? rw_verify_area+0xf0/0x250 [ 611.235198][T18448] ? splice_from_pipe+0xc0/0xc0 [ 611.240085][T18448] do_splice+0x9aa/0xd30 [ 611.244309][T18448] ? vfs_write+0x50c/0x770 [ 611.248721][T18448] ? __fget_light+0x21b/0x260 [ 611.253376][T18448] __se_sys_splice+0x2a6/0x390 [ 611.258136][T18448] __x64_sys_splice+0x74/0x80 [ 611.262795][T18448] do_syscall_64+0x4a/0x90 [ 611.267197][T18448] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 611.273100][T18448] RIP: 0033:0x4665d9 [ 611.276972][T18448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.296642][T18448] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 611.305033][T18448] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 611.312988][T18448] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 611.320994][T18448] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 611.329110][T18448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 611.337057][T18448] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 611.445737][T18455] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:42 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfbffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xd00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:42 executing program 0 (fault-call:4 fault-nth:34): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xc00) 11:40:42 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 611.588001][ T25] audit: type=1326 audit(1621683642.087:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18438 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 611.683307][ T25] audit: type=1326 audit(1621683642.177:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18500 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 611.691771][T18486] FAULT_INJECTION: forcing a failure. [ 611.691771][T18486] name failslab, interval 1, probability 0, space 0, times 0 [ 611.719459][T18486] CPU: 0 PID: 18486 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 611.728267][T18486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.738321][T18486] Call Trace: [ 611.741613][T18486] dump_stack+0x137/0x19d [ 611.745953][T18486] should_fail+0x23c/0x250 [ 611.750442][T18486] ? mempool_alloc_slab+0x16/0x20 [ 611.755589][T18486] __should_failslab+0x81/0x90 [ 611.760339][T18486] should_failslab+0x5/0x20 [ 611.764911][T18486] kmem_cache_alloc+0x46/0x2f0 [ 611.769716][T18486] mempool_alloc_slab+0x16/0x20 [ 611.774715][T18486] ? mempool_free+0x130/0x130 [ 611.779391][T18486] mempool_alloc+0x8c/0x300 [ 611.783930][T18486] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 611.790251][T18486] ? __blk_mq_run_hw_queue+0xea/0x140 [ 611.795619][T18486] bio_clone_fast+0xa1/0x2b0 [ 611.800266][T18486] bio_split+0x9b/0x320 [ 611.804450][T18486] __blk_queue_split+0xab2/0xc50 [ 611.809436][T18486] blk_mq_submit_bio+0xd3/0xe90 [ 611.814277][T18486] submit_bio_noacct+0x6f2/0x7e0 [ 611.819202][T18486] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 611.824740][T18486] ? mempool_alloc+0x99/0x300 [ 611.829405][T18486] submit_bio+0x16d/0x2b0 [ 611.833731][T18486] ? kcsan_setup_watchpoint+0x26e/0x470 [ 611.839280][T18486] iomap_dio_bio_actor+0x91d/0xb50 [ 611.844414][T18486] iomap_dio_actor+0x26e/0x3b0 [ 611.849239][T18486] iomap_apply+0x1e2/0x400 [ 611.853645][T18486] __iomap_dio_rw+0x5af/0xad0 [ 611.858313][T18486] ? __iomap_dio_rw+0xad0/0xad0 [ 611.863176][T18486] iomap_dio_rw+0x30/0x70 [ 611.867512][T18486] ? ext4_file_write_iter+0x4e1/0x11d0 [ 611.872963][T18486] ext4_file_write_iter+0xa4f/0x11d0 [ 611.878232][T18486] ? ext4_file_write_iter+0x4e1/0x11d0 [ 611.883734][T18486] do_iter_readv_writev+0x2cb/0x360 [ 611.888918][T18486] do_iter_write+0x112/0x4c0 [ 611.893500][T18486] ? kcsan_setup_watchpoint+0x26e/0x470 [ 611.899037][T18486] vfs_iter_write+0x4c/0x70 [ 611.901328][T18508] loop5: detected capacity change from 0 to 264192 [ 611.903522][T18486] iter_file_splice_write+0x40a/0x750 [ 611.903543][T18486] ? rw_verify_area+0xf0/0x250 [ 611.920205][T18486] ? splice_from_pipe+0xc0/0xc0 [ 611.925073][T18486] do_splice+0x9aa/0xd30 [ 611.929359][T18486] ? vfs_write+0x50c/0x770 [ 611.933759][T18486] ? __fget_light+0x21b/0x260 [ 611.938418][T18486] __se_sys_splice+0x2a6/0x390 [ 611.943185][T18486] __x64_sys_splice+0x74/0x80 [ 611.947851][T18486] do_syscall_64+0x4a/0x90 [ 611.952255][T18486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 611.958151][T18486] RIP: 0033:0x4665d9 [ 611.962024][T18486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.981615][T18486] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 611.990030][T18486] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 611.997981][T18486] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 612.006128][T18486] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 612.014092][T18486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 612.022141][T18486] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 612.058637][T18508] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:42 executing program 0 (fault-call:4 fault-nth:35): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:42 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfc3f0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 612.294184][T18528] FAULT_INJECTION: forcing a failure. [ 612.294184][T18528] name failslab, interval 1, probability 0, space 0, times 0 [ 612.306987][T18528] CPU: 1 PID: 18528 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 612.315779][T18528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.325838][T18528] Call Trace: [ 612.329115][T18528] dump_stack+0x137/0x19d [ 612.333442][T18528] should_fail+0x23c/0x250 [ 612.337886][T18528] ? mempool_alloc_slab+0x16/0x20 [ 612.342937][T18528] __should_failslab+0x81/0x90 [ 612.347701][T18528] should_failslab+0x5/0x20 [ 612.352223][T18528] kmem_cache_alloc+0x46/0x2f0 [ 612.357046][T18528] mempool_alloc_slab+0x16/0x20 [ 612.361907][T18528] ? mempool_free+0x130/0x130 [ 612.366584][T18528] mempool_alloc+0x8c/0x300 [ 612.371143][T18528] sg_pool_alloc+0x74/0x90 [ 612.375550][T18528] __sg_alloc_table+0xce/0x290 [ 612.380319][T18528] sg_alloc_table_chained+0xaf/0x140 [ 612.385600][T18528] ? sg_alloc_table_chained+0x140/0x140 [ 612.391136][T18528] scsi_alloc_sgtables+0x180/0x500 [ 612.396234][T18528] sd_init_command+0x935/0x15f0 [ 612.401144][T18528] scsi_queue_rq+0x10e0/0x15a0 [ 612.405901][T18528] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 612.411437][T18528] ? deadline_remove_request+0x158/0x180 [ 612.417082][T18528] ? dd_dispatch_request+0x2e1/0x3d0 [ 612.422359][T18528] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 612.427981][T18528] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 612.434214][T18528] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 612.440247][T18528] __blk_mq_run_hw_queue+0xbc/0x140 [ 612.445448][T18528] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 612.451306][T18528] ? dd_insert_request+0x255/0x330 [ 612.456407][T18528] blk_mq_run_hw_queue+0x22c/0x250 [ 612.461520][T18528] ? dd_finish_request+0x10/0x10 [ 612.466462][T18528] blk_mq_sched_insert_requests+0x13f/0x200 [ 612.472388][T18528] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 612.477834][T18528] blk_flush_plug_list+0x235/0x260 [ 612.482952][T18528] ? __blk_mq_alloc_request+0x270/0x290 [ 612.488491][T18528] blk_mq_submit_bio+0x68a/0xe90 [ 612.493518][T18528] submit_bio_noacct+0x6f2/0x7e0 [ 612.498594][T18528] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 612.504148][T18528] ? mempool_alloc+0x99/0x300 [ 612.508833][T18528] submit_bio+0x16d/0x2b0 [ 612.513226][T18528] ? bio_alloc_bioset+0x402/0x480 [ 612.518257][T18528] iomap_dio_bio_actor+0x91d/0xb50 [ 612.523391][T18528] iomap_dio_actor+0x26e/0x3b0 [ 612.528172][T18528] iomap_apply+0x1e2/0x400 [ 612.532653][T18528] __iomap_dio_rw+0x5af/0xad0 [ 612.537314][T18528] ? __iomap_dio_rw+0xad0/0xad0 [ 612.542190][T18528] iomap_dio_rw+0x30/0x70 [ 612.546568][T18528] ? ext4_file_write_iter+0x4e1/0x11d0 [ 612.552161][T18528] ext4_file_write_iter+0xa4f/0x11d0 [ 612.557449][T18528] ? ext4_file_write_iter+0x4e1/0x11d0 [ 612.562922][T18528] do_iter_readv_writev+0x2cb/0x360 [ 612.568362][T18528] do_iter_write+0x112/0x4c0 [ 612.573159][T18528] ? kcsan_setup_watchpoint+0x26e/0x470 [ 612.578704][T18528] vfs_iter_write+0x4c/0x70 [ 612.583211][T18528] iter_file_splice_write+0x40a/0x750 [ 612.588581][T18528] ? rw_verify_area+0xf0/0x250 [ 612.593334][T18528] ? splice_from_pipe+0xc0/0xc0 [ 612.598165][T18528] do_splice+0x9aa/0xd30 [ 612.602433][T18528] ? vfs_write+0x50c/0x770 [ 612.606902][T18528] ? __fget_light+0x21b/0x260 [ 612.611596][T18528] __se_sys_splice+0x2a6/0x390 [ 612.616340][T18528] __x64_sys_splice+0x74/0x80 [ 612.621059][T18528] do_syscall_64+0x4a/0x90 [ 612.625469][T18528] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 612.631360][T18528] RIP: 0033:0x4665d9 [ 612.635231][T18528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.654961][T18528] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 612.663350][T18528] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 612.671308][T18528] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 612.679343][T18528] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 612.687382][T18528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 11:40:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 612.695339][T18528] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 612.706105][T18542] loop5: detected capacity change from 0 to 264192 [ 612.731471][T18542] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xd00) 11:40:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:43 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:43 executing program 0 (fault-call:4 fault-nth:36): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:43 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 612.868704][ T25] audit: type=1326 audit(1621683643.367:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18558 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 613.033480][T18568] FAULT_INJECTION: forcing a failure. [ 613.033480][T18568] name failslab, interval 1, probability 0, space 0, times 0 [ 613.046382][T18568] CPU: 1 PID: 18568 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 613.055238][T18568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.065278][T18568] Call Trace: [ 613.068548][T18568] dump_stack+0x137/0x19d [ 613.072876][T18568] should_fail+0x23c/0x250 [ 613.077283][T18568] ? mempool_alloc_slab+0x16/0x20 [ 613.082306][T18568] __should_failslab+0x81/0x90 [ 613.087148][T18568] should_failslab+0x5/0x20 [ 613.091673][T18568] kmem_cache_alloc+0x46/0x2f0 [ 613.096443][T18568] mempool_alloc_slab+0x16/0x20 [ 613.101293][T18568] ? mempool_free+0x130/0x130 [ 613.105957][T18568] mempool_alloc+0x8c/0x300 [ 613.110464][T18568] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 613.116627][T18568] ? __blk_mq_run_hw_queue+0xea/0x140 [ 613.121989][T18568] bio_clone_fast+0xa1/0x2b0 [ 613.126567][T18568] bio_split+0x9b/0x320 [ 613.130709][T18568] __blk_queue_split+0xab2/0xc50 [ 613.135633][T18568] blk_mq_submit_bio+0xd3/0xe90 [ 613.140472][T18568] submit_bio_noacct+0x6f2/0x7e0 [ 613.145455][T18568] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 613.151000][T18568] ? mempool_alloc+0x99/0x300 [ 613.155656][T18568] submit_bio+0x16d/0x2b0 [ 613.159962][T18568] ? bio_alloc_bioset+0x402/0x480 [ 613.164968][T18568] iomap_dio_bio_actor+0x91d/0xb50 [ 613.170207][T18568] iomap_dio_actor+0x26e/0x3b0 [ 613.174959][T18568] iomap_apply+0x1e2/0x400 [ 613.179363][T18568] __iomap_dio_rw+0x5af/0xad0 [ 613.184017][T18568] ? __iomap_dio_rw+0xad0/0xad0 [ 613.188853][T18568] iomap_dio_rw+0x30/0x70 [ 613.193180][T18568] ? ext4_file_write_iter+0x4e1/0x11d0 [ 613.198651][T18568] ext4_file_write_iter+0xa4f/0x11d0 [ 613.204018][T18568] ? ext4_file_write_iter+0x4e1/0x11d0 [ 613.209522][T18568] do_iter_readv_writev+0x2cb/0x360 [ 613.214707][T18568] do_iter_write+0x112/0x4c0 [ 613.219476][T18568] ? kcsan_setup_watchpoint+0x26e/0x470 [ 613.225092][T18568] vfs_iter_write+0x4c/0x70 [ 613.229583][T18568] iter_file_splice_write+0x40a/0x750 [ 613.234979][T18568] ? rw_verify_area+0xf0/0x250 [ 613.239751][T18568] ? splice_from_pipe+0xc0/0xc0 [ 613.244585][T18568] do_splice+0x9aa/0xd30 [ 613.248853][T18568] ? vfs_write+0x50c/0x770 [ 613.253324][T18568] ? __fget_light+0x21b/0x260 [ 613.257995][T18568] __se_sys_splice+0x2a6/0x390 [ 613.262743][T18568] __x64_sys_splice+0x74/0x80 [ 613.267405][T18568] do_syscall_64+0x4a/0x90 [ 613.271818][T18568] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 613.277707][T18568] RIP: 0033:0x4665d9 [ 613.281594][T18568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.301181][T18568] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 613.309653][T18568] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 613.317671][T18568] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 613.325621][T18568] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5a02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 613.333574][T18568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.341618][T18568] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 613.370343][T18584] loop5: detected capacity change from 0 to 264192 11:40:43 executing program 0 (fault-call:4 fault-nth:37): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 613.398616][T18584] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 613.567052][T18584] loop5: detected capacity change from 0 to 264192 [ 613.585759][T18605] FAULT_INJECTION: forcing a failure. [ 613.585759][T18605] name failslab, interval 1, probability 0, space 0, times 0 [ 613.598396][T18605] CPU: 0 PID: 18605 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 613.607190][T18605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.617280][T18605] Call Trace: [ 613.620548][T18605] dump_stack+0x137/0x19d [ 613.624867][T18605] should_fail+0x23c/0x250 [ 613.629272][T18605] ? mempool_alloc_slab+0x16/0x20 [ 613.634309][T18605] __should_failslab+0x81/0x90 [ 613.639099][T18605] should_failslab+0x5/0x20 [ 613.643590][T18605] kmem_cache_alloc+0x46/0x2f0 [ 613.648347][T18605] mempool_alloc_slab+0x16/0x20 [ 613.653189][T18605] ? mempool_free+0x130/0x130 [ 613.657933][T18605] mempool_alloc+0x8c/0x300 [ 613.662497][T18605] sg_pool_alloc+0x74/0x90 [ 613.666939][T18605] __sg_alloc_table+0xce/0x290 [ 613.671723][T18605] sg_alloc_table_chained+0xaf/0x140 [ 613.677008][T18605] ? sg_alloc_table_chained+0x140/0x140 [ 613.682547][T18605] scsi_alloc_sgtables+0x180/0x500 [ 613.687675][T18605] sd_init_command+0x935/0x15f0 [ 613.692533][T18605] scsi_queue_rq+0x10e0/0x15a0 [ 613.697330][T18605] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 613.702896][T18605] ? deadline_remove_request+0x158/0x180 [ 613.708521][T18605] ? dd_dispatch_request+0x2e1/0x3d0 [ 613.713828][T18605] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 613.719367][T18605] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 613.725618][T18605] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 613.731597][T18605] __blk_mq_run_hw_queue+0xbc/0x140 [ 613.736829][T18605] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 613.742721][T18605] ? dd_insert_request+0x255/0x330 [ 613.747830][T18605] blk_mq_run_hw_queue+0x22c/0x250 [ 613.752995][T18605] ? dd_finish_request+0x10/0x10 [ 613.757937][T18605] blk_mq_sched_insert_requests+0x13f/0x200 11:40:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xe00) 11:40:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 613.763891][T18605] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 613.769276][T18605] blk_flush_plug_list+0x235/0x260 [ 613.774408][T18605] ? __blk_mq_alloc_request+0x270/0x290 [ 613.780309][T18605] blk_mq_submit_bio+0x68a/0xe90 [ 613.785384][T18605] submit_bio_noacct+0x6f2/0x7e0 [ 613.790331][T18605] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 613.795938][T18605] ? mempool_alloc+0x99/0x300 [ 613.800611][T18605] submit_bio+0x16d/0x2b0 [ 613.804939][T18605] ? bio_alloc_bioset+0x402/0x480 [ 613.809957][T18605] iomap_dio_bio_actor+0x91d/0xb50 11:40:44 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 613.815064][T18605] iomap_dio_actor+0x26e/0x3b0 [ 613.819830][T18605] iomap_apply+0x1e2/0x400 [ 613.824241][T18605] __iomap_dio_rw+0x5af/0xad0 [ 613.828917][T18605] ? __iomap_dio_rw+0xad0/0xad0 [ 613.833754][T18605] iomap_dio_rw+0x30/0x70 [ 613.838076][T18605] ? ext4_file_write_iter+0x4e1/0x11d0 [ 613.843550][T18605] ext4_file_write_iter+0xa4f/0x11d0 [ 613.848863][T18605] ? ext4_file_write_iter+0x4e1/0x11d0 [ 613.854385][T18605] do_iter_readv_writev+0x2cb/0x360 [ 613.859607][T18605] do_iter_write+0x112/0x4c0 [ 613.864202][T18605] ? kcsan_setup_watchpoint+0x26e/0x470 [ 613.869747][T18605] vfs_iter_write+0x4c/0x70 [ 613.874306][T18605] iter_file_splice_write+0x40a/0x750 [ 613.879741][T18605] ? rw_verify_area+0xf0/0x250 [ 613.884528][T18605] ? splice_from_pipe+0xc0/0xc0 [ 613.889358][T18605] do_splice+0x9aa/0xd30 [ 613.893581][T18605] ? vfs_write+0x50c/0x770 [ 613.897977][T18605] ? __fget_light+0x21b/0x260 [ 613.902636][T18605] __se_sys_splice+0x2a6/0x390 [ 613.907384][T18605] __x64_sys_splice+0x74/0x80 [ 613.912047][T18605] do_syscall_64+0x4a/0x90 [ 613.916443][T18605] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 613.922319][T18605] RIP: 0033:0x4665d9 [ 613.926191][T18605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.945864][T18605] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 613.954251][T18605] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 613.962237][T18605] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 613.970361][T18605] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 613.978313][T18605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.986259][T18605] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:44 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x1100) 11:40:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 614.007318][ T25] audit: type=1326 audit(1621683644.497:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18615 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:44 executing program 0 (fault-call:4 fault-nth:38): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 614.095896][ T25] audit: type=1326 audit(1621683644.587:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18626 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 614.272453][T18632] FAULT_INJECTION: forcing a failure. [ 614.272453][T18632] name failslab, interval 1, probability 0, space 0, times 0 [ 614.285108][T18632] CPU: 0 PID: 18632 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 614.293877][T18632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.303954][T18632] Call Trace: [ 614.307319][T18632] dump_stack+0x137/0x19d [ 614.311704][T18632] should_fail+0x23c/0x250 [ 614.316119][T18632] ? mempool_alloc_slab+0x16/0x20 [ 614.321144][T18632] __should_failslab+0x81/0x90 [ 614.325900][T18632] should_failslab+0x5/0x20 [ 614.330432][T18632] kmem_cache_alloc+0x46/0x2f0 [ 614.335249][T18632] mempool_alloc_slab+0x16/0x20 [ 614.340101][T18632] ? mempool_free+0x130/0x130 [ 614.344840][T18632] mempool_alloc+0x8c/0x300 [ 614.349325][T18632] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 614.355567][T18632] ? __blk_mq_run_hw_queue+0xea/0x140 [ 614.360963][T18632] bio_clone_fast+0xa1/0x2b0 [ 614.365608][T18632] bio_split+0x9b/0x320 [ 614.373668][T18632] __blk_queue_split+0xab2/0xc50 [ 614.378664][T18632] blk_mq_submit_bio+0xd3/0xe90 [ 614.383549][T18632] submit_bio_noacct+0x6f2/0x7e0 [ 614.388480][T18632] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 614.394030][T18632] ? mempool_alloc+0x99/0x300 [ 614.398729][T18632] submit_bio+0x16d/0x2b0 [ 614.403070][T18632] ? bio_alloc_bioset+0x402/0x480 [ 614.408099][T18632] iomap_dio_bio_actor+0x91d/0xb50 [ 614.413216][T18632] iomap_dio_actor+0x26e/0x3b0 [ 614.417990][T18632] iomap_apply+0x1e2/0x400 [ 614.422398][T18632] __iomap_dio_rw+0x5af/0xad0 [ 614.427116][T18632] ? __iomap_dio_rw+0xad0/0xad0 [ 614.431969][T18632] iomap_dio_rw+0x30/0x70 [ 614.436298][T18632] ? ext4_file_write_iter+0x4e1/0x11d0 [ 614.441761][T18632] ext4_file_write_iter+0xa4f/0x11d0 [ 614.447331][T18632] ? ext4_file_write_iter+0x4e1/0x11d0 [ 614.452878][T18632] do_iter_readv_writev+0x2cb/0x360 [ 614.458093][T18632] do_iter_write+0x112/0x4c0 [ 614.462783][T18632] vfs_iter_write+0x4c/0x70 [ 614.467271][T18632] iter_file_splice_write+0x40a/0x750 [ 614.472681][T18632] ? rw_verify_area+0xf0/0x250 [ 614.477498][T18632] ? splice_from_pipe+0xc0/0xc0 [ 614.482429][T18632] do_splice+0x9aa/0xd30 [ 614.486684][T18632] ? vfs_write+0x50c/0x770 [ 614.491113][T18632] ? __fget_light+0x21b/0x260 [ 614.495853][T18632] __se_sys_splice+0x2a6/0x390 [ 614.500623][T18632] __x64_sys_splice+0x74/0x80 [ 614.505298][T18632] do_syscall_64+0x4a/0x90 [ 614.509704][T18632] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 614.515634][T18632] RIP: 0033:0x4665d9 [ 614.519509][T18632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 614.539101][T18632] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 614.547585][T18632] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 614.555553][T18632] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 614.563564][T18632] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa401000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 614.571595][T18632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 614.579560][T18632] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 614.596928][T18639] loop5: detected capacity change from 0 to 264192 [ 614.605439][T18639] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 614.772033][T18639] loop5: detected capacity change from 0 to 264192 [ 614.780478][T18639] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 614.923131][ T25] audit: type=1326 audit(1621683645.417:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18626 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:45 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="020832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:45 executing program 0 (fault-call:4 fault-nth:39): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb301000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x1200) 11:40:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 615.063565][ T25] audit: type=1326 audit(1621683645.557:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 615.222998][T18691] loop5: detected capacity change from 0 to 264192 [ 615.230342][T18691] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 615.250395][T18692] FAULT_INJECTION: forcing a failure. [ 615.250395][T18692] name failslab, interval 1, probability 0, space 0, times 0 [ 615.263193][T18692] CPU: 1 PID: 18692 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 615.271957][T18692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.282002][T18692] Call Trace: [ 615.285270][T18692] dump_stack+0x137/0x19d [ 615.289612][T18692] should_fail+0x23c/0x250 [ 615.294058][T18692] ? mempool_alloc_slab+0x16/0x20 [ 615.299115][T18692] __should_failslab+0x81/0x90 [ 615.303874][T18692] should_failslab+0x5/0x20 [ 615.308401][T18692] kmem_cache_alloc+0x46/0x2f0 [ 615.313236][T18692] mempool_alloc_slab+0x16/0x20 [ 615.318267][T18692] ? mempool_free+0x130/0x130 [ 615.322936][T18692] mempool_alloc+0x8c/0x300 [ 615.327516][T18692] sg_pool_alloc+0x74/0x90 [ 615.331923][T18692] __sg_alloc_table+0xce/0x290 [ 615.336673][T18692] sg_alloc_table_chained+0xaf/0x140 [ 615.341952][T18692] ? sg_alloc_table_chained+0x140/0x140 [ 615.347488][T18692] scsi_alloc_sgtables+0x180/0x500 [ 615.352585][T18692] sd_init_command+0x935/0x15f0 [ 615.357429][T18692] scsi_queue_rq+0x10e0/0x15a0 [ 615.362210][T18692] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 615.367859][T18692] ? deadline_remove_request+0x158/0x180 [ 615.373507][T18692] ? dd_dispatch_request+0x2e1/0x3d0 [ 615.378813][T18692] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 615.384550][T18692] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 615.392236][T18692] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 615.398206][T18692] __blk_mq_run_hw_queue+0xbc/0x140 [ 615.403422][T18692] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 615.409284][T18692] ? dd_insert_request+0x255/0x330 [ 615.414526][T18692] blk_mq_run_hw_queue+0x22c/0x250 [ 615.419658][T18692] ? dd_finish_request+0x10/0x10 [ 615.424572][T18692] blk_mq_sched_insert_requests+0x13f/0x200 [ 615.430463][T18692] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 615.435845][T18692] blk_flush_plug_list+0x235/0x260 [ 615.440993][T18692] ? __blk_mq_alloc_request+0x270/0x290 [ 615.446664][T18692] blk_mq_submit_bio+0x68a/0xe90 [ 615.451608][T18692] submit_bio_noacct+0x6f2/0x7e0 [ 615.456601][T18692] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 615.462124][T18692] ? mempool_alloc+0x99/0x300 [ 615.466793][T18692] submit_bio+0x16d/0x2b0 [ 615.471263][T18692] ? bio_alloc_bioset+0x402/0x480 [ 615.476267][T18692] iomap_dio_bio_actor+0x91d/0xb50 [ 615.481425][T18692] iomap_dio_actor+0x26e/0x3b0 [ 615.486171][T18692] iomap_apply+0x1e2/0x400 [ 615.490565][T18692] __iomap_dio_rw+0x5af/0xad0 [ 615.495356][T18692] ? __iomap_dio_rw+0xad0/0xad0 [ 615.500185][T18692] iomap_dio_rw+0x30/0x70 [ 615.504544][T18692] ? ext4_file_write_iter+0x4e1/0x11d0 [ 615.509994][T18692] ext4_file_write_iter+0xa4f/0x11d0 [ 615.515306][T18692] ? ext4_file_write_iter+0x4e1/0x11d0 [ 615.520764][T18692] do_iter_readv_writev+0x2cb/0x360 [ 615.525940][T18692] do_iter_write+0x112/0x4c0 [ 615.530530][T18692] ? kcsan_setup_watchpoint+0x26e/0x470 [ 615.536054][T18692] vfs_iter_write+0x4c/0x70 [ 615.540546][T18692] iter_file_splice_write+0x40a/0x750 [ 615.546017][T18692] ? rw_verify_area+0xf0/0x250 [ 615.550773][T18692] ? splice_from_pipe+0xc0/0xc0 [ 615.555603][T18692] do_splice+0x9aa/0xd30 [ 615.559827][T18692] ? vfs_write+0x50c/0x770 [ 615.564232][T18692] ? __fget_light+0x21b/0x260 [ 615.568892][T18692] __se_sys_splice+0x2a6/0x390 [ 615.573636][T18692] __x64_sys_splice+0x74/0x80 [ 615.578295][T18692] do_syscall_64+0x4a/0x90 [ 615.582781][T18692] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 615.588672][T18692] RIP: 0033:0x4665d9 [ 615.592544][T18692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 615.612146][T18692] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 11:40:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 615.621228][T18692] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 615.629179][T18692] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 615.637128][T18692] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 615.645077][T18692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 615.653070][T18692] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:46 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="030832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:46 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:46 executing program 0 (fault-call:4 fault-nth:40): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x2000) 11:40:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 615.893467][ T25] audit: type=1326 audit(1621683646.387:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 615.980405][T18732] loop5: detected capacity change from 0 to 264192 [ 615.996675][ T25] audit: type=1326 audit(1621683646.487:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18747 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 616.045913][T18731] FAULT_INJECTION: forcing a failure. [ 616.045913][T18731] name failslab, interval 1, probability 0, space 0, times 0 [ 616.058767][T18731] CPU: 1 PID: 18731 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 616.067632][T18731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.077692][T18731] Call Trace: [ 616.080965][T18731] dump_stack+0x137/0x19d [ 616.085405][T18731] should_fail+0x23c/0x250 [ 616.089819][T18731] ? mempool_alloc_slab+0x16/0x20 [ 616.094834][T18731] __should_failslab+0x81/0x90 [ 616.099598][T18731] should_failslab+0x5/0x20 [ 616.104101][T18731] kmem_cache_alloc+0x46/0x2f0 [ 616.108851][T18731] mempool_alloc_slab+0x16/0x20 [ 616.113722][T18731] ? mempool_free+0x130/0x130 [ 616.118389][T18731] mempool_alloc+0x8c/0x300 [ 616.122887][T18731] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 616.129145][T18731] ? __blk_mq_run_hw_queue+0xea/0x140 [ 616.134540][T18731] bio_clone_fast+0xa1/0x2b0 11:40:46 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="050832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 616.137014][T18732] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 616.139135][T18731] bio_split+0x9b/0x320 [ 616.152335][T18731] __blk_queue_split+0xab2/0xc50 [ 616.157276][T18731] blk_mq_submit_bio+0xd3/0xe90 [ 616.162120][T18731] submit_bio_noacct+0x6f2/0x7e0 [ 616.167124][T18731] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 616.172692][T18731] ? mempool_alloc+0x99/0x300 [ 616.177374][T18731] submit_bio+0x16d/0x2b0 [ 616.181723][T18731] ? bio_alloc_bioset+0x402/0x480 [ 616.186865][T18731] iomap_dio_bio_actor+0x91d/0xb50 [ 616.192018][T18731] iomap_dio_actor+0x26e/0x3b0 [ 616.196797][T18731] iomap_apply+0x1e2/0x400 [ 616.201229][T18731] __iomap_dio_rw+0x5af/0xad0 [ 616.205918][T18731] ? __iomap_dio_rw+0xad0/0xad0 [ 616.210763][T18731] iomap_dio_rw+0x30/0x70 [ 616.215187][T18731] ? ext4_file_write_iter+0x4e1/0x11d0 [ 616.220657][T18731] ext4_file_write_iter+0xa4f/0x11d0 [ 616.225986][T18731] ? ext4_file_write_iter+0x4e1/0x11d0 [ 616.231501][T18731] do_iter_readv_writev+0x2cb/0x360 [ 616.236692][T18731] do_iter_write+0x112/0x4c0 [ 616.241276][T18731] ? kcsan_setup_watchpoint+0x26e/0x470 [ 616.246868][T18731] vfs_iter_write+0x4c/0x70 [ 616.251356][T18731] iter_file_splice_write+0x40a/0x750 [ 616.256728][T18731] ? rw_verify_area+0xf0/0x250 [ 616.261493][T18731] ? splice_from_pipe+0xc0/0xc0 [ 616.266385][T18731] do_splice+0x9aa/0xd30 [ 616.270636][T18731] ? vfs_write+0x50c/0x770 [ 616.275045][T18731] ? __fget_light+0x21b/0x260 [ 616.279727][T18731] __se_sys_splice+0x2a6/0x390 [ 616.284570][T18731] __x64_sys_splice+0x74/0x80 [ 616.289242][T18731] do_syscall_64+0x4a/0x90 [ 616.293654][T18731] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 616.299726][T18731] RIP: 0033:0x4665d9 [ 616.303609][T18731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.323388][T18731] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 616.331802][T18731] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 11:40:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:46 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="060832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 616.339895][T18731] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 616.347858][T18731] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 616.355827][T18731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 616.363791][T18731] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x23}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:46 executing program 0 (fault-call:4 fault-nth:41): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 616.566090][T18732] loop5: detected capacity change from 0 to 264192 [ 616.579225][T18732] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 616.595982][T18777] FAULT_INJECTION: forcing a failure. [ 616.595982][T18777] name failslab, interval 1, probability 0, space 0, times 0 [ 616.608624][T18777] CPU: 0 PID: 18777 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 616.617506][T18777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.627561][T18777] Call Trace: [ 616.630825][T18777] dump_stack+0x137/0x19d [ 616.635146][T18777] should_fail+0x23c/0x250 [ 616.639555][T18777] ? mempool_alloc_slab+0x16/0x20 [ 616.644694][T18777] __should_failslab+0x81/0x90 [ 616.649469][T18777] should_failslab+0x5/0x20 [ 616.653999][T18777] kmem_cache_alloc+0x46/0x2f0 [ 616.658762][T18777] mempool_alloc_slab+0x16/0x20 11:40:47 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffbffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 616.663602][T18777] ? mempool_free+0x130/0x130 [ 616.668281][T18777] mempool_alloc+0x8c/0x300 [ 616.672930][T18777] sg_pool_alloc+0x74/0x90 [ 616.677339][T18777] __sg_alloc_table+0xce/0x290 [ 616.682098][T18777] sg_alloc_table_chained+0xaf/0x140 [ 616.687378][T18777] ? sg_alloc_table_chained+0x140/0x140 [ 616.692921][T18777] scsi_alloc_sgtables+0x180/0x500 [ 616.698080][T18777] sd_init_command+0x935/0x15f0 [ 616.702933][T18777] scsi_queue_rq+0x10e0/0x15a0 [ 616.707698][T18777] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 616.713246][T18777] ? deadline_remove_request+0x158/0x180 [ 616.718892][T18777] ? dd_dispatch_request+0x2e1/0x3d0 [ 616.724191][T18777] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 616.729760][T18777] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 616.735994][T18777] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 616.742079][T18777] __blk_mq_run_hw_queue+0xbc/0x140 [ 616.747384][T18777] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 616.753260][T18777] ? dd_insert_request+0x255/0x330 [ 616.758514][T18777] blk_mq_run_hw_queue+0x22c/0x250 [ 616.763626][T18777] ? dd_finish_request+0x10/0x10 [ 616.768674][T18777] blk_mq_sched_insert_requests+0x13f/0x200 [ 616.774558][T18777] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 616.779929][T18777] blk_flush_plug_list+0x235/0x260 [ 616.785040][T18777] ? __blk_mq_alloc_request+0x270/0x290 [ 616.790623][T18777] blk_mq_submit_bio+0x68a/0xe90 [ 616.795564][T18777] submit_bio_noacct+0x6f2/0x7e0 [ 616.800732][T18777] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 616.806267][T18777] ? mempool_alloc+0x99/0x300 [ 616.810939][T18777] submit_bio+0x16d/0x2b0 [ 616.815260][T18777] ? bio_alloc_bioset+0x402/0x480 [ 616.820367][T18777] iomap_dio_bio_actor+0x91d/0xb50 [ 616.825488][T18777] iomap_dio_actor+0x26e/0x3b0 [ 616.830263][T18777] iomap_apply+0x1e2/0x400 [ 616.834702][T18777] __iomap_dio_rw+0x5af/0xad0 [ 616.839372][T18777] ? __iomap_dio_rw+0xad0/0xad0 [ 616.844217][T18777] iomap_dio_rw+0x30/0x70 [ 616.848549][T18777] ? ext4_file_write_iter+0x4e1/0x11d0 [ 616.853991][T18777] ext4_file_write_iter+0xa4f/0x11d0 [ 616.859263][T18777] ? ext4_file_write_iter+0x4e1/0x11d0 [ 616.864781][T18777] do_iter_readv_writev+0x2cb/0x360 [ 616.869975][T18777] do_iter_write+0x112/0x4c0 [ 616.874638][T18777] ? kcsan_setup_watchpoint+0x26e/0x470 [ 616.880192][T18777] vfs_iter_write+0x4c/0x70 [ 616.884672][T18777] iter_file_splice_write+0x40a/0x750 [ 616.890229][T18777] ? rw_verify_area+0xf0/0x250 [ 616.895006][T18777] ? splice_from_pipe+0xc0/0xc0 [ 616.899881][T18777] do_splice+0x9aa/0xd30 [ 616.904126][T18777] ? vfs_write+0x50c/0x770 [ 616.908528][T18777] ? __fget_light+0x21b/0x260 [ 616.913186][T18777] __se_sys_splice+0x2a6/0x390 [ 616.917928][T18777] __x64_sys_splice+0x74/0x80 [ 616.922589][T18777] do_syscall_64+0x4a/0x90 [ 616.927022][T18777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 616.932903][T18777] RIP: 0033:0x4665d9 [ 616.936774][T18777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.956363][T18777] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 616.964869][T18777] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 616.972816][T18777] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 616.980766][T18777] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 616.988713][T18777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 616.996674][T18777] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x2500) 11:40:47 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="070832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:47 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffdffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:47 executing program 0 (fault-call:4 fault-nth:42): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 617.109886][ T25] audit: type=1326 audit(1621683647.607:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18800 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 617.245727][T18810] loop5: detected capacity change from 0 to 264192 [ 617.254094][T18810] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 617.298931][T18815] FAULT_INJECTION: forcing a failure. [ 617.298931][T18815] name failslab, interval 1, probability 0, space 0, times 0 [ 617.311863][T18815] CPU: 1 PID: 18815 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 617.320617][T18815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.330673][T18815] Call Trace: [ 617.333978][T18815] dump_stack+0x137/0x19d [ 617.338400][T18815] should_fail+0x23c/0x250 [ 617.342812][T18815] ? mempool_alloc_slab+0x16/0x20 [ 617.347837][T18815] __should_failslab+0x81/0x90 [ 617.352733][T18815] should_failslab+0x5/0x20 [ 617.357384][T18815] kmem_cache_alloc+0x46/0x2f0 [ 617.362207][T18815] mempool_alloc_slab+0x16/0x20 [ 617.367097][T18815] ? mempool_free+0x130/0x130 [ 617.371835][T18815] mempool_alloc+0x8c/0x300 [ 617.376401][T18815] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 617.382541][T18815] ? __blk_mq_run_hw_queue+0xea/0x140 [ 617.387910][T18815] bio_clone_fast+0xa1/0x2b0 [ 617.392501][T18815] bio_split+0x9b/0x320 [ 617.396647][T18815] __blk_queue_split+0xab2/0xc50 [ 617.401650][T18815] blk_mq_submit_bio+0xd3/0xe90 [ 617.406496][T18815] submit_bio_noacct+0x6f2/0x7e0 [ 617.411427][T18815] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 617.416959][T18815] ? mempool_alloc+0x99/0x300 [ 617.421672][T18815] submit_bio+0x16d/0x2b0 [ 617.425989][T18815] ? bio_alloc_bioset+0x402/0x480 [ 617.431113][T18815] iomap_dio_bio_actor+0x91d/0xb50 [ 617.436218][T18815] iomap_dio_actor+0x26e/0x3b0 [ 617.440971][T18815] iomap_apply+0x1e2/0x400 [ 617.445362][T18815] __iomap_dio_rw+0x5af/0xad0 [ 617.450077][T18815] ? __iomap_dio_rw+0xad0/0xad0 [ 617.454901][T18815] iomap_dio_rw+0x30/0x70 [ 617.459376][T18815] ? ext4_file_write_iter+0x4e1/0x11d0 [ 617.464833][T18815] ext4_file_write_iter+0xa4f/0x11d0 [ 617.470147][T18815] ? ext4_file_write_iter+0x4e1/0x11d0 [ 617.475591][T18815] do_iter_readv_writev+0x2cb/0x360 [ 617.480883][T18815] do_iter_write+0x112/0x4c0 [ 617.485463][T18815] ? kcsan_setup_watchpoint+0x26e/0x470 [ 617.491019][T18815] vfs_iter_write+0x4c/0x70 [ 617.495515][T18815] iter_file_splice_write+0x40a/0x750 [ 617.500876][T18815] ? rw_verify_area+0xf0/0x250 [ 617.505619][T18815] ? splice_from_pipe+0xc0/0xc0 [ 617.510476][T18815] do_splice+0x9aa/0xd30 [ 617.514781][T18815] ? vfs_write+0x50c/0x770 [ 617.519194][T18815] ? __fget_light+0x21b/0x260 [ 617.523846][T18815] __se_sys_splice+0x2a6/0x390 [ 617.528620][T18815] __x64_sys_splice+0x74/0x80 [ 617.533333][T18815] do_syscall_64+0x4a/0x90 [ 617.537726][T18815] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 617.543659][T18815] RIP: 0033:0x4665d9 [ 617.547541][T18815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 617.567194][T18815] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 617.575589][T18815] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 617.583539][T18815] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 617.591557][T18815] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 617.599529][T18815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 617.607488][T18815] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 617.734206][T18810] loop5: detected capacity change from 0 to 264192 [ 617.741682][T18810] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x3f00) 11:40:48 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="080832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:48 executing program 0 (fault-call:4 fault-nth:43): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 617.938008][ T25] audit: type=1326 audit(1621683648.437:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18800 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 618.041296][ T25] audit: type=1326 audit(1621683648.537:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18856 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 618.203176][T18862] loop5: detected capacity change from 0 to 264192 [ 618.212101][T18863] FAULT_INJECTION: forcing a failure. [ 618.212101][T18863] name failslab, interval 1, probability 0, space 0, times 0 [ 618.224944][T18863] CPU: 1 PID: 18863 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 618.233687][T18863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.243724][T18863] Call Trace: [ 618.246997][T18863] dump_stack+0x137/0x19d [ 618.251322][T18863] should_fail+0x23c/0x250 [ 618.255731][T18863] ? mempool_alloc_slab+0x16/0x20 [ 618.260738][T18863] __should_failslab+0x81/0x90 [ 618.265497][T18863] should_failslab+0x5/0x20 [ 618.269989][T18863] kmem_cache_alloc+0x46/0x2f0 [ 618.274753][T18863] mempool_alloc_slab+0x16/0x20 [ 618.279654][T18863] ? mempool_free+0x130/0x130 [ 618.284319][T18863] mempool_alloc+0x8c/0x300 [ 618.288858][T18863] sg_pool_alloc+0x74/0x90 [ 618.293247][T18863] __sg_alloc_table+0xce/0x290 [ 618.297991][T18863] sg_alloc_table_chained+0xaf/0x140 [ 618.303292][T18863] ? sg_alloc_table_chained+0x140/0x140 [ 618.308876][T18863] scsi_alloc_sgtables+0x180/0x500 [ 618.313973][T18863] sd_init_command+0x935/0x15f0 [ 618.318883][T18863] scsi_queue_rq+0x10e0/0x15a0 [ 618.323646][T18863] blk_mq_dispatch_rq_list+0x628/0x10b0 [ 618.329190][T18863] ? deadline_remove_request+0x158/0x180 [ 618.334801][T18863] ? dd_dispatch_request+0x2e1/0x3d0 [ 618.340133][T18863] blk_mq_do_dispatch_sched+0x3cb/0x660 [ 618.345678][T18863] __blk_mq_sched_dispatch_requests+0x21e/0x2c0 [ 618.351945][T18863] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 618.358038][T18863] __blk_mq_run_hw_queue+0xbc/0x140 [ 618.363220][T18863] __blk_mq_delay_run_hw_queue+0x163/0x2f0 [ 618.369024][T18863] ? dd_insert_request+0x255/0x330 [ 618.374112][T18863] blk_mq_run_hw_queue+0x22c/0x250 [ 618.379226][T18863] ? dd_finish_request+0x10/0x10 [ 618.384190][T18863] blk_mq_sched_insert_requests+0x13f/0x200 [ 618.390071][T18863] blk_mq_flush_plug_list+0x2f5/0x3c0 [ 618.395437][T18863] blk_flush_plug_list+0x235/0x260 [ 618.400529][T18863] ? __blk_mq_alloc_request+0x270/0x290 [ 618.406168][T18863] blk_mq_submit_bio+0x68a/0xe90 [ 618.411106][T18863] submit_bio_noacct+0x6f2/0x7e0 [ 618.416043][T18863] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 618.421658][T18863] ? mempool_alloc+0x99/0x300 [ 618.426321][T18863] submit_bio+0x16d/0x2b0 [ 618.430716][T18863] ? bio_alloc_bioset+0x402/0x480 [ 618.435760][T18863] iomap_dio_bio_actor+0x91d/0xb50 [ 618.440965][T18863] iomap_dio_actor+0x26e/0x3b0 [ 618.445723][T18863] iomap_apply+0x1e2/0x400 [ 618.450278][T18863] __iomap_dio_rw+0x5af/0xad0 [ 618.455009][T18863] ? __iomap_dio_rw+0xad0/0xad0 [ 618.459871][T18863] iomap_dio_rw+0x30/0x70 [ 618.464180][T18863] ? ext4_file_write_iter+0x4e1/0x11d0 [ 618.469636][T18863] ext4_file_write_iter+0xa4f/0x11d0 [ 618.474903][T18863] ? ext4_file_write_iter+0x4e1/0x11d0 [ 618.480364][T18863] do_iter_readv_writev+0x2cb/0x360 [ 618.485544][T18863] do_iter_write+0x112/0x4c0 [ 618.490140][T18863] ? kcsan_setup_watchpoint+0x26e/0x470 [ 618.495736][T18863] vfs_iter_write+0x4c/0x70 [ 618.500225][T18863] iter_file_splice_write+0x40a/0x750 [ 618.505663][T18863] ? rw_verify_area+0xf0/0x250 [ 618.510478][T18863] ? splice_from_pipe+0xc0/0xc0 [ 618.515480][T18863] do_splice+0x9aa/0xd30 [ 618.519701][T18863] ? vfs_write+0x50c/0x770 [ 618.524093][T18863] ? __fget_light+0x21b/0x260 [ 618.528749][T18863] __se_sys_splice+0x2a6/0x390 [ 618.533489][T18863] __x64_sys_splice+0x74/0x80 [ 618.538146][T18863] do_syscall_64+0x4a/0x90 [ 618.542602][T18863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 618.548476][T18863] RIP: 0033:0x4665d9 [ 618.552388][T18863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 618.571975][T18863] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 618.580377][T18863] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 618.588325][T18863] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 618.596554][T18863] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 11:40:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 618.604506][T18863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 618.612459][T18863] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 [ 618.642273][T18862] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x4000) 11:40:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:49 executing program 0 (fault-call:4 fault-nth:44): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:49 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="090832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffbff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 618.867863][ T25] audit: type=1326 audit(1621683649.367:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18856 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 618.972243][ T25] audit: type=1326 audit(1621683649.467:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18905 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 619.155158][T18914] FAULT_INJECTION: forcing a failure. [ 619.155158][T18914] name failslab, interval 1, probability 0, space 0, times 0 [ 619.168039][T18914] CPU: 1 PID: 18914 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 619.176918][T18914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.186963][T18914] Call Trace: [ 619.190247][T18914] dump_stack+0x137/0x19d [ 619.194574][T18914] should_fail+0x23c/0x250 [ 619.197211][T18908] loop5: detected capacity change from 0 to 264192 [ 619.198978][T18914] ? mempool_alloc_slab+0x16/0x20 [ 619.210468][T18914] __should_failslab+0x81/0x90 [ 619.215241][T18914] should_failslab+0x5/0x20 [ 619.219729][T18914] kmem_cache_alloc+0x46/0x2f0 [ 619.224546][T18914] mempool_alloc_slab+0x16/0x20 [ 619.229381][T18914] ? mempool_free+0x130/0x130 [ 619.234038][T18914] mempool_alloc+0x8c/0x300 [ 619.238540][T18914] ? blk_mq_sched_dispatch_requests+0xe6/0x110 [ 619.244678][T18914] ? __blk_mq_run_hw_queue+0xea/0x140 [ 619.250028][T18914] bio_clone_fast+0xa1/0x2b0 [ 619.254601][T18914] bio_split+0x9b/0x320 [ 619.258762][T18914] __blk_queue_split+0xab2/0xc50 [ 619.263763][T18914] blk_mq_submit_bio+0xd3/0xe90 [ 619.268598][T18914] submit_bio_noacct+0x6f2/0x7e0 [ 619.273513][T18914] ? bio_iov_iter_get_pages+0xaa2/0xb50 [ 619.279036][T18914] ? mempool_alloc+0x99/0x300 [ 619.283725][T18914] submit_bio+0x16d/0x2b0 [ 619.288033][T18914] ? bio_alloc_bioset+0x402/0x480 [ 619.293044][T18914] iomap_dio_bio_actor+0x91d/0xb50 [ 619.298198][T18914] iomap_dio_actor+0x26e/0x3b0 [ 619.302940][T18914] iomap_apply+0x1e2/0x400 [ 619.307338][T18914] __iomap_dio_rw+0x5af/0xad0 [ 619.312069][T18914] ? __iomap_dio_rw+0xad0/0xad0 [ 619.316959][T18914] iomap_dio_rw+0x30/0x70 [ 619.321350][T18914] ? ext4_file_write_iter+0x4e1/0x11d0 [ 619.326976][T18914] ext4_file_write_iter+0xa4f/0x11d0 [ 619.332333][T18914] ? ext4_file_write_iter+0x4e1/0x11d0 [ 619.337789][T18914] do_iter_readv_writev+0x2cb/0x360 [ 619.342992][T18914] do_iter_write+0x112/0x4c0 [ 619.347565][T18914] ? kcsan_setup_watchpoint+0x26e/0x470 [ 619.353165][T18914] vfs_iter_write+0x4c/0x70 [ 619.357704][T18914] iter_file_splice_write+0x40a/0x750 [ 619.363061][T18914] ? rw_verify_area+0xf0/0x250 [ 619.367808][T18914] ? splice_from_pipe+0xc0/0xc0 [ 619.372639][T18914] do_splice+0x9aa/0xd30 [ 619.376862][T18914] ? vfs_write+0x50c/0x770 [ 619.381257][T18914] ? __fget_light+0x21b/0x260 [ 619.386013][T18914] __se_sys_splice+0x2a6/0x390 [ 619.390768][T18914] __x64_sys_splice+0x74/0x80 [ 619.395425][T18914] do_syscall_64+0x4a/0x90 [ 619.399822][T18914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 619.405710][T18914] RIP: 0033:0x4665d9 [ 619.409597][T18914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 619.429192][T18914] RSP: 002b:00007f7cff8b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 619.437606][T18914] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 619.445724][T18914] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 619.453825][T18914] RBP: 00007f7cff8b21d0 R08: 00000000088000cc R09: 0000000000000000 [ 619.461781][T18914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 619.469729][T18914] R13: 00007ffe4b124e8f R14: 00007f7cff8b2300 R15: 0000000000022000 11:40:50 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="0a0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 619.497898][T18908] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 619.647331][T18908] loop5: detected capacity change from 0 to 264192 [ 619.655735][T18908] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x4800) 11:40:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:50 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:50 executing program 0 (fault-call:4 fault-nth:45): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:50 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="0b0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 619.795087][ T25] audit: type=1326 audit(1621683650.287:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18905 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:50 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 619.902814][ T25] audit: type=1326 audit(1621683650.397:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18950 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:50 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 620.033752][T18962] loop5: detected capacity change from 0 to 264192 11:40:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 620.075354][T18962] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 620.239437][T18962] loop5: detected capacity change from 0 to 264192 [ 620.263550][T18962] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x4c00) 11:40:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:51 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="0c0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:51 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x8804000, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 620.730857][ T25] audit: type=1326 audit(1621683651.227:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18950 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 621.052739][T19017] loop5: detected capacity change from 0 to 264192 [ 621.060967][T19017] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 621.175128][T19017] loop5: detected capacity change from 0 to 264192 [ 621.182412][T19017] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x6800) 11:40:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:52 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="0d0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffdff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 621.641186][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 621.641195][ T25] audit: type=1326 audit(1621683652.137:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19008 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 621.762537][ T25] audit: type=1326 audit(1621683652.247:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19072 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x2) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x3) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 621.954997][T19068] loop5: detected capacity change from 0 to 264192 [ 621.969010][T19068] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 622.147522][T19068] loop5: detected capacity change from 0 to 264192 [ 622.155096][T19068] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 622.584631][ T25] audit: type=1326 audit(1621683653.077:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19072 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x6c00) 11:40:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:53 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="0e0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x4) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 622.668509][ T25] audit: type=1326 audit(1621683653.167:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19122 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 622.845363][T19134] loop5: detected capacity change from 0 to 264192 [ 622.856611][T19134] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 623.038010][T19134] loop5: detected capacity change from 0 to 264192 [ 623.045047][T19134] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x7400) 11:40:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:54 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x5) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:54 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="0f0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 623.495531][ T25] audit: type=1326 audit(1621683653.987:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19122 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 623.604941][ T25] audit: type=1326 audit(1621683654.097:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19183 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:54 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x6) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 623.828848][T19186] loop5: detected capacity change from 0 to 264192 [ 623.847353][T19186] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 623.954986][T19186] loop5: detected capacity change from 0 to 264192 11:40:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x7a00) 11:40:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:54 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x7) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:54 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="100832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffff97, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 624.430180][ T25] audit: type=1326 audit(1621683654.928:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19183 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 624.542056][T19239] ================================================================== [ 624.550169][T19239] BUG: KCSAN: data-race in __se_sys_perf_event_open / find_get_context [ 624.558662][T19239] [ 624.560998][T19239] write to 0xffff888237c2d520 of 4 bytes by task 19240 on cpu 1: [ 624.568693][T19239] find_get_context+0x310/0x5c0 [ 624.573528][T19239] __se_sys_perf_event_open+0x85e/0x2740 [ 624.579158][T19239] __x64_sys_perf_event_open+0x63/0x70 [ 624.584594][T19239] do_syscall_64+0x4a/0x90 [ 624.588993][T19239] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 624.594869][T19239] [ 624.597169][T19239] read to 0xffff888237c2d520 of 4 bytes by task 19239 on cpu 0: [ 624.604773][T19239] __se_sys_perf_event_open+0x1be2/0x2740 [ 624.610475][T19239] __x64_sys_perf_event_open+0x63/0x70 [ 624.615911][T19239] do_syscall_64+0x4a/0x90 [ 624.620307][T19239] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 624.626182][T19239] [ 624.628486][T19239] Reported by Kernel Concurrency Sanitizer on: 11:40:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 624.634611][T19239] CPU: 0 PID: 19239 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 624.643350][T19239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.653387][T19239] ================================================================== [ 624.668927][ T25] audit: type=1326 audit(1621683655.168:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x8e00) 11:40:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:55 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x8) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 624.787626][ T25] audit: type=1326 audit(1621683655.288:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19250 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5a02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 624.828418][T19237] loop5: detected capacity change from 0 to 264192 [ 624.844846][T19237] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffffffda, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 624.966963][T19237] loop5: detected capacity change from 0 to 264192 [ 624.974046][T19237] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:55 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="110832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 625.194515][T19286] loop5: detected capacity change from 0 to 264192 [ 625.201825][T19286] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 625.291016][T19286] loop5: detected capacity change from 0 to 264192 [ 625.301169][T19286] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 625.613607][ T25] audit: type=1326 audit(1621683656.108:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19250 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xb003) 11:40:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x9) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffff0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:56 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="120832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb301, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 625.906710][T19320] loop5: detected capacity change from 0 to 264192 [ 625.917535][T19320] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 626.073476][T19320] loop5: detected capacity change from 0 to 264192 [ 626.080932][T19320] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xc07f) 11:40:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0xc) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:57 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="1b0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffff4, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 626.658138][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 626.658150][ T25] audit: type=1326 audit(1621683657.158:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19375 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 626.785621][T19377] loop5: detected capacity change from 0 to 264192 [ 626.793386][T19377] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 626.954983][T19377] loop5: detected capacity change from 0 to 264192 [ 626.962007][T19377] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 627.475181][ T25] audit: type=1326 audit(1621683657.968:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19375 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xc602) 11:40:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0xd) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:58 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="640832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 627.564318][ T25] audit: type=1326 audit(1621683658.058:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19426 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 627.740366][T19429] loop5: detected capacity change from 0 to 264192 [ 627.759909][T19429] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 627.860284][T19429] loop5: detected capacity change from 0 to 264192 [ 627.872129][T19429] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:40:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xf07f) 11:40:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0xe) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:58 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="fe0832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffffb, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 628.393955][ T25] audit: type=1326 audit(1621683658.888:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19426 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 628.471407][ T25] audit: type=1326 audit(1621683658.968:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19472 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0xf) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 628.676737][T19482] loop5: detected capacity change from 0 to 264192 [ 628.689686][T19482] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 628.800878][T19482] loop5: detected capacity change from 0 to 264192 11:40:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xf803) 11:40:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:59 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040232090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:40:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x10) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:40:59 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffffd, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 629.301145][ T25] audit: type=1326 audit(1621683659.798:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19472 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 629.382900][ T25] audit: type=1326 audit(1621683659.878:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19531 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:40:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:40:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 629.542905][T19538] loop5: detected capacity change from 0 to 264192 [ 629.568678][T19538] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 630.208896][ T25] audit: type=1326 audit(1621683660.709:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19531 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xfc7f) 11:41:00 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x12) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040332090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:00 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 630.310557][ T25] audit: type=1326 audit(1621683660.809:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19581 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:00 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x6d) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 630.524585][T19587] loop5: detected capacity change from 0 to 264192 [ 630.538630][T19587] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:41:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0xff7f) 11:41:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5a020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x6e) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:01 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040432090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:01 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x8000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 631.134682][ T25] audit: type=1326 audit(1621683661.629:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19581 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x6f) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 631.369169][T19639] loop5: detected capacity change from 0 to 264192 [ 631.386702][T19639] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:41:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x30000) 11:41:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:02 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040532090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x74) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:02 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 632.042524][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 632.042533][ T25] audit: type=1326 audit(1621683662.539:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19631 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa4010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 632.124420][ T25] audit: type=1326 audit(1621683662.619:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19678 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb3010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x77) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 632.308229][T19687] loop5: detected capacity change from 0 to 264192 [ 632.322561][T19687] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 632.408913][T19687] loop5: detected capacity change from 0 to 264192 [ 632.416239][T19687] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:41:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x50000) 11:41:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x23000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 632.950590][ T25] audit: type=1326 audit(1621683663.449:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19678 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x78) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:03 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:03 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040632090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 633.037112][ T25] audit: type=1326 audit(1621683663.539:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19734 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x79) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 633.263964][T19739] loop5: detected capacity change from 0 to 264192 [ 633.278924][T19739] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 633.380138][T19739] loop5: detected capacity change from 0 to 264192 [ 633.390094][T19739] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 633.863568][ T25] audit: type=1326 audit(1621683664.359:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19734 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x5}, {0x3d}, {0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x100000) 11:41:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x7a) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:41:04 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040732090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:04 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0xfffffffffffffec4}, {&(0x7f0000000180)="db007d4cac17699261781cfa155b81d1f4c8979a63ceb20e010df6133f1ccdbc3f9c316d9e07e7754f05f2ef05362e607273bacf509b847edc0ebea048fc20e54229e7df6df7c885f3bace7a034625444445670de8142a261ec485c173aa7f9bd7e8880b6c771342f845", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@dots}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 11:41:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 633.958361][ T25] audit: type=1326 audit(1621683664.459:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19788 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 11:41:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1001, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:41:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) set_mempolicy(0x2, &(0x7f0000000100)=0x7ff, 0x9) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x281) fcntl$setpipe(r1, 0x407, 0x20ffffd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 634.173329][T19795] loop5: detected capacity change from 0 to 264192 [ 634.191310][T19795] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)