0\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000700)={0x124, r4, 0x912, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x10004004) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00') ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000300)) [ 166.050356][ T8519] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 166.080066][ T8519] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 166.112405][ T8522] overlayfs: missing 'lowerdir' 21:08:48 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:48 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xa8, 0x0, 0x9, 0x101, 0x0, 0x0, {0x4, 0x0, 0x5}, [@NFCTH_TUPLE={0x5c, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x687782b9fbe537c5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_STATUS={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xffff}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40800}, 0x4000040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) timerfd_create(0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000200)={{0xffffff92}, {0xe0}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 21:08:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="01002abd7000fddbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b002000000006001600000200000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b00ff030000060016005e7700000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000300000006001600000800000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000400000008000b000000000006001600008000000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000100000006001600040000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000600000006002d000104000005001200000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000008000b007fffffff06001600000400000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b0002000000060016001f0000000500120000000000"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000700)={0x124, r4, 0x912, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x10004004) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00') ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000300)) 21:08:48 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x48, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x546, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), r4, 0x0, 0x2, 0x4}}, 0x20) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r2, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x1) [ 166.342304][ T8542] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 166.359636][ T8540] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 166.369612][ T8544] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 21:08:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="01002abd7000fddbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b002000000006001600000200000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b00ff030000060016005e7700000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000300000006001600000800000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000400000008000b000000000006001600008000000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000100000006001600040000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000600000006002d000104000005001200000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000008000b007fffffff06001600000400000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b0002000000060016001f0000000500120000000000"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000700)={0x124, r4, 0x912, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x10004004) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00') 21:08:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 166.452023][ T8542] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:48 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:08:48 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 21:08:48 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x202600, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xd, r0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/protocols\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x274a03, 0x0) sendfile(r2, r1, 0x0, 0x20000000000000d8) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000340)=0x1c, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f00000001c0)={0x3, 0x101, 0x0, 0x1, 0x0, [0x0, 0x400, 0x1, 0x9], [0x9450, 0x0, 0x6, 0x1], [0x4, 0xfffffffe, 0x4], [0x0, 0x8, 0x96c, 0x7]}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x35b) r3 = timerfd_create(0x0, 0x0) timerfd_settime(r3, 0x3, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 21:08:48 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:08:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000700)={0x124, r4, 0x912, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x10004004) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 21:08:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 166.638472][ T8568] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:48 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:08:48 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:08:48 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 166.914994][ T8593] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 167.292239][ T29] audit: type=1800 audit(1594501729.418:2): pid=8551 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=15789 res=0 21:08:49 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8001, 0x28001) unshare(0x20000400) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x802c550a, 0x0) 21:08:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="01002abd7000fddbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b002000000006001600000200000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b00ff030000060016005e7700000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000300000006001600000800000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000400000008000b000000000006001600008000000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000100000006001600040000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000600000006002d000104000005001200000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000008000b007fffffff06001600000400000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b0002000000060016001f0000000500120000000000"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000700)={0x124, r4, 0x912, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x10004004) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r7) 21:08:49 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) setfsuid(0x0) 21:08:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:49 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 21:08:49 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 21:08:49 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) setfsuid(0x0) [ 167.491222][ T8615] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:49 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0xa) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x40) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r5, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r0, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2000000080000001, 0x5) 21:08:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="01002abd7000fddbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b002000000006001600000200000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b00ff030000060016005e7700000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000300000006001600000800000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000400000008000b000000000006001600008000000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000100000006001600040000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000600000006002d000104000005001200000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000008000b007fffffff06001600000400000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b0002000000060016001f0000000500120000000000"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000700)={0x124, r4, 0x912, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x10004004) socket$inet_icmp_raw(0x2, 0x3, 0x1) 21:08:49 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 167.637100][ T8622] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:49 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 167.730345][ T8640] FAT-fs (loop5): bogus number of reserved sectors [ 167.743888][ T8640] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000700)={0x124, r4, 0x912, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x10004004) 21:08:49 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 21:08:49 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) setfsuid(0x0) 21:08:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 167.857673][ T8648] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 [ 167.879028][ T8651] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 21:08:50 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 167.960553][ T8661] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 21:08:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:50 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 168.070282][ T8665] FAT-fs (loop5): bogus number of reserved sectors [ 168.080932][ T8665] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:50 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 21:08:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) dup(0xffffffffffffffff) [ 168.195018][ T8680] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 168.259071][ T8684] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 168.268332][ T8692] FAT-fs (loop5): bogus number of reserved sectors [ 168.274867][ T8692] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:50 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) [ 168.310212][ T8688] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 21:08:50 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="5ad8fb8b26261b5d740d63781a84541bd16c6e2b817e6e0470d3363f0002e839f92630084b957919a7f8f2d1ea98f2ea433f708d8621", @ANYRES16=r5, @ANYBLOB="000225bd7000fddbdf250300000008000800ac14142208000800ac141432"], 0x24}}, 0x20000001) 21:08:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:50 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 168.508522][ T8708] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) 21:08:50 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 168.599139][ T8718] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 168.612350][ T8725] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 21:08:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') 21:08:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:50 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 168.657834][ T8722] FAT-fs (loop5): bogus number of reserved sectors [ 168.670379][ T8722] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:50 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) [ 168.722874][ T8735] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:51 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:51 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 168.880761][ T8747] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:51 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 168.972953][ T8750] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 [ 168.995693][ T8756] FAT-fs (loop5): bogus number of reserved sectors [ 169.010252][ T8755] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 21:08:51 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 169.012534][ T8756] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:51 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 21:08:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:51 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) 21:08:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r4, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0xc0}, 0x20040014) 21:08:51 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x430, 0x3f4, 0x8, 0x70bd2b, 0x25dfdbfe, {0x3, 0x0, 0x1a, [0x5, 0x14000, 0x6, 0x9, 0x8614, 0x5, 0x4, 0x6, 0x0, 0x7fffffff, 0x6c2, 0xe9, 0x5, 0x8, 0x8001, 0x400, 0xfffffb98, 0x6, 0x2, 0x100, 0x55c, 0xfff, 0x7, 0x80000000, 0x100, 0x131, 0xfffffff9, 0x81, 0x77c, 0x2, 0x200, 0x6f, 0xfffffffa, 0x80000000, 0x8, 0x7fffffff, 0x400, 0xfcc, 0x4, 0x6d335cc0, 0x8, 0x3, 0x3, 0x9, 0x6, 0x7fff, 0x100, 0x1, 0x9, 0x76ae, 0xb3bd, 0x6, 0x1, 0x800, 0x101, 0xffffc8b4, 0x7, 0x1, 0x3, 0x5, 0x1, 0xaa5, 0x5, 0xfff], [0x0, 0x401, 0x6, 0x40, 0x6, 0x3, 0x4, 0x74, 0x2, 0x1, 0x1, 0x5, 0x1000, 0x9, 0x8, 0x0, 0xf20, 0x4, 0x80000, 0x3, 0x80, 0x7f6, 0x400, 0x81, 0x80000001, 0x0, 0xdf31, 0x9, 0x40, 0x6dc, 0xfffffffd, 0x1, 0x2, 0x97e, 0x7, 0x489, 0x9, 0x9, 0xfac9, 0xd1a8, 0x7, 0xfffff800, 0x4910000, 0x5, 0x1, 0x7, 0x3f, 0x8, 0x9, 0xc8, 0xdbd, 0x5, 0x30, 0xfffff77b, 0x20, 0x1, 0x3, 0x1, 0x0, 0x400, 0x1, 0x8, 0x7fffffff, 0x8], [0x4, 0x81, 0x1, 0xea, 0x10001, 0x6, 0x401, 0x0, 0x3, 0x5, 0x9, 0x1, 0x4, 0xfffffc01, 0x3f, 0x5, 0x9, 0x16e, 0x1, 0x4, 0x2, 0x3, 0x5, 0x3, 0x6, 0x4, 0x800, 0x4, 0xa2a, 0x80000001, 0x2, 0x5, 0x6, 0x8, 0x3, 0x9, 0xc701, 0x4, 0x4996, 0x5, 0x7, 0x10001, 0x3f, 0x7, 0xc577, 0xffff, 0x3ff, 0x2fe, 0x1000, 0x5, 0x2, 0x3, 0x7, 0x10000, 0x6, 0x10001, 0x2, 0x1f, 0x0, 0x7ff, 0x100, 0x0, 0x7fff, 0x4], [0x3ff, 0x4640, 0x6, 0x9, 0x9, 0xfffffc00, 0x1d, 0x7, 0x9, 0x3, 0x2, 0x7, 0x1, 0x1b1f, 0x8, 0x7ff, 0x2, 0x81, 0xb009, 0x2, 0x0, 0x5, 0xd3, 0x57d, 0x8, 0xa0e1, 0x1, 0x0, 0x2, 0x5846, 0x1, 0x8, 0x0, 0xfffffff9, 0x3, 0xfffffff7, 0x8000, 0x4, 0x10000, 0x6e9, 0x0, 0x4, 0x5, 0x7, 0x1ff, 0x6, 0x7, 0xcf, 0x8, 0x8, 0x362, 0x9, 0x3, 0x4, 0x8, 0x3f, 0x27, 0x2, 0x7ff, 0x1, 0xff, 0x80000001, 0x9, 0xffff], 0xf, ['.\x00', '!-\x00', '(\x00', 'overlay\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c801) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 169.212744][ T8766] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 169.245715][ T8778] xt_check_target: 29 callbacks suppressed [ 169.245725][ T8778] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:51 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:51 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) [ 169.292410][ T8778] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 [ 169.311714][ T8785] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r3, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:51 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 169.375886][ T8787] FAT-fs (loop5): bogus number of reserved sectors [ 169.386248][ T8787] FAT-fs (loop5): Can't find a valid FAT filesystem [ 169.394099][ T8794] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 169.415202][ T8795] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:51 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) 21:08:51 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 169.432980][ T8793] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:51 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 169.491481][ T8794] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 169.507955][ T8802] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 169.524620][ T8804] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:51 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 169.595761][ T8802] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 [ 169.603048][ T8815] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 169.634508][ T8815] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 169.644516][ T8818] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 169.669404][ T8820] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 169.686227][ T8817] FAT-fs (loop5): bogus number of reserved sectors 21:08:51 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 21:08:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 169.701035][ T8818] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 [ 169.714497][ T8817] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:51 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:51 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:51 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:52 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r2, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:52 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r2, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 169.906383][ T8833] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 21:08:52 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:52 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 170.008250][ T8847] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:52 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 170.089826][ T8857] FAT-fs (loop5): bogus number of reserved sectors [ 170.100572][ T8857] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:52 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:52 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r2, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 170.213262][ T8868] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 170.231835][ T8863] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop3 21:08:52 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:52 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) 21:08:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r2, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:52 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:52 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 170.429036][ T8881] FAT-fs (loop5): bogus number of reserved sectors [ 170.436461][ T8878] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 [ 170.462197][ T8881] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:52 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:52 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 21:08:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000840)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}, {0x6, 0x84, 0x40, 0x9}]}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r2, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:52 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:52 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) [ 170.736356][ T8901] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 170.757782][ T8903] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:52 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:53 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:53 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) [ 170.859943][ T8913] FAT-fs (loop5): bogus number of reserved sectors [ 170.883616][ T8913] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:53 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) 21:08:53 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 171.041827][ T8929] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 [ 171.056323][ T8941] FAT-fs (loop5): bogus number of reserved sectors [ 171.056810][ T8930] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 171.063846][ T8941] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:53 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:53 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:53 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:53 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:08:53 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 171.224971][ T8959] FAT-fs (loop5): bogus number of reserved sectors [ 171.231669][ T8959] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:08:53 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 171.373454][ T8972] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 [ 171.399897][ T8974] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:53 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 171.424088][ T8979] FAT-fs (loop5): bogus number of reserved sectors [ 171.443507][ T8979] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:53 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:53 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:53 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 171.627441][ T9001] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 171.632986][ T8998] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:53 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:53 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:08:53 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:53 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 171.798885][ T9012] FAT-fs (loop5): bogus number of reserved sectors [ 171.815055][ T9012] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:08:54 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="040000090000000066617400", 0xc}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) [ 171.873454][ T9022] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 171.960157][ T9028] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 21:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) 21:08:54 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:54 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:54 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 172.098712][ T9039] FAT-fs (loop5): bogus number of reserved sectors 21:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) [ 172.153783][ T9048] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop4 [ 172.153799][ T9039] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) 21:08:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:54 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="040000090000000066617400", 0xc}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 172.300899][ T9051] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:54 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) 21:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 21:08:54 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) [ 172.413296][ T9073] FAT-fs (loop5): bogus number of reserved sectors [ 172.420515][ T9066] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 172.431999][ T9073] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 21:08:54 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:54 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="040000090000000066617400", 0xc}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 172.547667][ T9084] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) 21:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 21:08:54 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 172.642417][ T9096] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) [ 172.694058][ T9103] FAT-fs (loop5): bogus number of reserved sectors [ 172.701192][ T9103] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:54 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:54 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 172.806970][ T9111] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:55 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) [ 172.871639][ T9124] FAT-fs (loop5): invalid media value (0x00) [ 172.877826][ T9124] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:55 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) 21:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:08:55 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 173.041363][ T9130] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) 21:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:08:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 173.135006][ T9144] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 173.142850][ T9143] FAT-fs (loop5): invalid media value (0x00) [ 173.150176][ T9143] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) 21:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:55 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:55 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 173.289334][ T9160] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) 21:08:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) 21:08:55 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r3) [ 173.470958][ T9174] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 173.484903][ T9181] FAT-fs (loop5): invalid media value (0x00) 21:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) 21:08:55 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @private=0xa010100}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 173.544902][ T9181] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:55 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r3) 21:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) 21:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x0, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 173.704647][ T9199] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 173.738467][ T9207] FAT-fs (loop5): invalid media value (0x00) [ 173.751684][ T9207] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) 21:08:56 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:56 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r3) 21:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x0, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:56 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) 21:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x0, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 174.082973][ T9233] FAT-fs (loop5): invalid media value (0x00) [ 174.090652][ T9228] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:56 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x45}}, 0x14}}, 0x0) [ 174.182909][ T9233] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 174.339850][ T9260] xt_check_target: 56 callbacks suppressed [ 174.339856][ T9260] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:56 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:56 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x45}}, 0x14}}, 0x0) 21:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) 21:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) 21:08:56 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 174.454156][ T9272] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 174.460608][ T9273] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x45}}, 0x14}}, 0x0) 21:08:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 174.560448][ T9272] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) 21:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 174.616971][ T9276] FAT-fs (loop5): invalid media value (0x00) [ 174.623012][ T9276] FAT-fs (loop5): Can't find a valid FAT filesystem [ 174.638755][ T9280] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:56 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:56 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 174.778158][ T9296] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 21:08:56 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) [ 174.911901][ T9307] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 174.928992][ T9304] FAT-fs (loop5): bogus number of FAT sectors [ 174.936955][ T9312] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 174.945102][ T9304] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:57 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) 21:08:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:57 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x1}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 175.130776][ T9328] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:57 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f900000000"]}, 0x1eb) 21:08:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) 21:08:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) [ 175.268493][ T9341] FAT-fs (loop5): bogus number of FAT sectors [ 175.282332][ T9344] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 175.293933][ T9340] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 175.305292][ T9341] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) [ 175.378868][ T9356] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) 21:08:57 executing program 0: r0 = socket$unix(0x1, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 175.478728][ T9363] FAT-fs (loop5): bogus number of FAT sectors [ 175.487962][ T9363] FAT-fs (loop5): Can't find a valid FAT filesystem 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) 21:08:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) 21:08:57 executing program 0: r0 = socket$unix(0x1, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 175.559447][ T9372] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 175.569844][ T9377] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) [ 175.658773][ T9377] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:08:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) 21:08:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:57 executing program 0: r0 = socket$unix(0x1, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) 21:08:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) 21:08:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) 21:08:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) [ 176.028562][ T9400] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:08:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) 21:08:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)) 21:08:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) [ 176.363522][ T9429] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:08:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) 21:08:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) 21:08:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:08:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)) 21:08:58 executing program 0: socket$unix(0x1, 0x1, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) 21:08:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:59 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)) 21:08:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) [ 176.869218][ T9471] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:08:59 executing program 0: socket$unix(0x1, 0x1, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 177.022590][ T9477] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:08:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:08:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:59 executing program 0: socket$unix(0x1, 0x1, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:08:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 177.178677][ T9492] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:08:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:08:59 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:08:59 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:08:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 177.301259][ T9506] FAULT_INJECTION: forcing a failure. [ 177.301259][ T9506] name failslab, interval 1, probability 0, space 0, times 1 [ 177.314236][ T9506] CPU: 0 PID: 9506 Comm: syz-executor.3 Not tainted 5.8.0-rc4-syzkaller #0 [ 177.322848][ T9506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.332894][ T9506] Call Trace: [ 177.336183][ T9506] dump_stack+0x1f0/0x31e [ 177.340505][ T9506] should_fail+0x38a/0x4e0 [ 177.344902][ T9506] should_failslab+0x5/0x20 [ 177.349384][ T9506] kmem_cache_alloc_node_trace+0x69/0x2b0 [ 177.355079][ T9506] ? __get_vm_area_node+0x1ac/0x380 [ 177.360258][ T9506] __get_vm_area_node+0x1ac/0x380 [ 177.365291][ T9506] __vmalloc_node_range+0xe8/0x870 [ 177.370377][ T9506] ? do_replace+0x1b0/0x420 [ 177.374943][ T9506] ? __might_fault+0xf5/0x150 [ 177.379596][ T9506] ? do_replace+0x1b0/0x420 [ 177.384074][ T9506] __vmalloc+0x75/0x80 [ 177.388117][ T9506] ? do_replace+0x1b0/0x420 [ 177.392594][ T9506] do_replace+0x1b0/0x420 [ 177.396905][ T9506] do_ebt_set_ctl+0xf0/0x1b0 [ 177.401470][ T9506] ? nf_setsockopt+0x271/0x2e0 [ 177.406210][ T9506] ? __mutex_unlock_slowpath+0x12d/0x590 [ 177.411818][ T9506] ? __fget_files+0x388/0x3c0 [ 177.416489][ T9506] nf_setsockopt+0x2be/0x2e0 [ 177.421061][ T9506] ? sock_common_recvmsg+0x190/0x190 [ 177.426321][ T9506] __sys_setsockopt+0x564/0x710 [ 177.431159][ T9506] __x64_sys_setsockopt+0xb1/0xc0 [ 177.436161][ T9506] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.442205][ T9506] do_syscall_64+0x73/0xe0 [ 177.446597][ T9506] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.452484][ T9506] RIP: 0033:0x45cba9 [ 177.456351][ T9506] Code: Bad RIP value. [ 177.460477][ T9506] RSP: 002b:00007f58e4212c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 177.468869][ T9506] RAX: ffffffffffffffda RBX: 0000000000504600 RCX: 000000000045cba9 [ 177.476817][ T9506] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 177.484768][ T9506] RBP: 000000000078bf00 R08: 0000000000000220 R09: 0000000000000000 [ 177.492715][ T9506] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000004 [ 177.500664][ T9506] R13: 0000000000000aa4 R14: 00000000004cd734 R15: 00007f58e42136d4 [ 177.527752][ T9506] syz-executor.3: vmalloc: allocation failure: 256 bytes, mode:0x400cc0(GFP_KERNEL_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 177.541915][ T9506] CPU: 0 PID: 9506 Comm: syz-executor.3 Not tainted 5.8.0-rc4-syzkaller #0 [ 177.550588][ T9506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.560650][ T9506] Call Trace: [ 177.564013][ T9506] dump_stack+0x1f0/0x31e [ 177.568324][ T9506] warn_alloc+0x17d/0x2c0 [ 177.572657][ T9506] ? __get_vm_area_node+0x1bf/0x380 [ 177.577849][ T9506] __vmalloc_node_range+0x29a/0x870 [ 177.583035][ T9506] ? __might_fault+0xf5/0x150 [ 177.587725][ T9506] ? do_replace+0x1b0/0x420 [ 177.592217][ T9506] __vmalloc+0x75/0x80 [ 177.596282][ T9506] ? do_replace+0x1b0/0x420 [ 177.600758][ T9506] do_replace+0x1b0/0x420 [ 177.605076][ T9506] do_ebt_set_ctl+0xf0/0x1b0 [ 177.609641][ T9506] ? nf_setsockopt+0x271/0x2e0 [ 177.614389][ T9506] ? __mutex_unlock_slowpath+0x12d/0x590 [ 177.619995][ T9506] ? __fget_files+0x388/0x3c0 [ 177.624693][ T9506] nf_setsockopt+0x2be/0x2e0 [ 177.629271][ T9506] ? sock_common_recvmsg+0x190/0x190 [ 177.634537][ T9506] __sys_setsockopt+0x564/0x710 [ 177.639375][ T9506] __x64_sys_setsockopt+0xb1/0xc0 [ 177.644377][ T9506] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.650424][ T9506] do_syscall_64+0x73/0xe0 [ 177.654900][ T9506] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.660787][ T9506] RIP: 0033:0x45cba9 [ 177.664819][ T9506] Code: Bad RIP value. [ 177.668874][ T9506] RSP: 002b:00007f58e4212c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 177.677267][ T9506] RAX: ffffffffffffffda RBX: 0000000000504600 RCX: 000000000045cba9 [ 177.685227][ T9506] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 177.693180][ T9506] RBP: 000000000078bf00 R08: 0000000000000220 R09: 0000000000000000 [ 177.701250][ T9506] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000004 [ 177.709226][ T9506] R13: 0000000000000aa4 R14: 00000000004cd734 R15: 00007f58e42136d4 [ 177.722228][ T9506] Mem-Info: [ 177.738026][ T9506] active_anon:162379 inactive_anon:4162 isolated_anon:0 [ 177.738026][ T9506] active_file:6013 inactive_file:40274 isolated_file:0 21:08:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:08:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 177.738026][ T9506] unevictable:0 dirty:118 writeback:0 [ 177.738026][ T9506] slab_reclaimable:19866 slab_unreclaimable:106722 [ 177.738026][ T9506] mapped:59824 shmem:4386 pagetables:1233 bounce:0 [ 177.738026][ T9506] free:1174804 free_pcp:500 free_cma:0 [ 177.780917][ T9512] FAULT_INJECTION: forcing a failure. [ 177.780917][ T9512] name failslab, interval 1, probability 0, space 0, times 0 21:08:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:09:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 177.893438][ T9512] CPU: 1 PID: 9512 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 177.902074][ T9512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.912144][ T9512] Call Trace: [ 177.915459][ T9512] dump_stack+0x1f0/0x31e [ 177.919797][ T9512] should_fail+0x38a/0x4e0 [ 177.924222][ T9512] ? __se_sys_memfd_create+0xfb/0x490 [ 177.929613][ T9512] should_failslab+0x5/0x20 [ 177.934125][ T9512] __kmalloc+0x74/0x330 [ 177.938384][ T9512] ? strnlen_user+0x206/0x2c0 [ 177.943065][ T9512] __se_sys_memfd_create+0xfb/0x490 [ 177.946675][ T9506] Node 0 active_anon:653712kB inactive_anon:16648kB active_file:23904kB inactive_file:161096kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:239396kB dirty:468kB writeback:0kB shmem:17544kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 393216kB writeback_tmp:0kB all_unreclaimable? no [ 177.948355][ T9512] ? do_syscall_64+0x22/0xe0 [ 177.948371][ T9512] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.948381][ T9512] do_syscall_64+0x73/0xe0 [ 177.948393][ T9512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.948402][ T9512] RIP: 0033:0x45cba9 [ 177.948410][ T9512] Code: Bad RIP value. [ 178.007021][ T9512] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 178.015437][ T9512] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cba9 [ 178.023801][ T9512] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 178.031797][ T9512] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 178.039847][ T9512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 178.047813][ T9512] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 178.061743][ T9518] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 178.082060][ T9506] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB all_unreclaimable? no [ 178.108740][ T9506] Node 0 DMA free:15904kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 21:09:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:00 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 178.140683][ T9506] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 178.159468][ T9506] Node 0 DMA32 free:919684kB min:36108kB low:45132kB high:54156kB reserved_highatomic:0KB active_anon:649444kB inactive_anon:16548kB active_file:23888kB inactive_file:161096kB unevictable:0kB writepending:468kB present:3129332kB managed:2600972kB mlocked:0kB kernel_stack:14448kB pagetables:4780kB bounce:0kB free_pcp:2100kB local_pcp:1388kB free_cma:0kB 21:09:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 178.250984][ T9539] FAULT_INJECTION: forcing a failure. [ 178.250984][ T9539] name failslab, interval 1, probability 0, space 0, times 0 [ 178.298977][ T9541] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 178.312233][ T9539] CPU: 0 PID: 9539 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 178.320851][ T9539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.328110][ T9506] lowmem_reserve[]: 0 0 0 0 0 [ 178.330900][ T9539] Call Trace: [ 178.330919][ T9539] dump_stack+0x1f0/0x31e [ 178.330931][ T9539] should_fail+0x38a/0x4e0 [ 178.330949][ T9539] ? shmem_alloc_inode+0x17/0x40 [ 178.335767][ T9506] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:16kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:16kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 178.338899][ T9539] should_failslab+0x5/0x20 [ 178.338910][ T9539] kmem_cache_alloc+0x53/0x2d0 [ 178.338923][ T9539] ? shmem_match+0x150/0x150 [ 178.338937][ T9539] shmem_alloc_inode+0x17/0x40 [ 178.343335][ T9506] lowmem_reserve[]: 0 0 0 0 0 [ 178.347657][ T9539] ? shmem_match+0x150/0x150 [ 178.347667][ T9539] new_inode_pseudo+0x64/0x240 [ 178.347679][ T9539] new_inode+0x25/0x1d0 [ 178.347691][ T9539] shmem_get_inode+0x10e/0x6f0 [ 178.347703][ T9539] ? _raw_spin_unlock+0x24/0x40 [ 178.347720][ T9539] __shmem_file_setup+0x11e/0x270 [ 178.352727][ T9506] Node 1 Normal free:3762692kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 178.380834][ T9539] __se_sys_memfd_create+0x25e/0x490 [ 178.380845][ T9539] ? do_syscall_64+0x22/0xe0 [ 178.380857][ T9539] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.380866][ T9539] do_syscall_64+0x73/0xe0 [ 178.380875][ T9539] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.380884][ T9539] RIP: 0033:0x45cba9 [ 178.380888][ T9539] Code: Bad RIP value. [ 178.380893][ T9539] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 178.380906][ T9539] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cba9 [ 178.385459][ T9506] lowmem_reserve[]: 0 0 0 0 0 [ 178.390122][ T9539] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 178.390127][ T9539] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 178.390133][ T9539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 178.390138][ T9539] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 178.553120][ T9506] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 178.568162][ T9506] Node 0 DMA32: 9221*4kB (UME) 161*8kB (UME) 209*16kB (UME) 143*32kB (UME) 66*64kB (UME) 15*128kB (UME) 10*256kB (ME) 7*512kB (ME) 4*1024kB (UM) 5*2048kB (UME) 207*4096kB (M) = 920588kB [ 178.587229][ T9506] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 178.599267][ T9506] Node 1 Normal: 97*4kB (UME) 200*8kB (UM) 190*16kB (UME) 89*32kB (UME) 37*64kB (UME) 20*128kB (UME) 6*256kB (UE) 3*512kB (UE) 3*1024kB (UM) 2*2048kB (ME) 913*4096kB (M) = 3762692kB [ 178.618342][ T9506] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 178.628775][ T9506] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 178.638634][ T9506] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 178.648757][ T9506] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 178.664577][ T9506] 50328 total pagecache pages [ 178.669901][ T9506] 0 pages in swap cache [ 178.674065][ T9506] Swap cache stats: add 0, delete 0, find 0/0 [ 178.687936][ T9506] Free swap = 0kB [ 178.691680][ T9506] Total swap = 0kB 21:09:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:00 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 178.701964][ T9506] 1965979 pages RAM [ 178.708099][ T9506] 0 pages HighMem/MovableOnly [ 178.712994][ T9506] 344206 pages reserved [ 178.718564][ T9506] 0 pages cma reserved 21:09:00 executing program 1: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 178.811960][ T9558] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 178.820764][ T9563] FAULT_INJECTION: forcing a failure. [ 178.820764][ T9563] name failslab, interval 1, probability 0, space 0, times 0 [ 178.863515][ T9563] CPU: 1 PID: 9563 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 178.872140][ T9563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.882658][ T9563] Call Trace: [ 178.885956][ T9563] dump_stack+0x1f0/0x31e [ 178.890265][ T9563] should_fail+0x38a/0x4e0 [ 178.894659][ T9563] ? security_inode_alloc+0x32/0x1e0 [ 178.899934][ T9563] should_failslab+0x5/0x20 [ 178.904411][ T9563] kmem_cache_alloc+0x53/0x2d0 [ 178.909153][ T9563] security_inode_alloc+0x32/0x1e0 [ 178.914245][ T9563] inode_init_always+0x3f4/0xa50 [ 178.919162][ T9563] ? shmem_match+0x150/0x150 [ 178.923752][ T9563] new_inode_pseudo+0x7b/0x240 [ 178.928519][ T9563] new_inode+0x25/0x1d0 [ 178.932652][ T9563] shmem_get_inode+0x10e/0x6f0 [ 178.937411][ T9563] ? _raw_spin_unlock+0x24/0x40 [ 178.942268][ T9563] __shmem_file_setup+0x11e/0x270 [ 178.947293][ T9563] __se_sys_memfd_create+0x25e/0x490 [ 178.952583][ T9563] ? do_syscall_64+0x22/0xe0 [ 178.957155][ T9563] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.963337][ T9563] do_syscall_64+0x73/0xe0 [ 178.967753][ T9563] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.973651][ T9563] RIP: 0033:0x45cba9 [ 178.977615][ T9563] Code: Bad RIP value. [ 178.981663][ T9563] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 178.990052][ T9563] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cba9 [ 178.998049][ T9563] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1d11 21:09:01 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 179.006006][ T9563] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 179.014782][ T9563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 179.022779][ T9563] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:01 executing program 1: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 179.191455][ T9576] FAULT_INJECTION: forcing a failure. [ 179.191455][ T9576] name failslab, interval 1, probability 0, space 0, times 0 21:09:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 179.254329][ T9581] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:01 executing program 1: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 179.321505][ T9576] CPU: 1 PID: 9576 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 179.330224][ T9576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.340687][ T9576] Call Trace: [ 179.343964][ T9576] dump_stack+0x1f0/0x31e [ 179.348406][ T9576] should_fail+0x38a/0x4e0 [ 179.353068][ T9576] ? __d_alloc+0x2a/0x6d0 [ 179.357396][ T9576] should_failslab+0x5/0x20 [ 179.361891][ T9576] kmem_cache_alloc+0x53/0x2d0 [ 179.366819][ T9576] __d_alloc+0x2a/0x6d0 [ 179.370975][ T9576] ? lockdep_init_map_waits+0x2c/0x9a0 [ 179.376475][ T9576] d_alloc_pseudo+0x19/0x70 [ 179.381124][ T9576] alloc_file_pseudo+0xc8/0x240 [ 179.386050][ T9576] __shmem_file_setup+0x194/0x270 [ 179.391191][ T9576] __se_sys_memfd_create+0x25e/0x490 [ 179.396479][ T9576] ? do_syscall_64+0x22/0xe0 [ 179.401058][ T9576] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.407128][ T9576] do_syscall_64+0x73/0xe0 [ 179.411619][ T9576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.417515][ T9576] RIP: 0033:0x45cba9 [ 179.421401][ T9576] Code: Bad RIP value. [ 179.425479][ T9576] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 179.433870][ T9576] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cba9 [ 179.441848][ T9576] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 179.449801][ T9576] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 179.457760][ T9576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 179.465820][ T9576] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:01 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 179.564520][ T9595] xt_check_target: 17 callbacks suppressed [ 179.564530][ T9595] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 179.613770][ T9598] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 179.677530][ T9606] FAULT_INJECTION: forcing a failure. [ 179.677530][ T9606] name failslab, interval 1, probability 0, space 0, times 0 [ 179.742708][ T9606] CPU: 1 PID: 9606 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 179.751334][ T9606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.761396][ T9606] Call Trace: [ 179.764701][ T9606] dump_stack+0x1f0/0x31e [ 179.769031][ T9606] should_fail+0x38a/0x4e0 [ 179.773442][ T9606] ? __alloc_file+0x26/0x390 [ 179.778105][ T9606] should_failslab+0x5/0x20 [ 179.782625][ T9606] kmem_cache_alloc+0x53/0x2d0 [ 179.787402][ T9606] __alloc_file+0x26/0x390 21:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x8, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 179.791826][ T9606] ? alloc_empty_file+0x49/0x1b0 [ 179.796777][ T9606] alloc_empty_file+0xa9/0x1b0 [ 179.801584][ T9606] alloc_file+0x5d/0x4f0 [ 179.805847][ T9606] alloc_file_pseudo+0x1b0/0x240 [ 179.808487][ T9618] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 179.810794][ T9606] __shmem_file_setup+0x194/0x270 [ 179.810809][ T9606] __se_sys_memfd_create+0x25e/0x490 [ 179.810819][ T9606] ? do_syscall_64+0x22/0xe0 [ 179.810831][ T9606] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.810844][ T9606] do_syscall_64+0x73/0xe0 [ 179.844759][ T9606] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.850653][ T9606] RIP: 0033:0x45cba9 [ 179.854546][ T9606] Code: Bad RIP value. [ 179.858621][ T9606] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 179.867037][ T9606] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cba9 [ 179.875004][ T9606] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 179.883192][ T9606] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 21:09:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 179.891239][ T9606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 179.899203][ T9606] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:02 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 179.970724][ T9612] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 180.010329][ T9634] FAULT_INJECTION: forcing a failure. [ 180.010329][ T9634] name failslab, interval 1, probability 0, space 0, times 0 [ 180.023251][ T9633] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 180.026213][ T9634] CPU: 0 PID: 9634 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 180.040635][ T9634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.050692][ T9634] Call Trace: [ 180.053985][ T9634] dump_stack+0x1f0/0x31e [ 180.058327][ T9634] should_fail+0x38a/0x4e0 [ 180.062761][ T9634] ? security_file_alloc+0x32/0x200 21:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x10, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 180.067963][ T9634] should_failslab+0x5/0x20 [ 180.072478][ T9634] kmem_cache_alloc+0x53/0x2d0 [ 180.077257][ T9634] security_file_alloc+0x32/0x200 [ 180.082305][ T9634] __alloc_file+0xd7/0x390 [ 180.086731][ T9634] alloc_empty_file+0xa9/0x1b0 [ 180.091507][ T9634] alloc_file+0x5d/0x4f0 [ 180.095761][ T9634] alloc_file_pseudo+0x1b0/0x240 [ 180.100739][ T9634] __shmem_file_setup+0x194/0x270 [ 180.105784][ T9634] __se_sys_memfd_create+0x25e/0x490 [ 180.111065][ T9634] ? do_syscall_64+0x22/0xe0 [ 180.115667][ T9634] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.121716][ T9634] do_syscall_64+0x73/0xe0 [ 180.126115][ T9634] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.131997][ T9634] RIP: 0033:0x45cba9 [ 180.135866][ T9634] Code: Bad RIP value. [ 180.139906][ T9634] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 180.148848][ T9634] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cba9 [ 180.156814][ T9634] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1d11 21:09:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:09:02 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 180.164766][ T9634] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 180.172714][ T9634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 180.180670][ T9634] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x11, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 180.330341][ T9649] FAULT_INJECTION: forcing a failure. [ 180.330341][ T9649] name failslab, interval 1, probability 0, space 0, times 0 [ 180.337509][ T9648] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:02 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 180.389660][ T9649] CPU: 1 PID: 9649 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 180.398288][ T9649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.408344][ T9649] Call Trace: [ 180.411644][ T9649] dump_stack+0x1f0/0x31e [ 180.415978][ T9649] should_fail+0x38a/0x4e0 [ 180.420400][ T9649] ? tomoyo_realpath_from_path+0xd8/0x630 [ 180.424125][ T9656] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 180.426133][ T9649] should_failslab+0x5/0x20 [ 180.426157][ T9649] __kmalloc+0x74/0x330 [ 180.426170][ T9649] ? tomoyo_realpath_from_path+0xcb/0x630 [ 180.426183][ T9649] tomoyo_realpath_from_path+0xd8/0x630 [ 180.426200][ T9649] tomoyo_path_perm+0x17d/0x740 [ 180.426218][ T9649] ? trace_lock_release+0x137/0x1a0 [ 180.463865][ T9649] security_path_truncate+0xc0/0x140 [ 180.469147][ T9649] do_sys_ftruncate+0x443/0x690 [ 180.474007][ T9649] ? lock_is_held_type+0x87/0xe0 [ 180.478942][ T9649] ? do_syscall_64+0x22/0xe0 [ 180.483512][ T9649] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.489556][ T9649] do_syscall_64+0x73/0xe0 [ 180.494063][ T9649] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.499961][ T9649] RIP: 0033:0x45cb77 [ 180.503828][ T9649] Code: Bad RIP value. [ 180.509027][ T9649] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 180.517419][ T9649] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cb77 [ 180.525818][ T9649] RDX: 0000000020000058 RSI: 0000000008100000 RDI: 0000000000000004 21:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x30, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 180.533777][ T9649] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 180.541842][ T9649] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 180.549796][ T9649] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 180.570418][ T9649] ERROR: Out of memory at tomoyo_realpath_from_path. 21:09:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x50, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:02 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:02 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 180.716145][ T9670] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:02 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x88, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 180.842166][ T9679] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 180.845873][ T9689] FAULT_INJECTION: forcing a failure. [ 180.845873][ T9689] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 180.863052][ T9689] CPU: 1 PID: 9689 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 180.871812][ T9689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.881980][ T9689] Call Trace: [ 180.884644][ T9687] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 180.885269][ T9689] dump_stack+0x1f0/0x31e [ 180.885283][ T9689] should_fail+0x38a/0x4e0 [ 180.885299][ T9689] prepare_alloc_pages+0x28c/0x4a0 [ 180.885313][ T9689] __alloc_pages_nodemask+0xbc/0x5e0 [ 180.885329][ T9689] ? __lock_acquire+0x116c/0x2c30 [ 180.917997][ T9689] kmem_getpages+0x49/0x900 [ 180.922527][ T9689] cache_grow_begin+0x7b/0x2e0 [ 180.927304][ T9689] cache_alloc_refill+0x359/0x3f0 [ 180.932338][ T9689] ? check_preemption_disabled+0x51/0x140 [ 180.938067][ T9689] __kmalloc+0x30c/0x330 21:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xf9, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 180.942317][ T9689] ? tomoyo_realpath_from_path+0xd8/0x630 [ 180.948050][ T9689] tomoyo_realpath_from_path+0xd8/0x630 [ 180.953715][ T9689] tomoyo_path_perm+0x17d/0x740 [ 180.958576][ T9689] ? trace_lock_release+0x137/0x1a0 [ 180.963795][ T9689] security_path_truncate+0xc0/0x140 [ 180.969263][ T9689] do_sys_ftruncate+0x443/0x690 [ 180.974115][ T9689] ? lock_is_held_type+0x87/0xe0 [ 180.979046][ T9689] ? do_syscall_64+0x22/0xe0 [ 180.983779][ T9689] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.989923][ T9689] do_syscall_64+0x73/0xe0 [ 180.994327][ T9689] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.000304][ T9689] RIP: 0033:0x45cb77 [ 181.004181][ T9689] Code: Bad RIP value. [ 181.008450][ T9689] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 181.016992][ T9689] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045cb77 [ 181.024964][ T9689] RDX: 0000000020000058 RSI: 0000000008100000 RDI: 0000000000000004 [ 181.032922][ T9689] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) [ 181.040986][ T9689] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 181.048958][ T9689] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:09:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f9000000000000000000415544495400"/398]}, 0x206) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 181.113746][ T9695] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x600, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) 21:09:03 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 181.230209][ T9706] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 181.261920][ T9704] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) [ 181.309645][ T9715] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 181.421530][ T9730] FAULT_INJECTION: forcing a failure. [ 181.421530][ T9730] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 181.444309][ T9724] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 181.447702][ T9730] CPU: 0 PID: 9730 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 181.460595][ T9730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.470653][ T9730] Call Trace: [ 181.473956][ T9730] dump_stack+0x1f0/0x31e [ 181.478296][ T9730] should_fail+0x38a/0x4e0 [ 181.482724][ T9730] prepare_alloc_pages+0x28c/0x4a0 [ 181.487839][ T9730] __alloc_pages_nodemask+0xbc/0x5e0 [ 181.493132][ T9730] alloc_pages_vma+0x4dd/0xd10 [ 181.497897][ T9730] ? mpol_shared_policy_lookup+0x15e/0x200 [ 181.503703][ T9730] shmem_alloc_and_acct_page+0x40e/0xbe0 [ 181.509364][ T9730] shmem_getpage_gfp+0x203e/0x2c60 [ 181.514503][ T9730] shmem_write_begin+0xcd/0x1a0 [ 181.519381][ T9730] generic_perform_write+0x23b/0x4e0 [ 181.524681][ T9730] __generic_file_write_iter+0x22b/0x4e0 [ 181.530319][ T9730] ? down_write+0xcd/0x130 [ 181.534737][ T9730] generic_file_write_iter+0x4a6/0x650 [ 181.540208][ T9730] vfs_write+0xa08/0xc70 [ 181.544477][ T9730] __x64_sys_pwrite64+0x151/0x1c0 [ 181.549504][ T9730] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.555573][ T9730] do_syscall_64+0x73/0xe0 [ 181.559996][ T9730] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.565887][ T9730] RIP: 0033:0x416987 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 21:09:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 181.569773][ T9730] Code: Bad RIP value. [ 181.573830][ T9730] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 181.582242][ T9730] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416987 [ 181.590222][ T9730] RDX: 0000000000000017 RSI: 00000000200001c0 RDI: 0000000000000004 [ 181.598193][ T9730] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 181.606165][ T9730] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 181.614140][ T9730] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 181.712854][ T9730] FAT-fs (loop5): bogus number of reserved sectors [ 181.728614][ T9730] FAT-fs (loop5): Can't find a valid FAT filesystem 21:09:03 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:04 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f00, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:09:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 181.912975][ T9764] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 181.935254][ T9772] FAULT_INJECTION: forcing a failure. [ 181.935254][ T9772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 181.943941][ T9767] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 181.971831][ T9772] CPU: 1 PID: 9772 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 181.980461][ T9772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.992092][ T9772] Call Trace: [ 181.995391][ T9772] dump_stack+0x1f0/0x31e [ 181.999725][ T9772] should_fail+0x38a/0x4e0 [ 182.004131][ T9772] prepare_alloc_pages+0x28c/0x4a0 [ 182.009245][ T9772] __alloc_pages_nodemask+0xbc/0x5e0 [ 182.014519][ T9772] alloc_pages_vma+0x4dd/0xd10 [ 182.019268][ T9772] ? mpol_shared_policy_lookup+0x15e/0x200 [ 182.025054][ T9772] shmem_alloc_and_acct_page+0x40e/0xbe0 [ 182.030680][ T9772] shmem_getpage_gfp+0x203e/0x2c60 [ 182.035798][ T9772] shmem_write_begin+0xcd/0x1a0 [ 182.040801][ T9772] generic_perform_write+0x23b/0x4e0 [ 182.046071][ T9772] __generic_file_write_iter+0x22b/0x4e0 [ 182.051699][ T9772] ? down_write+0xcd/0x130 [ 182.056106][ T9772] generic_file_write_iter+0x4a6/0x650 [ 182.061564][ T9772] vfs_write+0xa08/0xc70 [ 182.065841][ T9772] __x64_sys_pwrite64+0x151/0x1c0 [ 182.070868][ T9772] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.076913][ T9772] do_syscall_64+0x73/0xe0 [ 182.081312][ T9772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.087181][ T9772] RIP: 0033:0x416987 [ 182.091053][ T9772] Code: Bad RIP value. [ 182.095092][ T9772] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 182.103493][ T9772] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416987 [ 182.111449][ T9772] RDX: 0000000000000017 RSI: 00000000200001c0 RDI: 0000000000000004 [ 182.119420][ T9772] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 182.127385][ T9772] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 182.135332][ T9772] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:04 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000000000000000"]}, 0x213) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x5000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 182.299481][ T9788] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 182.310925][ T9772] FAT-fs (loop5): bogus number of reserved sectors [ 182.319255][ T9772] FAT-fs (loop5): Can't find a valid FAT filesystem 21:09:04 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7f00, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:04 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 182.532736][ T9805] FAULT_INJECTION: forcing a failure. [ 182.532736][ T9805] name failslab, interval 1, probability 0, space 0, times 0 [ 182.582413][ T9804] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 182.610308][ T9805] CPU: 1 PID: 9805 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 182.618936][ T9805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.628992][ T9805] Call Trace: [ 182.632321][ T9805] dump_stack+0x1f0/0x31e [ 182.636661][ T9805] should_fail+0x38a/0x4e0 [ 182.641086][ T9805] ? getname_flags+0xb8/0x610 [ 182.645777][ T9805] should_failslab+0x5/0x20 [ 182.650287][ T9805] kmem_cache_alloc+0x53/0x2d0 [ 182.655059][ T9805] getname_flags+0xb8/0x610 [ 182.659578][ T9805] do_sys_openat2+0x40d/0x770 [ 182.664267][ T9805] __x64_sys_open+0x1af/0x1e0 [ 182.668955][ T9805] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.675024][ T9805] do_syscall_64+0x73/0xe0 [ 182.679448][ T9805] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.685339][ T9805] RIP: 0033:0x416921 [ 182.689227][ T9805] Code: Bad RIP value. [ 182.693380][ T9805] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 182.701793][ T9805] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416921 [ 182.709770][ T9805] RDX: 00007fa9e91f0b0a RSI: 0000000000000002 RDI: 00007fa9e91f0b00 [ 182.717745][ T9805] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 21:09:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 182.725719][ T9805] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 182.733694][ T9805] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x8800, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 182.798839][ T9815] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/418]}, 0x21a) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:05 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x0, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xf900, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 182.986934][ T9831] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 182.998808][ T9830] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/418]}, 0x21a) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x0, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x0, 0x0, 0x0, {0x45}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 21:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x100000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 183.149875][ T9849] FAULT_INJECTION: forcing a failure. [ 183.149875][ T9849] name failslab, interval 1, probability 0, space 0, times 0 [ 183.222324][ T9849] CPU: 1 PID: 9849 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 183.230956][ T9849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.241231][ T9849] Call Trace: [ 183.244538][ T9849] dump_stack+0x1f0/0x31e [ 183.248876][ T9849] should_fail+0x38a/0x4e0 [ 183.253298][ T9849] ? security_file_alloc+0x32/0x200 [ 183.254027][ T9861] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 183.258507][ T9849] should_failslab+0x5/0x20 21:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x200000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x45}}, 0x14}}, 0x0) [ 183.258520][ T9849] kmem_cache_alloc+0x53/0x2d0 [ 183.258535][ T9849] security_file_alloc+0x32/0x200 [ 183.258550][ T9849] __alloc_file+0xd7/0x390 [ 183.258562][ T9849] alloc_empty_file+0xa9/0x1b0 [ 183.258572][ T9849] path_openat+0xa8/0x37f0 [ 183.258583][ T9849] ? __lock_acquire+0x116c/0x2c30 [ 183.258613][ T9849] do_filp_open+0x191/0x3a0 [ 183.258626][ T9849] ? do_raw_spin_unlock+0x134/0x8d0 [ 183.258643][ T9849] ? _raw_spin_unlock+0x24/0x40 [ 183.258652][ T9849] ? __alloc_fd+0x55c/0x600 [ 183.258668][ T9849] do_sys_openat2+0x463/0x770 [ 183.258688][ T9849] __x64_sys_open+0x1af/0x1e0 [ 183.324849][ T9854] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 183.327466][ T9849] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.327477][ T9849] do_syscall_64+0x73/0xe0 [ 183.327490][ T9849] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.327499][ T9849] RIP: 0033:0x416921 [ 183.327503][ T9849] Code: Bad RIP value. [ 183.327509][ T9849] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 21:09:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:05 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 183.327517][ T9849] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416921 [ 183.327523][ T9849] RDX: 00007fa9e91f0b0a RSI: 0000000000000002 RDI: 00007fa9e91f0b00 [ 183.327529][ T9849] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 183.327535][ T9849] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 183.327540][ T9849] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x300000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 183.483102][ T9871] FAULT_INJECTION: forcing a failure. [ 183.483102][ T9871] name failslab, interval 1, probability 0, space 0, times 0 [ 183.513308][ T9871] CPU: 0 PID: 9871 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 183.521941][ T9871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.532351][ T9871] Call Trace: [ 183.535647][ T9871] dump_stack+0x1f0/0x31e [ 183.539981][ T9871] should_fail+0x38a/0x4e0 [ 183.544442][ T9871] ? __alloc_file+0x26/0x390 [ 183.549035][ T9871] should_failslab+0x5/0x20 [ 183.553575][ T9871] kmem_cache_alloc+0x53/0x2d0 [ 183.558343][ T9871] __alloc_file+0x26/0x390 [ 183.562781][ T9871] ? alloc_empty_file+0x49/0x1b0 [ 183.567729][ T9871] alloc_empty_file+0xa9/0x1b0 [ 183.572493][ T9871] path_openat+0xa8/0x37f0 [ 183.577345][ T9871] ? __lock_acquire+0x116c/0x2c30 [ 183.582378][ T9871] ? trace_mm_page_alloc+0x195/0x1f0 [ 183.588025][ T9871] do_filp_open+0x191/0x3a0 [ 183.592535][ T9871] ? do_raw_spin_unlock+0x134/0x8d0 [ 183.597747][ T9871] ? _raw_spin_unlock+0x24/0x40 [ 183.602602][ T9871] ? __alloc_fd+0x55c/0x600 [ 183.607118][ T9871] do_sys_openat2+0x463/0x770 [ 183.611807][ T9871] __x64_sys_open+0x1af/0x1e0 [ 183.616502][ T9871] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.622571][ T9871] do_syscall_64+0x73/0xe0 [ 183.626996][ T9871] entry_SYSCALL_64_after_hwframe+0x44/0xa9 21:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x500000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 183.632894][ T9871] RIP: 0033:0x416921 [ 183.636785][ T9871] Code: Bad RIP value. [ 183.640855][ T9871] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 183.649278][ T9871] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416921 [ 183.657275][ T9871] RDX: 00007fa9e91f0b0a RSI: 0000000000000002 RDI: 00007fa9e91f0b00 [ 183.665244][ T9871] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 183.673305][ T9871] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 21:09:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x45}}, 0x14}}, 0x0) [ 183.680511][ T9880] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 183.681269][ T9871] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 183.775666][ T9886] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x45}}, 0x14}}, 0x0) 21:09:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 183.930760][ T9905] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:06 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:06 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 184.034705][ T9910] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 184.097370][ T9923] FAULT_INJECTION: forcing a failure. [ 184.097370][ T9923] name failslab, interval 1, probability 0, space 0, times 0 [ 184.133566][ T9923] CPU: 0 PID: 9923 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 184.142291][ T9923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.152435][ T9923] Call Trace: [ 184.155739][ T9923] dump_stack+0x1f0/0x31e [ 184.160080][ T9923] should_fail+0x38a/0x4e0 [ 184.164504][ T9923] ? security_file_alloc+0x32/0x200 [ 184.169705][ T9923] should_failslab+0x5/0x20 [ 184.174215][ T9923] kmem_cache_alloc+0x53/0x2d0 [ 184.178983][ T9923] security_file_alloc+0x32/0x200 [ 184.184024][ T9923] __alloc_file+0xd7/0x390 [ 184.188445][ T9923] alloc_empty_file+0xa9/0x1b0 [ 184.193214][ T9923] path_openat+0xa8/0x37f0 [ 184.197630][ T9923] ? __lock_acquire+0x116c/0x2c30 [ 184.202665][ T9923] ? trace_mm_page_alloc+0x195/0x1f0 [ 184.207970][ T9923] do_filp_open+0x191/0x3a0 [ 184.212481][ T9923] ? do_raw_spin_unlock+0x134/0x8d0 [ 184.217693][ T9923] ? _raw_spin_unlock+0x24/0x40 [ 184.222551][ T9923] ? __alloc_fd+0x55c/0x600 [ 184.227065][ T9923] do_sys_openat2+0x463/0x770 [ 184.231751][ T9923] __x64_sys_open+0x1af/0x1e0 [ 184.236438][ T9923] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.242567][ T9923] do_syscall_64+0x73/0xe0 [ 184.246994][ T9923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.253063][ T9923] RIP: 0033:0x416921 [ 184.256952][ T9923] Code: Bad RIP value. [ 184.261016][ T9923] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 184.269427][ T9923] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416921 [ 184.277441][ T9923] RDX: 00007fa9e91f0b0a RSI: 0000000000000002 RDI: 00007fa9e91f0b00 [ 184.285618][ T9923] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 21:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 184.293591][ T9923] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 184.301566][ T9923] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7fffffe, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 184.341957][ T9935] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 184.373689][ T9928] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x8000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:06 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 184.524353][ T9944] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 184.601987][ T9960] FAULT_INJECTION: forcing a failure. [ 184.601987][ T9960] name failslab, interval 1, probability 0, space 0, times 0 [ 184.616318][ T9960] CPU: 1 PID: 9960 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 184.624917][ T9960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.634982][ T9960] Call Trace: [ 184.638369][ T9960] dump_stack+0x1f0/0x31e [ 184.642691][ T9960] should_fail+0x38a/0x4e0 [ 184.647086][ T9960] ? tomoyo_realpath_from_path+0xd8/0x630 [ 184.652796][ T9960] should_failslab+0x5/0x20 [ 184.657274][ T9960] __kmalloc+0x74/0x330 [ 184.661421][ T9960] ? tomoyo_realpath_from_path+0xcb/0x630 [ 184.667117][ T9960] tomoyo_realpath_from_path+0xd8/0x630 [ 184.672639][ T9960] ? memset+0x1f/0x40 [ 184.676621][ T9960] tomoyo_check_open_permission+0x1b6/0x900 [ 184.682866][ T9960] security_file_open+0x50/0xc0 [ 184.687694][ T9960] do_dentry_open+0x3cd/0x1070 [ 184.692439][ T9960] path_openat+0x278d/0x37f0 [ 184.697030][ T9960] ? trace_mm_page_alloc+0x195/0x1f0 [ 184.702299][ T9960] do_filp_open+0x191/0x3a0 [ 184.706834][ T9960] ? _raw_spin_unlock+0x24/0x40 [ 184.711663][ T9960] ? __alloc_fd+0x55c/0x600 [ 184.716147][ T9960] do_sys_openat2+0x463/0x770 [ 184.720805][ T9960] __x64_sys_open+0x1af/0x1e0 [ 184.725476][ T9960] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.731517][ T9960] do_syscall_64+0x73/0xe0 [ 184.735933][ T9960] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.741801][ T9960] RIP: 0033:0x416921 [ 184.745666][ T9960] Code: Bad RIP value. [ 184.749713][ T9960] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 184.758117][ T9960] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416921 [ 184.766063][ T9960] RDX: 00007fa9e91f0b0a RSI: 0000000000000002 RDI: 00007fa9e91f0b00 [ 184.774007][ T9960] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 184.781965][ T9960] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 184.789932][ T9960] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x11000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 184.808985][ T9962] xt_check_target: 10 callbacks suppressed [ 184.808996][ T9962] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 184.813515][ T9960] ERROR: Out of memory at tomoyo_realpath_from_path. 21:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:09:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) [ 184.910490][ T9966] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 184.946352][ T9974] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x40000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 184.984265][ T9978] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 185.010617][ T9984] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r3, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) 21:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7f000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:07 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) 21:09:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 185.196001][ T9992] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x88000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 185.236646][ T9993] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 185.245153][T10001] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 185.269556][T10007] FAULT_INJECTION: forcing a failure. [ 185.269556][T10007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.282789][T10007] CPU: 0 PID: 10007 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 185.291463][T10007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.301526][T10007] Call Trace: [ 185.304840][T10007] dump_stack+0x1f0/0x31e [ 185.309179][T10007] should_fail+0x38a/0x4e0 [ 185.313601][T10007] prepare_alloc_pages+0x28c/0x4a0 [ 185.318724][T10007] __alloc_pages_nodemask+0xbc/0x5e0 [ 185.320653][T10011] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 185.324016][T10007] kmem_getpages+0x49/0x900 [ 185.324033][T10007] cache_grow_begin+0x7b/0x2e0 [ 185.341865][T10007] cache_alloc_refill+0x359/0x3f0 [ 185.346911][T10007] ? check_preemption_disabled+0x51/0x140 [ 185.352638][T10007] __kmalloc+0x30c/0x330 [ 185.356879][T10007] ? tomoyo_realpath_from_path+0xd8/0x630 [ 185.362720][T10007] tomoyo_realpath_from_path+0xd8/0x630 [ 185.368279][T10007] ? memset+0x1f/0x40 [ 185.372367][T10007] tomoyo_check_open_permission+0x1b6/0x900 [ 185.377992][T10000] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xdd86ffff, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 185.378304][T10007] security_file_open+0x50/0xc0 [ 185.390888][T10007] do_dentry_open+0x3cd/0x1070 [ 185.395656][T10007] path_openat+0x278d/0x37f0 [ 185.400256][T10007] ? trace_mm_page_alloc+0x195/0x1f0 [ 185.405798][T10007] do_filp_open+0x191/0x3a0 [ 185.410284][T10007] ? _raw_spin_unlock+0x24/0x40 [ 185.415109][T10007] ? __alloc_fd+0x55c/0x600 [ 185.419612][T10007] do_sys_openat2+0x463/0x770 [ 185.424287][T10007] __x64_sys_open+0x1af/0x1e0 [ 185.428961][T10007] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.435031][T10007] do_syscall_64+0x73/0xe0 [ 185.439786][T10007] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.445662][T10007] RIP: 0033:0x416921 [ 185.449613][T10007] Code: Bad RIP value. [ 185.453650][T10007] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 185.462121][T10007] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416921 [ 185.470067][T10007] RDX: 00007fa9e91f0b0a RSI: 0000000000000002 RDI: 00007fa9e91f0b00 [ 185.478012][T10007] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 21:09:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r6) [ 185.486010][T10007] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 185.495033][T10007] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xf9000000, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 185.639522][T10018] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 185.667835][T10029] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:07 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 185.707183][T10030] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfeffff07, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 185.792374][T10036] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 [ 185.819177][T10043] FAULT_INJECTION: forcing a failure. [ 185.819177][T10043] name failslab, interval 1, probability 0, space 0, times 0 [ 185.832202][T10043] CPU: 1 PID: 10043 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 185.840892][T10043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.850948][T10043] Call Trace: [ 185.854251][T10043] dump_stack+0x1f0/0x31e [ 185.858585][T10043] should_fail+0x38a/0x4e0 [ 185.863008][T10043] ? tomoyo_encode2+0x25a/0x560 [ 185.867860][T10043] should_failslab+0x5/0x20 [ 185.872371][T10043] __kmalloc+0x74/0x330 [ 185.876538][T10043] tomoyo_encode2+0x25a/0x560 [ 185.881227][T10043] tomoyo_realpath_from_path+0x5d6/0x630 [ 185.886866][T10043] ? memset+0x1f/0x40 21:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xffff86dd, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 185.887165][T10048] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 185.890875][T10043] tomoyo_check_open_permission+0x1b6/0x900 [ 185.890911][T10043] security_file_open+0x50/0xc0 [ 185.910216][T10043] do_dentry_open+0x3cd/0x1070 [ 185.914996][T10043] path_openat+0x278d/0x37f0 [ 185.919596][T10043] ? trace_mm_page_alloc+0x195/0x1f0 [ 185.924914][T10043] do_filp_open+0x191/0x3a0 [ 185.929429][T10043] ? _raw_spin_unlock+0x24/0x40 [ 185.934390][T10043] ? __alloc_fd+0x55c/0x600 [ 185.938890][T10043] do_sys_openat2+0x463/0x770 [ 185.943667][T10043] __x64_sys_open+0x1af/0x1e0 [ 185.948339][T10043] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.954522][T10043] do_syscall_64+0x73/0xe0 [ 185.958925][T10043] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.964817][T10043] RIP: 0033:0x416921 [ 185.968688][T10043] Code: Bad RIP value. [ 185.972740][T10043] RSP: 002b:00007fa9e91f0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 185.981232][T10043] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 0000000000416921 [ 185.989455][T10043] RDX: 00007fa9e91f0b0a RSI: 0000000000000002 RDI: 00007fa9e91f0b00 [ 185.997445][T10043] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 186.005430][T10043] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 186.013399][T10043] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 186.024835][T10043] ERROR: Out of memory at tomoyo_realpath_from_path. 21:09:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f9000000000000000000415544495400"/398]}, 0x206) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) [ 186.058158][T10052] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x3, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 186.337739][T10066] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 186.371615][T10084] FAULT_INJECTION: forcing a failure. [ 186.371615][T10084] name failslab, interval 1, probability 0, space 0, times 0 21:09:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 186.397921][T10084] CPU: 1 PID: 10084 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 186.406648][T10084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.416703][T10084] Call Trace: [ 186.419997][T10084] dump_stack+0x1f0/0x31e [ 186.424336][T10084] should_fail+0x38a/0x4e0 [ 186.428759][T10084] ? tomoyo_realpath_from_path+0xd8/0x630 [ 186.434485][T10084] should_failslab+0x5/0x20 [ 186.438995][T10084] __kmalloc+0x74/0x330 [ 186.443157][T10084] ? tomoyo_realpath_from_path+0xcb/0x630 [ 186.448880][T10084] tomoyo_realpath_from_path+0xd8/0x630 [ 186.454433][T10084] tomoyo_path_number_perm+0x18f/0x690 [ 186.460104][T10084] security_file_ioctl+0x55/0xb0 [ 186.465129][T10084] __se_sys_ioctl+0x48/0x160 [ 186.469713][T10084] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 186.475872][T10084] do_syscall_64+0x73/0xe0 [ 186.480268][T10084] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 186.486142][T10084] RIP: 0033:0x45ca77 [ 186.490029][T10084] Code: Bad RIP value. 21:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x4, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 186.494197][T10084] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 186.502583][T10084] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 186.510553][T10084] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 186.518624][T10084] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 186.526616][T10084] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 186.534579][T10084] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) [ 186.553199][T10084] ERROR: Out of memory at tomoyo_realpath_from_path. 21:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x5, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:08 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, 0x0, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x6, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) [ 186.786085][T10098] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 186.857880][T10120] FAULT_INJECTION: forcing a failure. [ 186.857880][T10120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.871207][T10120] CPU: 1 PID: 10120 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 186.879884][T10120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.889946][T10120] Call Trace: [ 186.893235][T10120] dump_stack+0x1f0/0x31e [ 186.897564][T10120] should_fail+0x38a/0x4e0 [ 186.902031][T10120] prepare_alloc_pages+0x28c/0x4a0 21:09:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 186.907182][T10120] __alloc_pages_nodemask+0xbc/0x5e0 [ 186.912562][T10120] ? __lock_acquire+0x116c/0x2c30 [ 186.917597][T10120] kmem_getpages+0x49/0x900 [ 186.922115][T10120] cache_grow_begin+0x7b/0x2e0 [ 186.926900][T10120] cache_alloc_refill+0x359/0x3f0 [ 186.931933][T10120] ? check_preemption_disabled+0x51/0x140 [ 186.937660][T10120] __kmalloc+0x30c/0x330 [ 186.941910][T10120] ? tomoyo_realpath_from_path+0xd8/0x630 [ 186.947672][T10120] tomoyo_realpath_from_path+0xd8/0x630 [ 186.953236][T10120] tomoyo_path_number_perm+0x18f/0x690 [ 186.958729][T10120] security_file_ioctl+0x55/0xb0 [ 186.963687][T10120] __se_sys_ioctl+0x48/0x160 [ 186.968284][T10120] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 186.974352][T10120] do_syscall_64+0x73/0xe0 [ 186.978780][T10120] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 186.984677][T10120] RIP: 0033:0x45ca77 [ 186.988564][T10120] Code: Bad RIP value. [ 186.992629][T10120] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:09:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, 0x0, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x7, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 187.001043][T10120] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 187.002375][T10126] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 187.009017][T10120] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 187.009024][T10120] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 187.009030][T10120] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 187.009035][T10120] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) 21:09:09 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x8, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, 0x0, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 187.319709][T10152] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 187.325536][T10155] FAULT_INJECTION: forcing a failure. [ 187.325536][T10155] name failslab, interval 1, probability 0, space 0, times 0 21:09:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 187.380165][T10155] CPU: 1 PID: 10155 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 187.388883][T10155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.399490][T10155] Call Trace: [ 187.402826][T10155] dump_stack+0x1f0/0x31e [ 187.407161][T10155] should_fail+0x38a/0x4e0 [ 187.410536][T10169] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 187.411608][T10155] ? tomoyo_encode2+0x25a/0x560 [ 187.411618][T10155] should_failslab+0x5/0x20 [ 187.411628][T10155] __kmalloc+0x74/0x330 [ 187.411642][T10155] tomoyo_encode2+0x25a/0x560 [ 187.411657][T10155] tomoyo_realpath_from_path+0x5d6/0x630 [ 187.443043][T10155] tomoyo_path_number_perm+0x18f/0x690 [ 187.448538][T10155] security_file_ioctl+0x55/0xb0 [ 187.453482][T10155] __se_sys_ioctl+0x48/0x160 [ 187.458077][T10155] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 187.464183][T10155] do_syscall_64+0x73/0xe0 [ 187.468605][T10155] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 187.474490][T10155] RIP: 0033:0x45ca77 [ 187.478379][T10155] Code: Bad RIP value. [ 187.482440][T10155] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 187.490919][T10155] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 187.498871][T10155] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 187.507103][T10155] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 187.515069][T10155] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 187.523035][T10155] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xa, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 187.545622][T10155] ERROR: Out of memory at tomoyo_realpath_from_path. 21:09:09 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 21:09:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xb, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 187.762995][T10185] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 187.789129][T10196] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop4 21:09:09 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 187.860515][T10206] FAULT_INJECTION: forcing a failure. [ 187.860515][T10206] name failslab, interval 1, probability 0, space 0, times 0 [ 187.879877][T10206] CPU: 0 PID: 10206 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 187.888593][T10206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.898650][T10206] Call Trace: [ 187.901952][T10206] dump_stack+0x1f0/0x31e [ 187.906295][T10206] should_fail+0x38a/0x4e0 21:09:10 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 187.910699][T10206] ? __kernfs_new_node+0x8b/0x630 [ 187.915986][T10206] should_failslab+0x5/0x20 [ 187.920492][T10206] kmem_cache_alloc+0x53/0x2d0 [ 187.925272][T10206] __kernfs_new_node+0x8b/0x630 [ 187.930274][T10206] ? kernfs_add_one+0x4b7/0x600 [ 187.935215][T10206] ? kernfs_add_one+0x4b7/0x600 [ 187.940136][T10206] ? __mutex_unlock_slowpath+0x12d/0x590 [ 187.945882][T10206] kernfs_new_node+0x95/0x160 [ 187.950563][T10206] __kernfs_create_file+0x45/0x2d0 [ 187.955661][T10206] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 187.961010][T10206] internal_create_group+0x445/0xd20 [ 187.966272][T10206] ? __loop_update_dio+0x240/0x580 [ 187.971356][T10206] loop_configure+0xdea/0x1370 [ 187.976213][T10206] lo_ioctl+0x68a/0x1fe0 [ 187.980439][T10206] ? trace_hardirqs_off+0x2d/0x70 [ 187.985453][T10206] ? trace_lock_release+0x137/0x1a0 [ 187.990765][T10206] ? blkdev_common_ioctl+0xf27/0x1b00 [ 187.996122][T10206] ? lo_release+0x1e0/0x1e0 [ 188.000612][T10206] blkdev_ioctl+0x2a6/0x5c0 [ 188.005101][T10206] block_ioctl+0xbc/0x100 [ 188.009414][T10206] ? blkdev_iopoll+0xf0/0xf0 [ 188.013984][T10206] __se_sys_ioctl+0xf9/0x160 [ 188.018684][T10206] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.024733][T10206] do_syscall_64+0x73/0xe0 [ 188.029155][T10206] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.035021][T10206] RIP: 0033:0x45ca77 [ 188.038903][T10206] Code: Bad RIP value. [ 188.042945][T10206] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 188.051342][T10206] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 21:09:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xc, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 188.059294][T10206] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 188.067269][T10206] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 188.075250][T10206] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 188.083205][T10206] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:10 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 188.239121][T10220] FAULT_INJECTION: forcing a failure. [ 188.239121][T10220] name failslab, interval 1, probability 0, space 0, times 0 [ 188.271873][T10217] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 188.278945][T10220] CPU: 0 PID: 10220 Comm: syz-executor.4 Not tainted 5.8.0-rc4-syzkaller #0 [ 188.288221][T10220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.298260][T10220] Call Trace: [ 188.301534][T10220] dump_stack+0x1f0/0x31e [ 188.305839][T10220] should_fail+0x38a/0x4e0 [ 188.310253][T10220] should_failslab+0x5/0x20 [ 188.315428][T10220] kmem_cache_alloc_node_trace+0x69/0x2b0 [ 188.321126][T10220] ? __get_vm_area_node+0x1ac/0x380 [ 188.326301][T10220] __get_vm_area_node+0x1ac/0x380 [ 188.331305][T10220] __vmalloc_node_range+0xe8/0x870 [ 188.336393][T10220] ? do_replace+0x1b0/0x420 [ 188.340962][T10220] ? __might_fault+0xf5/0x150 [ 188.345615][T10220] ? do_replace+0x1b0/0x420 [ 188.350106][T10220] __vmalloc+0x75/0x80 [ 188.354147][T10220] ? do_replace+0x1b0/0x420 [ 188.358635][T10220] do_replace+0x1b0/0x420 [ 188.362945][T10220] do_ebt_set_ctl+0xf0/0x1b0 [ 188.367510][T10220] ? nf_setsockopt+0x271/0x2e0 [ 188.372250][T10220] ? __mutex_unlock_slowpath+0x12d/0x590 [ 188.377855][T10220] ? __fget_files+0x388/0x3c0 [ 188.382507][T10220] nf_setsockopt+0x2be/0x2e0 [ 188.387077][T10220] ? sock_common_recvmsg+0x190/0x190 [ 188.392512][T10220] __sys_setsockopt+0x564/0x710 [ 188.398411][T10220] __x64_sys_setsockopt+0xb1/0xc0 [ 188.403427][T10220] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.409479][T10220] do_syscall_64+0x73/0xe0 [ 188.414159][T10220] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.420136][T10220] RIP: 0033:0x45cba9 [ 188.424001][T10220] Code: Bad RIP value. [ 188.428043][T10220] RSP: 002b:00007f26c2b3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 21:09:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xd, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 188.436442][T10220] RAX: ffffffffffffffda RBX: 0000000000504600 RCX: 000000000045cba9 [ 188.444564][T10220] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 188.452511][T10220] RBP: 000000000078bf00 R08: 0000000000000220 R09: 0000000000000000 [ 188.460459][T10220] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000004 [ 188.468406][T10220] R13: 0000000000000aa4 R14: 00000000004cd734 R15: 00007f26c2b3f6d4 21:09:10 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 188.538919][T10226] FAULT_INJECTION: forcing a failure. [ 188.538919][T10226] name failslab, interval 1, probability 0, space 0, times 0 [ 188.553391][T10226] CPU: 0 PID: 10226 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 188.562191][T10226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.572223][T10226] Call Trace: [ 188.575495][T10226] dump_stack+0x1f0/0x31e [ 188.579898][T10226] should_fail+0x38a/0x4e0 [ 188.584328][T10226] ? __kernfs_new_node+0x8b/0x630 [ 188.589338][T10226] should_failslab+0x5/0x20 [ 188.593820][T10226] kmem_cache_alloc+0x53/0x2d0 [ 188.598752][T10226] __kernfs_new_node+0x8b/0x630 [ 188.603676][T10226] ? kernfs_add_one+0x4b7/0x600 [ 188.608590][T10226] ? kernfs_add_one+0x4b7/0x600 [ 188.613421][T10226] ? __mutex_unlock_slowpath+0x12d/0x590 [ 188.619041][T10226] kernfs_new_node+0x95/0x160 [ 188.623706][T10226] __kernfs_create_file+0x45/0x2d0 [ 188.628794][T10226] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 188.634143][T10226] internal_create_group+0x445/0xd20 [ 188.639418][T10226] ? __loop_update_dio+0x240/0x580 [ 188.644517][T10226] loop_configure+0xdea/0x1370 [ 188.649264][T10226] lo_ioctl+0x68a/0x1fe0 [ 188.653486][T10226] ? trace_hardirqs_off+0x2d/0x70 [ 188.658487][T10226] ? trace_lock_release+0x137/0x1a0 [ 188.663674][T10226] ? blkdev_common_ioctl+0xf27/0x1b00 [ 188.669026][T10226] ? lo_release+0x1e0/0x1e0 [ 188.673527][T10226] blkdev_ioctl+0x2a6/0x5c0 [ 188.678044][T10226] block_ioctl+0xbc/0x100 [ 188.682358][T10226] ? blkdev_iopoll+0xf0/0xf0 [ 188.686930][T10226] __se_sys_ioctl+0xf9/0x160 [ 188.691510][T10226] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.697566][T10226] do_syscall_64+0x73/0xe0 [ 188.701958][T10226] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.707827][T10226] RIP: 0033:0x45ca77 [ 188.711713][T10226] Code: Bad RIP value. [ 188.715752][T10226] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 188.724155][T10226] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 188.732104][T10226] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 188.740057][T10226] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 188.748013][T10226] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 188.756232][T10226] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 188.778592][T10220] syz-executor.4: vmalloc: allocation failure: 256 bytes, mode:0x400cc0(GFP_KERNEL_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 188.792781][T10220] CPU: 1 PID: 10220 Comm: syz-executor.4 Not tainted 5.8.0-rc4-syzkaller #0 [ 188.801462][T10220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.811515][T10220] Call Trace: [ 188.814794][T10220] dump_stack+0x1f0/0x31e [ 188.819105][T10220] warn_alloc+0x17d/0x2c0 [ 188.823414][T10220] ? __get_vm_area_node+0x1bf/0x380 [ 188.828593][T10220] __vmalloc_node_range+0x29a/0x870 [ 188.833787][T10220] ? __might_fault+0xf5/0x150 [ 188.838442][T10220] ? do_replace+0x1b0/0x420 [ 188.842920][T10220] __vmalloc+0x75/0x80 [ 188.846985][T10220] ? do_replace+0x1b0/0x420 [ 188.851471][T10220] do_replace+0x1b0/0x420 [ 188.855800][T10220] do_ebt_set_ctl+0xf0/0x1b0 [ 188.860375][T10220] ? nf_setsockopt+0x271/0x2e0 [ 188.865208][T10220] ? __mutex_unlock_slowpath+0x12d/0x590 [ 188.870841][T10220] ? __fget_files+0x388/0x3c0 [ 188.875505][T10220] nf_setsockopt+0x2be/0x2e0 [ 188.880088][T10220] ? sock_common_recvmsg+0x190/0x190 [ 188.885354][T10220] __sys_setsockopt+0x564/0x710 [ 188.890389][T10220] __x64_sys_setsockopt+0xb1/0xc0 [ 188.895394][T10220] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.901435][T10220] do_syscall_64+0x73/0xe0 [ 188.905827][T10220] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.911696][T10220] RIP: 0033:0x45cba9 [ 188.915563][T10220] Code: Bad RIP value. [ 188.919601][T10220] RSP: 002b:00007f26c2b3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 188.927986][T10220] RAX: ffffffffffffffda RBX: 0000000000504600 RCX: 000000000045cba9 21:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xf, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 188.935941][T10220] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 188.943899][T10220] RBP: 000000000078bf00 R08: 0000000000000220 R09: 0000000000000000 [ 188.951855][T10220] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000004 [ 188.959810][T10220] R13: 0000000000000aa4 R14: 00000000004cd734 R15: 00007f26c2b3f6d4 21:09:11 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 189.198500][T10246] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 189.209316][T10220] Mem-Info: [ 189.219534][T10220] active_anon:162900 inactive_anon:4137 isolated_anon:0 [ 189.219534][T10220] active_file:6015 inactive_file:40336 isolated_file:0 [ 189.219534][T10220] unevictable:0 dirty:185 writeback:0 [ 189.219534][T10220] slab_reclaimable:19809 slab_unreclaimable:107538 [ 189.219534][T10220] mapped:59928 shmem:4355 pagetables:1207 bounce:0 [ 189.219534][T10220] free:1174189 free_pcp:644 free_cma:0 [ 189.260878][T10220] Node 0 active_anon:651600kB inactive_anon:16548kB active_file:23912kB inactive_file:161344kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:239712kB dirty:736kB writeback:0kB shmem:17420kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 401408kB writeback_tmp:0kB all_unreclaimable? no [ 189.289817][T10220] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB all_unreclaimable? no [ 189.317968][T10220] Node 0 DMA free:15904kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 189.344685][T10251] FAULT_INJECTION: forcing a failure. [ 189.344685][T10251] name failslab, interval 1, probability 0, space 0, times 0 [ 189.348037][T10220] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 189.360362][T10251] CPU: 1 PID: 10251 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 189.360369][T10251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.360374][T10251] Call Trace: [ 189.360394][T10251] dump_stack+0x1f0/0x31e [ 189.360408][T10251] should_fail+0x38a/0x4e0 [ 189.368341][T10220] Node 0 DMA32 free:920960kB min:36108kB low:45132kB high:54156kB reserved_highatomic:0KB active_anon:649464kB inactive_anon:16548kB active_file:23896kB inactive_file:161344kB unevictable:0kB writepending:736kB present:3129332kB managed:2600972kB mlocked:0kB kernel_stack:14300kB pagetables:4676kB bounce:0kB free_pcp:2504kB local_pcp:1240kB free_cma:0kB [ 189.374796][T10251] ? radix_tree_node_alloc+0x1a4/0x390 [ 189.385922][T10220] lowmem_reserve[]: 0 0 0 0 0 [ 189.388113][T10251] should_failslab+0x5/0x20 [ 189.392411][T10220] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:16kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:16kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 189.396819][T10251] kmem_cache_alloc+0x53/0x2d0 [ 189.396834][T10251] radix_tree_node_alloc+0x1a4/0x390 [ 189.396848][T10251] idr_get_free+0x2aa/0x8d0 [ 189.396866][T10251] idr_alloc_cyclic+0x16e/0x520 [ 189.396887][T10251] __kernfs_new_node+0xea/0x630 [ 189.396902][T10251] ? trace_lock_release+0x137/0x1a0 [ 189.396917][T10251] kernfs_create_dir_ns+0x90/0x220 [ 189.396931][T10251] internal_create_group+0x1e2/0xd20 [ 189.396948][T10251] ? __loop_update_dio+0x240/0x580 [ 189.436512][T10220] lowmem_reserve[]: 0 0 0 0 0 [ 189.439922][T10251] loop_configure+0xdea/0x1370 [ 189.444534][T10220] Node 1 Normal free:3762692kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 189.472825][T10251] lo_ioctl+0x68a/0x1fe0 [ 189.472834][T10251] ? trace_hardirqs_off+0x2d/0x70 [ 189.472846][T10251] ? trace_lock_release+0x137/0x1a0 [ 189.472882][T10251] ? blkdev_common_ioctl+0xf27/0x1b00 [ 189.472894][T10251] ? lo_release+0x1e0/0x1e0 [ 189.472903][T10251] blkdev_ioctl+0x2a6/0x5c0 [ 189.472922][T10251] block_ioctl+0xbc/0x100 [ 189.481988][T10220] lowmem_reserve[]: 0 0 0 0 0 [ 189.482926][T10251] ? blkdev_iopoll+0xf0/0xf0 [ 189.488270][T10220] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 189.492235][T10251] __se_sys_ioctl+0xf9/0x160 [ 189.497863][T10220] Node 0 DMA32: 9762*4kB (UME) 419*8kB (UME) 361*16kB (UME) 208*32kB (UME) 96*64kB (UME) 22*128kB (UME) 11*256kB (UME) 7*512kB (ME) 4*1024kB (UM) 3*2048kB (UME) 205*4096kB (M) = 920112kB [ 189.502264][T10251] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 189.508176][T10220] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 189.512605][T10251] do_syscall_64+0x73/0xe0 [ 189.518517][T10220] Node 1 Normal: 97*4kB (UME) 200*8kB (UM) 190*16kB (UME) 89*32kB (UME) 37*64kB (UME) 20*128kB (UME) 6*256kB (UE) 3*512kB (UE) 3*1024kB (UM) 2*2048kB (ME) 913*4096kB (M) = 3762692kB [ 189.522370][T10251] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 189.528124][T10220] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 189.557560][T10251] RIP: 0033:0x45ca77 [ 189.557566][T10251] Code: Bad RIP value. [ 189.557571][T10251] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.557580][T10251] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 189.557585][T10251] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 189.557590][T10251] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 189.557595][T10251] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 189.557600][T10251] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 189.804779][T10220] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 189.816535][T10220] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 189.827883][T10220] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 189.838461][T10220] 50644 total pagecache pages [ 189.843160][T10220] 0 pages in swap cache [ 189.868476][T10220] Swap cache stats: add 0, delete 0, find 0/0 [ 189.874581][T10220] Free swap = 0kB [ 189.879655][T10220] Total swap = 0kB [ 189.883486][T10220] 1965979 pages RAM [ 189.902181][T10220] 0 pages HighMem/MovableOnly [ 189.914760][T10220] 344206 pages reserved [ 189.941571][T10220] 0 pages cma reserved 21:09:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x1}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x10, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:12 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x11, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 190.105978][T10268] FAULT_INJECTION: forcing a failure. [ 190.105978][T10268] name failslab, interval 1, probability 0, space 0, times 0 [ 190.127080][T10273] xt_check_target: 13 callbacks suppressed [ 190.127088][T10273] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 190.137345][T10275] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 190.158575][T10268] CPU: 0 PID: 10268 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 190.167281][T10268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.177415][T10268] Call Trace: [ 190.180688][T10268] dump_stack+0x1f0/0x31e [ 190.185069][T10268] should_fail+0x38a/0x4e0 [ 190.189589][T10268] ? __kernfs_new_node+0x8b/0x630 [ 190.194602][T10268] should_failslab+0x5/0x20 [ 190.199212][T10268] kmem_cache_alloc+0x53/0x2d0 [ 190.203976][T10268] __kernfs_new_node+0x8b/0x630 [ 190.208823][T10268] ? kernfs_add_one+0x4b7/0x600 [ 190.213650][T10268] ? kernfs_add_one+0x4b7/0x600 [ 190.218483][T10268] ? __mutex_unlock_slowpath+0x12d/0x590 [ 190.224097][T10268] kernfs_new_node+0x95/0x160 [ 190.228752][T10268] __kernfs_create_file+0x45/0x2d0 [ 190.233864][T10268] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 190.239217][T10268] internal_create_group+0x445/0xd20 [ 190.244484][T10268] ? __loop_update_dio+0x240/0x580 [ 190.249611][T10268] loop_configure+0xdea/0x1370 [ 190.254361][T10268] lo_ioctl+0x68a/0x1fe0 [ 190.258586][T10268] ? trace_hardirqs_off+0x2d/0x70 [ 190.263605][T10268] ? trace_lock_release+0x137/0x1a0 [ 190.268824][T10268] ? blkdev_common_ioctl+0xf27/0x1b00 [ 190.274267][T10268] ? lo_release+0x1e0/0x1e0 [ 190.278749][T10268] blkdev_ioctl+0x2a6/0x5c0 [ 190.283236][T10268] block_ioctl+0xbc/0x100 [ 190.287555][T10268] ? blkdev_iopoll+0xf0/0xf0 [ 190.292182][T10268] __se_sys_ioctl+0xf9/0x160 [ 190.296763][T10268] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.302807][T10268] do_syscall_64+0x73/0xe0 [ 190.307292][T10268] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.313163][T10268] RIP: 0033:0x45ca77 [ 190.317035][T10268] Code: Bad RIP value. [ 190.321078][T10268] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 190.329475][T10268] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 190.337541][T10268] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 190.345759][T10268] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 21:09:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 190.353719][T10268] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 190.361673][T10268] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:12 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 190.407929][T10266] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x12, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 190.484584][T10282] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/421]}, 0x21d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x13, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 190.615451][T10293] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 190.653550][T10289] FAULT_INJECTION: forcing a failure. 21:09:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 190.653550][T10289] name failslab, interval 1, probability 0, space 0, times 0 [ 190.713750][T10289] CPU: 1 PID: 10289 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 190.722465][T10289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.733915][T10289] Call Trace: [ 190.737409][T10289] dump_stack+0x1f0/0x31e [ 190.741749][T10289] should_fail+0x38a/0x4e0 [ 190.744912][T10304] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 190.746159][T10289] ? getname_flags+0xb8/0x610 [ 190.746169][T10289] should_failslab+0x5/0x20 [ 190.746179][T10289] kmem_cache_alloc+0x53/0x2d0 [ 190.746193][T10289] getname_flags+0xb8/0x610 [ 190.746228][T10289] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.746237][T10289] do_mkdirat+0x3a/0x310 [ 190.746248][T10289] ? do_syscall_64+0x22/0xe0 [ 190.746259][T10289] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.746268][T10289] do_syscall_64+0x73/0xe0 [ 190.746279][T10289] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.746288][T10289] RIP: 0033:0x45c027 [ 190.746291][T10289] Code: Bad RIP value. [ 190.746297][T10289] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 190.746307][T10289] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 190.746316][T10289] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 190.802919][T10301] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 190.804442][T10289] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 190.804450][T10289] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 21:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x14, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 190.804456][T10289] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 190.830802][T10309] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 190.897813][T10304] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:13 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x15, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 191.020844][T10322] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 191.081017][T10330] FAULT_INJECTION: forcing a failure. [ 191.081017][T10330] name failslab, interval 1, probability 0, space 0, times 0 [ 191.103702][T10330] CPU: 0 PID: 10330 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 191.112410][T10330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.122469][T10330] Call Trace: [ 191.125768][T10330] dump_stack+0x1f0/0x31e [ 191.130098][T10330] should_fail+0x38a/0x4e0 [ 191.134605][T10330] ? __kernfs_new_node+0x8b/0x630 [ 191.139750][T10330] should_failslab+0x5/0x20 [ 191.144231][T10330] kmem_cache_alloc+0x53/0x2d0 [ 191.148975][T10330] __kernfs_new_node+0x8b/0x630 [ 191.153800][T10330] ? kernfs_add_one+0x4b7/0x600 [ 191.158627][T10330] ? kernfs_add_one+0x4b7/0x600 [ 191.163457][T10330] ? __mutex_unlock_slowpath+0x12d/0x590 [ 191.169065][T10330] kernfs_new_node+0x95/0x160 [ 191.173722][T10330] __kernfs_create_file+0x45/0x2d0 [ 191.178812][T10330] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 191.184167][T10330] internal_create_group+0x445/0xd20 [ 191.189433][T10330] ? __loop_update_dio+0x240/0x580 [ 191.194521][T10330] loop_configure+0xdea/0x1370 [ 191.199269][T10330] lo_ioctl+0x68a/0x1fe0 [ 191.203487][T10330] ? trace_hardirqs_off+0x2d/0x70 [ 191.208507][T10330] ? trace_lock_release+0x137/0x1a0 [ 191.213733][T10330] ? blkdev_common_ioctl+0xf27/0x1b00 [ 191.219114][T10330] ? lo_release+0x1e0/0x1e0 [ 191.223602][T10330] blkdev_ioctl+0x2a6/0x5c0 [ 191.228096][T10330] block_ioctl+0xbc/0x100 [ 191.232409][T10330] ? blkdev_iopoll+0xf0/0xf0 [ 191.236980][T10330] __se_sys_ioctl+0xf9/0x160 [ 191.241556][T10330] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.247603][T10330] do_syscall_64+0x73/0xe0 [ 191.251996][T10330] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.257882][T10330] RIP: 0033:0x45ca77 [ 191.261745][T10330] Code: Bad RIP value. [ 191.265789][T10330] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.274194][T10330] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 191.282153][T10330] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 191.290104][T10330] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 191.298060][T10330] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 191.306013][T10330] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:13 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:13 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 191.346581][T10329] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 191.385141][T10344] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x16, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/421]}, 0x21d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x17, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 191.579367][T10364] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 191.583609][T10362] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 191.600204][T10363] FAULT_INJECTION: forcing a failure. [ 191.600204][T10363] name failslab, interval 1, probability 0, space 0, times 0 21:09:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x18, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:13 executing program 1: socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 191.633999][T10363] CPU: 0 PID: 10363 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 191.642704][T10363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.652754][T10363] Call Trace: [ 191.656050][T10363] dump_stack+0x1f0/0x31e [ 191.660384][T10363] should_fail+0x38a/0x4e0 [ 191.664805][T10363] ? __kernfs_new_node+0x8b/0x630 [ 191.669825][T10363] should_failslab+0x5/0x20 [ 191.674416][T10363] kmem_cache_alloc+0x53/0x2d0 [ 191.679168][T10363] __kernfs_new_node+0x8b/0x630 [ 191.684114][T10363] ? kernfs_add_one+0x4b7/0x600 [ 191.688947][T10363] ? kernfs_add_one+0x4b7/0x600 [ 191.693776][T10363] ? __mutex_unlock_slowpath+0x12d/0x590 [ 191.699398][T10363] kernfs_new_node+0x95/0x160 [ 191.704184][T10363] __kernfs_create_file+0x45/0x2d0 [ 191.709330][T10363] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 191.714768][T10363] internal_create_group+0x445/0xd20 [ 191.720069][T10363] ? __loop_update_dio+0x240/0x580 [ 191.725173][T10363] loop_configure+0xdea/0x1370 [ 191.729932][T10363] lo_ioctl+0x68a/0x1fe0 [ 191.734154][T10363] ? trace_hardirqs_off+0x2d/0x70 [ 191.739185][T10363] ? trace_lock_release+0x137/0x1a0 [ 191.744383][T10363] ? blkdev_common_ioctl+0xf27/0x1b00 [ 191.749757][T10363] ? lo_release+0x1e0/0x1e0 [ 191.754238][T10363] blkdev_ioctl+0x2a6/0x5c0 [ 191.758734][T10363] block_ioctl+0xbc/0x100 [ 191.763042][T10363] ? blkdev_iopoll+0xf0/0xf0 [ 191.767609][T10363] __se_sys_ioctl+0xf9/0x160 [ 191.772180][T10363] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.778230][T10363] do_syscall_64+0x73/0xe0 [ 191.782623][T10363] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.788504][T10363] RIP: 0033:0x45ca77 [ 191.792374][T10363] Code: Bad RIP value. [ 191.796436][T10363] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.804935][T10363] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 191.812897][T10363] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 191.820856][T10363] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 191.828809][T10363] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 191.836804][T10363] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:14 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x19, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:14 executing program 1: socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x21, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe8000"/318]}, 0x1b6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 192.122162][T10390] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 192.213775][T10410] FAULT_INJECTION: forcing a failure. [ 192.213775][T10410] name failslab, interval 1, probability 0, space 0, times 0 [ 192.231405][T10410] CPU: 1 PID: 10410 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 192.240115][T10410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.250172][T10410] Call Trace: [ 192.253470][T10410] dump_stack+0x1f0/0x31e [ 192.257806][T10410] should_fail+0x38a/0x4e0 21:09:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:14 executing program 1: socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x22, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 192.262235][T10410] ? __kernfs_new_node+0x8b/0x630 [ 192.267269][T10410] should_failslab+0x5/0x20 [ 192.271795][T10410] kmem_cache_alloc+0x53/0x2d0 [ 192.276569][T10410] __kernfs_new_node+0x8b/0x630 [ 192.281421][T10410] ? kernfs_add_one+0x4b7/0x600 [ 192.286283][T10410] ? kernfs_add_one+0x4b7/0x600 [ 192.291139][T10410] ? __mutex_unlock_slowpath+0x12d/0x590 [ 192.296951][T10410] kernfs_new_node+0x95/0x160 [ 192.301633][T10410] __kernfs_create_file+0x45/0x2d0 [ 192.306748][T10410] sysfs_add_file_mode_ns+0x2fe/0x3c0 21:09:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 192.312125][T10410] internal_create_group+0x445/0xd20 [ 192.317417][T10410] ? __loop_update_dio+0x240/0x580 [ 192.322537][T10410] loop_configure+0xdea/0x1370 [ 192.327345][T10410] lo_ioctl+0x68a/0x1fe0 [ 192.331758][T10410] ? trace_hardirqs_off+0x2d/0x70 [ 192.336779][T10410] ? trace_lock_release+0x137/0x1a0 [ 192.342171][T10410] ? blkdev_common_ioctl+0xf27/0x1b00 [ 192.347580][T10410] ? lo_release+0x1e0/0x1e0 [ 192.352073][T10410] blkdev_ioctl+0x2a6/0x5c0 [ 192.356576][T10410] block_ioctl+0xbc/0x100 [ 192.360891][T10410] ? blkdev_iopoll+0xf0/0xf0 [ 192.365477][T10410] __se_sys_ioctl+0xf9/0x160 [ 192.370060][T10410] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.376111][T10410] do_syscall_64+0x73/0xe0 [ 192.380513][T10410] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.386383][T10410] RIP: 0033:0x45ca77 [ 192.390253][T10410] Code: Bad RIP value. [ 192.394308][T10410] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.402705][T10410] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045ca77 [ 192.410744][T10410] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 192.418914][T10410] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 192.426878][T10410] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 192.434831][T10410] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:14 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:14 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x23, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:14 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x5, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 192.653956][T10430] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x24, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 192.729582][T10447] FAULT_INJECTION: forcing a failure. [ 192.729582][T10447] name failslab, interval 1, probability 0, space 0, times 0 [ 192.752419][T10447] CPU: 0 PID: 10447 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 192.761125][T10447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.771180][T10447] Call Trace: [ 192.774482][T10447] dump_stack+0x1f0/0x31e 21:09:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 192.778819][T10447] should_fail+0x38a/0x4e0 [ 192.783246][T10447] ? __d_alloc+0x2a/0x6d0 [ 192.787588][T10447] should_failslab+0x5/0x20 [ 192.792094][T10447] kmem_cache_alloc+0x53/0x2d0 [ 192.796866][T10447] __d_alloc+0x2a/0x6d0 [ 192.801023][T10447] ? read_seqbegin+0x122/0x1c0 [ 192.805790][T10447] d_alloc+0x48/0x1d0 [ 192.809775][T10447] __lookup_hash+0xc8/0x240 [ 192.814306][T10447] filename_create+0x14b/0x630 [ 192.819084][T10447] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.825154][T10447] do_mkdirat+0x56/0x310 21:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x25, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 192.829407][T10447] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.835472][T10447] do_syscall_64+0x73/0xe0 [ 192.839992][T10447] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.845989][T10447] RIP: 0033:0x45c027 [ 192.849979][T10447] Code: Bad RIP value. [ 192.854046][T10447] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 192.862564][T10447] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 192.870524][T10447] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 21:09:15 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 192.878603][T10447] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 192.886558][T10447] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 192.894506][T10447] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x26, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:15 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:15 executing program 1: socket$unix(0x1, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x27, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 192.987161][T10459] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:15 executing program 1: socket$unix(0x1, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x28, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 193.141199][T10487] FAULT_INJECTION: forcing a failure. [ 193.141199][T10487] name failslab, interval 1, probability 0, space 0, times 0 21:09:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 193.198078][T10487] CPU: 0 PID: 10487 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 193.206792][T10487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.217007][T10487] Call Trace: [ 193.220280][T10487] dump_stack+0x1f0/0x31e [ 193.224609][T10487] should_fail+0x38a/0x4e0 [ 193.229047][T10487] ? tomoyo_realpath_from_path+0xd8/0x630 [ 193.234758][T10487] should_failslab+0x5/0x20 [ 193.239253][T10487] __kmalloc+0x74/0x330 [ 193.243403][T10487] ? tomoyo_realpath_from_path+0xcb/0x630 [ 193.249099][T10487] tomoyo_realpath_from_path+0xd8/0x630 [ 193.254626][T10487] tomoyo_path_number_perm+0x18f/0x690 [ 193.260063][T10487] ? mark_lock+0x102/0x1b00 [ 193.264561][T10487] ? lock_is_held_type+0x87/0xe0 [ 193.269495][T10487] tomoyo_path_mkdir+0x98/0xc0 [ 193.274254][T10487] security_path_mkdir+0xd5/0x160 [ 193.279270][T10487] do_mkdirat+0x14e/0x310 [ 193.283585][T10487] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.289640][T10487] do_syscall_64+0x73/0xe0 [ 193.294051][T10487] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.299920][T10487] RIP: 0033:0x45c027 [ 193.303786][T10487] Code: Bad RIP value. [ 193.307854][T10487] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 193.316273][T10487] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 193.324245][T10487] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 193.332203][T10487] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 193.340152][T10487] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 21:09:15 executing program 1: socket$unix(0x1, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 193.348119][T10487] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 193.369538][T10487] ERROR: Out of memory at tomoyo_realpath_from_path. [ 193.391345][T10493] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:15 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x29, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:15 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2a, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 193.736807][T10522] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:15 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 193.821356][T10535] FAULT_INJECTION: forcing a failure. [ 193.821356][T10535] name failslab, interval 1, probability 0, space 0, times 0 [ 193.840810][T10535] CPU: 1 PID: 10535 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 193.849655][T10535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.859722][T10535] Call Trace: [ 193.863024][T10535] dump_stack+0x1f0/0x31e [ 193.867366][T10535] should_fail+0x38a/0x4e0 [ 193.871789][T10535] ? tomoyo_realpath_from_path+0xd8/0x630 [ 193.877506][T10535] should_failslab+0x5/0x20 [ 193.882009][T10535] __kmalloc+0x74/0x330 [ 193.886185][T10535] ? tomoyo_realpath_from_path+0xcb/0x630 [ 193.891916][T10535] tomoyo_realpath_from_path+0xd8/0x630 [ 193.897485][T10535] tomoyo_path_number_perm+0x18f/0x690 [ 193.903065][T10535] ? mark_lock+0x102/0x1b00 [ 193.907579][T10535] ? lock_is_held_type+0x87/0xe0 [ 193.912630][T10535] tomoyo_path_mkdir+0x98/0xc0 [ 193.917378][T10535] security_path_mkdir+0xd5/0x160 [ 193.922386][T10535] do_mkdirat+0x14e/0x310 [ 193.926712][T10535] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.932767][T10535] do_syscall_64+0x73/0xe0 [ 193.937173][T10535] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.943049][T10535] RIP: 0033:0x45c027 [ 193.946922][T10535] Code: Bad RIP value. [ 193.950973][T10535] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 193.959363][T10535] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 21:09:16 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2b, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x8, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 193.967320][T10535] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 193.975292][T10535] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 193.983252][T10535] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 193.991279][T10535] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 194.008295][T10535] ERROR: Out of memory at tomoyo_realpath_from_path. [ 194.075654][T10545] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:16 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2c, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:16 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:16 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2d, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:16 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 194.278598][T10571] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x9, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 194.382259][T10578] FAULT_INJECTION: forcing a failure. [ 194.382259][T10578] name failslab, interval 1, probability 0, space 0, times 0 [ 194.404606][T10578] CPU: 0 PID: 10578 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 194.413325][T10578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.423562][T10578] Call Trace: [ 194.426879][T10578] dump_stack+0x1f0/0x31e [ 194.431215][T10578] should_fail+0x38a/0x4e0 [ 194.435644][T10578] ? tomoyo_realpath_from_path+0xd8/0x630 [ 194.441370][T10578] should_failslab+0x5/0x20 [ 194.445892][T10578] __kmalloc+0x74/0x330 [ 194.450054][T10578] ? tomoyo_realpath_from_path+0xcb/0x630 [ 194.455780][T10578] tomoyo_realpath_from_path+0xd8/0x630 [ 194.461342][T10578] tomoyo_path_number_perm+0x18f/0x690 [ 194.466808][T10578] ? mark_lock+0x102/0x1b00 [ 194.471340][T10578] ? lock_is_held_type+0x87/0xe0 [ 194.476285][T10578] tomoyo_path_mkdir+0x98/0xc0 21:09:16 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/418]}, 0x21a) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:16 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2e, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 194.481056][T10578] security_path_mkdir+0xd5/0x160 [ 194.486209][T10578] do_mkdirat+0x14e/0x310 [ 194.490537][T10578] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 194.496773][T10578] do_syscall_64+0x73/0xe0 [ 194.501173][T10578] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 194.507161][T10578] RIP: 0033:0x45c027 [ 194.511045][T10578] Code: Bad RIP value. [ 194.515219][T10578] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 194.523884][T10578] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 194.532507][T10578] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 194.540471][T10578] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 194.548448][T10578] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 194.556422][T10578] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 194.582358][T10578] ERROR: Out of memory at tomoyo_realpath_from_path. [ 194.615822][T10593] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:16 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:16 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/418]}, 0x21a) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:16 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2f, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:16 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/418]}, 0x21a) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:16 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x30, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x31, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:17 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:17 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 194.929079][T10630] FAULT_INJECTION: forcing a failure. [ 194.929079][T10630] name failslab, interval 1, probability 0, space 0, times 0 [ 194.960613][T10628] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 194.972070][T10630] CPU: 1 PID: 10630 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 194.980866][T10630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.990958][T10630] Call Trace: [ 194.994257][T10630] dump_stack+0x1f0/0x31e [ 194.998714][T10630] should_fail+0x38a/0x4e0 [ 195.003143][T10630] ? ext4_alloc_inode+0x1b/0x500 [ 195.008084][T10630] should_failslab+0x5/0x20 [ 195.012595][T10630] kmem_cache_alloc+0x53/0x2d0 [ 195.017366][T10630] ? set_qf_name+0x3d0/0x3d0 [ 195.021959][T10630] ext4_alloc_inode+0x1b/0x500 [ 195.026849][T10630] ? set_qf_name+0x3d0/0x3d0 [ 195.031625][T10630] new_inode_pseudo+0x64/0x240 [ 195.036401][T10630] new_inode+0x25/0x1d0 [ 195.040558][T10630] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 195.046117][T10630] __ext4_new_inode+0x561/0x5180 [ 195.051067][T10630] ? __dquot_initialize+0x1b3/0xc30 [ 195.056277][T10630] ext4_mkdir+0x3be/0x14c0 [ 195.060713][T10630] vfs_mkdir+0x42a/0x620 [ 195.064960][T10630] do_mkdirat+0x1b9/0x310 [ 195.069394][T10630] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.075579][T10630] do_syscall_64+0x73/0xe0 [ 195.079983][T10630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.085865][T10630] RIP: 0033:0x45c027 [ 195.089741][T10630] Code: Bad RIP value. [ 195.093794][T10630] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 195.102186][T10630] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 195.110279][T10630] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 195.118236][T10630] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 195.126207][T10630] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 195.134176][T10630] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:17 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:17 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x32, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:17 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/421]}, 0x21d) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xb, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 195.304816][T10662] xt_check_target: 23 callbacks suppressed [ 195.304826][T10662] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 195.318833][T10664] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:17 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/421]}, 0x21d) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 195.370927][T10667] FAULT_INJECTION: forcing a failure. [ 195.370927][T10667] name failslab, interval 1, probability 0, space 0, times 0 [ 195.393226][T10670] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 [ 195.409803][T10667] CPU: 0 PID: 10667 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 195.418501][T10667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.428647][T10667] Call Trace: [ 195.431920][T10667] dump_stack+0x1f0/0x31e [ 195.436248][T10667] should_fail+0x38a/0x4e0 [ 195.440644][T10667] ? kcalloc+0x32/0x60 [ 195.444695][T10667] should_failslab+0x5/0x20 [ 195.449174][T10667] __kmalloc+0x74/0x330 [ 195.453315][T10667] kcalloc+0x32/0x60 [ 195.457191][T10667] ext4_find_extent+0x252/0xd30 [ 195.462156][T10667] ? trace_ext4_ext_map_blocks_enter+0x28d/0x2d0 [ 195.468480][T10667] ext4_ext_map_blocks+0x149/0x6d20 [ 195.473684][T10667] ? trace_lock_release+0x137/0x1a0 [ 195.478861][T10667] ? lock_acquire+0x160/0x720 [ 195.483522][T10667] ? ext4_map_blocks+0x294/0x19e0 [ 195.488527][T10667] ? __down_read+0x152/0x360 [ 195.493127][T10667] ext4_map_blocks+0x409/0x19e0 [ 195.497970][T10667] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 195.503495][T10667] ext4_getblk+0xa4/0x460 [ 195.507806][T10667] ext4_bread+0x48/0x330 [ 195.512027][T10667] ext4_append+0x153/0x2d0 [ 195.516426][T10667] ext4_mkdir+0x75f/0x14c0 [ 195.520828][T10667] vfs_mkdir+0x42a/0x620 [ 195.525090][T10667] do_mkdirat+0x1b9/0x310 [ 195.529416][T10667] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.535463][T10667] do_syscall_64+0x73/0xe0 [ 195.539856][T10667] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.545741][T10667] RIP: 0033:0x45c027 [ 195.549606][T10667] Code: Bad RIP value. [ 195.553680][T10667] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 195.562073][T10667] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 21:09:17 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xc, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 195.570031][T10667] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 195.577977][T10667] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 195.585931][T10667] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 195.593896][T10667] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x10, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:17 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x30, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:17 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:17 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/423]}, 0x21f) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 195.800615][T10693] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x50, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 195.884004][T10693] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:18 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 195.972650][T10710] FAULT_INJECTION: forcing a failure. [ 195.972650][T10710] name failslab, interval 1, probability 0, space 0, times 0 [ 195.986253][T10710] CPU: 1 PID: 10710 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 195.994937][T10710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.004995][T10710] Call Trace: [ 196.008298][T10710] dump_stack+0x1f0/0x31e [ 196.012631][T10710] should_fail+0x38a/0x4e0 [ 196.017053][T10710] ? ext4_alloc_inode+0x1b/0x500 21:09:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xd, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 196.022000][T10710] should_failslab+0x5/0x20 [ 196.026509][T10710] kmem_cache_alloc+0x53/0x2d0 [ 196.031283][T10710] ? set_qf_name+0x3d0/0x3d0 [ 196.035905][T10710] ext4_alloc_inode+0x1b/0x500 [ 196.040668][T10710] ? set_qf_name+0x3d0/0x3d0 [ 196.045264][T10710] new_inode_pseudo+0x64/0x240 [ 196.050034][T10710] new_inode+0x25/0x1d0 [ 196.054197][T10710] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 196.059749][T10710] __ext4_new_inode+0x561/0x5180 [ 196.064697][T10710] ? __dquot_initialize+0x1b3/0xc30 [ 196.069924][T10710] ext4_mkdir+0x3be/0x14c0 [ 196.071901][T10719] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 196.074355][T10710] vfs_mkdir+0x42a/0x620 [ 196.074387][T10710] do_mkdirat+0x1b9/0x310 [ 196.074406][T10710] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 196.097621][T10710] do_syscall_64+0x73/0xe0 [ 196.102044][T10710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 196.107943][T10710] RIP: 0033:0x45c027 [ 196.111839][T10710] Code: Bad RIP value. 21:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x70, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:18 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 196.115904][T10710] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 196.124335][T10710] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 196.132331][T10710] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 196.140301][T10710] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 196.148280][T10710] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 196.156258][T10710] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/423]}, 0x21f) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) [ 196.193890][T10725] BFS-fs: bfs_fill_super(): Inode 0x00000008 corrupted on loop2 21:09:18 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:18 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x3, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xe, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r4) 21:09:18 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 196.450491][T10751] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x300, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 196.508973][T10755] FAULT_INJECTION: forcing a failure. [ 196.508973][T10755] name failslab, interval 1, probability 0, space 0, times 0 [ 196.546584][T10755] CPU: 1 PID: 10755 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 21:09:18 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 196.555378][T10755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.565615][T10755] Call Trace: [ 196.568919][T10755] dump_stack+0x1f0/0x31e [ 196.573348][T10755] should_fail+0x38a/0x4e0 [ 196.577783][T10755] ? kcalloc+0x32/0x60 [ 196.579749][T10765] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 196.581846][T10755] should_failslab+0x5/0x20 [ 196.594971][T10755] __kmalloc+0x74/0x330 [ 196.599140][T10755] kcalloc+0x32/0x60 [ 196.603039][T10755] ext4_find_extent+0x252/0xd30 21:09:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)) setfsuid(0x0) [ 196.607991][T10755] ? trace_ext4_ext_map_blocks_enter+0x28d/0x2d0 [ 196.614326][T10755] ext4_ext_map_blocks+0x149/0x6d20 [ 196.619539][T10755] ? trace_lock_release+0x137/0x1a0 [ 196.624748][T10755] ? lock_acquire+0x160/0x720 [ 196.629425][T10755] ? ext4_map_blocks+0x294/0x19e0 [ 196.634457][T10755] ? __down_read+0x152/0x360 [ 196.639055][T10755] ext4_map_blocks+0x409/0x19e0 [ 196.643914][T10755] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 196.649476][T10755] ext4_getblk+0xa4/0x460 [ 196.653826][T10755] ext4_bread+0x48/0x330 [ 196.658082][T10755] ext4_append+0x153/0x2d0 [ 196.662507][T10755] ext4_mkdir+0x75f/0x14c0 [ 196.666959][T10755] vfs_mkdir+0x42a/0x620 [ 196.671209][T10755] do_mkdirat+0x1b9/0x310 [ 196.675553][T10755] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 196.681617][T10755] do_syscall_64+0x73/0xe0 [ 196.686123][T10755] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 196.692024][T10755] RIP: 0033:0x45c027 [ 196.695909][T10755] Code: Bad RIP value. [ 196.699968][T10755] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 21:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x18bf0d, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 196.708383][T10755] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 196.716357][T10755] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 196.724327][T10755] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 196.732303][T10755] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 196.740453][T10755] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:18 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x10, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:19 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:19 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) [ 196.897779][T10780] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 196.914553][T10790] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:19 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, 0x0}, 0x220) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 196.992859][T10792] FAULT_INJECTION: forcing a failure. [ 196.992859][T10792] name failslab, interval 1, probability 0, space 0, times 0 [ 197.005937][T10792] CPU: 1 PID: 10792 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 197.014635][T10792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.025004][T10792] Call Trace: [ 197.028472][T10792] dump_stack+0x1f0/0x31e [ 197.032950][T10792] should_fail+0x38a/0x4e0 [ 197.037484][T10792] ? __es_insert_extent+0x7a4/0x1770 [ 197.042769][T10792] should_failslab+0x5/0x20 [ 197.047294][T10792] kmem_cache_alloc+0x53/0x2d0 [ 197.052077][T10792] __es_insert_extent+0x7a4/0x1770 [ 197.057190][T10792] ? ext4_es_insert_extent+0x1c1/0x2c30 [ 197.062741][T10792] ? do_raw_write_lock+0xf1/0x440 [ 197.067778][T10792] ext4_es_insert_extent+0x22b/0x2c30 [ 197.073161][T10792] ? lock_is_held_type+0x87/0xe0 [ 197.078110][T10792] ext4_ext_map_blocks+0x13f0/0x6d20 [ 197.083413][T10792] ? trace_lock_release+0x137/0x1a0 [ 197.088622][T10792] ? lock_acquire+0x160/0x720 [ 197.093286][T10792] ? ext4_map_blocks+0x294/0x19e0 [ 197.098294][T10792] ? __down_read+0x152/0x360 [ 197.102957][T10792] ext4_map_blocks+0x409/0x19e0 [ 197.107790][T10792] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 197.113316][T10792] ext4_getblk+0xa4/0x460 [ 197.117627][T10792] ext4_bread+0x48/0x330 [ 197.121846][T10792] ext4_append+0x153/0x2d0 [ 197.126242][T10792] ext4_mkdir+0x75f/0x14c0 [ 197.130665][T10792] vfs_mkdir+0x42a/0x620 [ 197.134896][T10792] do_mkdirat+0x1b9/0x310 [ 197.139220][T10792] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 197.145273][T10792] do_syscall_64+0x73/0xe0 [ 197.149691][T10792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 197.155560][T10792] RIP: 0033:0x45c027 [ 197.159432][T10792] Code: Bad RIP value. [ 197.163485][T10792] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 197.171870][T10792] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 197.179818][T10792] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 21:09:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 197.187766][T10792] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 197.195714][T10792] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 197.203662][T10792] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 [ 197.251474][T10802] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:19 executing program 0: 21:09:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x11, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:19 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 197.380319][T10810] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x80000001, 0x0, 0x8001, 0x0, "d8538927fc213d81558228453b77db136a0f24", 0xffff, 0x8001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x4000000a, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) sendto$inet6(r0, &(0x7f0000000300)="0503d03206023e0e01a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 21:09:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1ffffa, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:19 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:19 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x12, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:19 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x7e, &(0x7f0000000940)=ANY=[@ANYBLOB="ffffff00ffffaaaa3804000086dd60a4f00800483aff033c0000000000000000000000000000ff20000000d0d8809d000000000000010205e2b0ed65a3dd440000fe800000c21a0000000000bbfe8000000000000000000000000000bb2e000000001e00000401030001000000000022ebffff0400b001dea00738b373e170455006250303cb6c49e87d67a90fedfee93f9a31c57fe32a0e50724579540f31f8ff1db6698e5d121bcfd953f910ccc714955cb800000000000000000000000000fe66cdad9d294b2bb1f9f178b08ec08bc37b148a16622ae100e98b92"], 0x0) socket(0x2, 0x803, 0xff) syz_emit_ethernet(0x86, &(0x7f00000007c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "42bf00", 0x50, 0x3a, 0x0, @private2={0xfc, 0x2, [], 0x1}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7c, {0x0, 0x6, "7f112d", 0x8001, 0x29, 0x0, @mcast1, @mcast2, [@dstopts={0x2f, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3a]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast2]}]}}}}}}}, 0x0) r0 = dup(0xffffffffffffffff) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000000)) 21:09:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) [ 197.899595][T10841] FAULT_INJECTION: forcing a failure. [ 197.899595][T10841] name failslab, interval 1, probability 0, space 0, times 0 [ 197.975558][T10841] CPU: 1 PID: 10841 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 197.984273][T10841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.994331][T10841] Call Trace: [ 197.997653][T10841] dump_stack+0x1f0/0x31e [ 198.001968][T10841] should_fail+0x38a/0x4e0 [ 198.006365][T10841] ? kcalloc+0x32/0x60 [ 198.010411][T10841] should_failslab+0x5/0x20 [ 198.014979][T10841] __kmalloc+0x74/0x330 [ 198.019234][T10841] kcalloc+0x32/0x60 [ 198.023116][T10841] ext4_find_extent+0x252/0xd30 [ 198.027953][T10841] ? trace_ext4_ext_map_blocks_enter+0x28d/0x2d0 [ 198.034263][T10841] ext4_ext_map_blocks+0x149/0x6d20 [ 198.039451][T10841] ? lock_acquire+0x160/0x720 [ 198.044117][T10841] ? ext4_map_blocks+0x7ea/0x19e0 [ 198.049132][T10841] ext4_map_blocks+0x8c1/0x19e0 [ 198.053992][T10841] ext4_getblk+0xa4/0x460 [ 198.059015][T10841] ext4_bread+0x48/0x330 [ 198.063236][T10841] ext4_append+0x153/0x2d0 [ 198.067633][T10841] ext4_mkdir+0x75f/0x14c0 [ 198.072035][T10841] vfs_mkdir+0x42a/0x620 [ 198.076259][T10841] do_mkdirat+0x1b9/0x310 [ 198.080567][T10841] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 198.086607][T10841] do_syscall_64+0x73/0xe0 [ 198.091027][T10841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 198.096908][T10841] RIP: 0033:0x45c027 [ 198.100780][T10841] Code: Bad RIP value. [ 198.104833][T10841] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 198.113223][T10841] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 21:09:20 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x25, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:20 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x3) [ 198.121173][T10841] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 198.129210][T10841] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 198.137245][T10841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 198.145194][T10841] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0xffffff1f, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:20 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000080), 0x4) 21:09:20 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x30, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:20 executing program 0: openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r3) 21:09:20 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 198.558844][T10892] FAULT_INJECTION: forcing a failure. [ 198.558844][T10892] name failslab, interval 1, probability 0, space 0, times 0 [ 198.593908][T10892] CPU: 1 PID: 10892 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 198.602625][T10892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.612787][T10892] Call Trace: [ 198.616091][T10892] dump_stack+0x1f0/0x31e [ 198.620437][T10892] should_fail+0x38a/0x4e0 [ 198.624880][T10892] ? kcalloc+0x32/0x60 [ 198.628955][T10892] should_failslab+0x5/0x20 [ 198.633456][T10892] __kmalloc+0x74/0x330 [ 198.637624][T10892] kcalloc+0x32/0x60 [ 198.641523][T10892] ext4_find_extent+0x252/0xd30 [ 198.646403][T10892] ? trace_ext4_ext_map_blocks_enter+0x28d/0x2d0 [ 198.652747][T10892] ext4_ext_map_blocks+0x149/0x6d20 21:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:20 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 198.657967][T10892] ? lock_acquire+0x160/0x720 [ 198.662645][T10892] ? ext4_map_blocks+0x7ea/0x19e0 [ 198.667685][T10892] ext4_map_blocks+0x8c1/0x19e0 [ 198.672587][T10892] ext4_getblk+0xa4/0x460 [ 198.676921][T10892] ext4_bread+0x48/0x330 [ 198.681161][T10892] ext4_append+0x153/0x2d0 [ 198.685580][T10892] ext4_mkdir+0x75f/0x14c0 [ 198.690009][T10892] vfs_mkdir+0x42a/0x620 [ 198.694255][T10892] do_mkdirat+0x1b9/0x310 [ 198.698591][T10892] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 198.704650][T10892] do_syscall_64+0x73/0xe0 [ 198.709049][T10892] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 198.715034][T10892] RIP: 0033:0x45c027 [ 198.718914][T10892] Code: Bad RIP value. [ 198.722958][T10892] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 198.731467][T10892] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 198.739439][T10892] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 198.747515][T10892] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 198.755488][T10892] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 198.763574][T10892] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="fc0000004a00070100008000090007000a0180fe000700000000e293210001c000000000000000000000000000000001fa2c1ec28656aaa79bb94b46fe000000bc0202000003666e256f1a272fdf0d11512fd606000000000000008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a322038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf8c407e5c8d81702cf255b5d9896a06190215b2ccd243f24fed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fe8dfffffffff000000008a873c", 0xfc) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) 21:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x20000628, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:21 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x48, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x2, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:21 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) [ 199.011430][T10933] FAULT_INJECTION: forcing a failure. [ 199.011430][T10933] name failslab, interval 1, probability 0, space 0, times 0 [ 199.024142][T10933] CPU: 1 PID: 10933 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 199.032809][T10933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.042848][T10933] Call Trace: [ 199.046137][T10933] dump_stack+0x1f0/0x31e [ 199.050472][T10933] should_fail+0x38a/0x4e0 [ 199.054912][T10933] ? __es_insert_extent+0x7a4/0x1770 21:09:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) 21:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x6, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 199.060197][T10933] should_failslab+0x5/0x20 [ 199.064700][T10933] kmem_cache_alloc+0x53/0x2d0 [ 199.069468][T10933] __es_insert_extent+0x7a4/0x1770 [ 199.074599][T10933] ext4_es_insert_extent+0x22b/0x2c30 [ 199.079988][T10933] ext4_map_blocks+0xdad/0x19e0 [ 199.084853][T10933] ext4_getblk+0xa4/0x460 [ 199.089185][T10933] ext4_bread+0x48/0x330 [ 199.093433][T10933] ext4_append+0x153/0x2d0 [ 199.097860][T10933] ext4_mkdir+0x75f/0x14c0 [ 199.102297][T10933] vfs_mkdir+0x42a/0x620 [ 199.106560][T10933] do_mkdirat+0x1b9/0x310 21:09:21 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f74"]}, 0x14c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 199.110904][T10933] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 199.116972][T10933] do_syscall_64+0x73/0xe0 [ 199.121394][T10933] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 199.127290][T10933] RIP: 0033:0x45c027 [ 199.131170][T10933] Code: Bad RIP value. [ 199.135321][T10933] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 199.143724][T10933] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 199.151683][T10933] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 199.159753][T10933] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 199.168597][T10933] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 199.176570][T10933] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000200)={0x80000000, 0x14a, &(0x7f0000000140)="95b79f442559bf619fc13a2d5abd5a0857be920762e7410da6a4f5a751927fa222fdd98626b826a448865fb4e125", &(0x7f00000001c0)="aec5503f", 0x2e, 0x4}) 21:09:21 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x8, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4c, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:09:21 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe8000"/318]}, 0x1b6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x10, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) [ 199.531658][T10965] FAULT_INJECTION: forcing a failure. [ 199.531658][T10965] name failslab, interval 1, probability 0, space 0, times 0 [ 199.600648][T10977] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 199.621428][T10965] CPU: 1 PID: 10965 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 199.630139][T10965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.640204][T10965] Call Trace: [ 199.643500][T10965] dump_stack+0x1f0/0x31e 21:09:21 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 199.647834][T10965] should_fail+0x38a/0x4e0 [ 199.652266][T10965] ? ext4_mb_new_blocks+0x3d4/0x1710 [ 199.657550][T10965] should_failslab+0x5/0x20 [ 199.662053][T10965] kmem_cache_alloc+0x53/0x2d0 [ 199.666844][T10965] ext4_mb_new_blocks+0x3d4/0x1710 [ 199.671961][T10965] ext4_ext_map_blocks+0x2ad5/0x6d20 [ 199.677241][T10965] ? ext4_map_blocks+0x7ea/0x19e0 [ 199.682271][T10965] ext4_map_blocks+0x8c1/0x19e0 [ 199.687138][T10965] ext4_getblk+0xa4/0x460 [ 199.691506][T10965] ext4_bread+0x48/0x330 [ 199.695756][T10965] ext4_append+0x153/0x2d0 21:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x11, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) [ 199.700181][T10965] ext4_mkdir+0x75f/0x14c0 [ 199.702875][T10977] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.704607][T10965] vfs_mkdir+0x42a/0x620 [ 199.704625][T10965] do_mkdirat+0x1b9/0x310 [ 199.714595][T10977] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.716128][T10965] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 199.716139][T10965] do_syscall_64+0x73/0xe0 [ 199.716151][T10965] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 199.716160][T10965] RIP: 0033:0x45c027 [ 199.716165][T10965] Code: Bad RIP value. [ 199.716176][T10965] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 199.716188][T10965] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 199.716194][T10965] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 199.716199][T10965] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 199.716204][T10965] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 199.716210][T10965] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:21 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)=0x80000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1) 21:09:22 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/318]}, 0x1b6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x30, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:22 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x50, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) 21:09:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x50, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) 21:09:22 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 200.063044][T11005] FAULT_INJECTION: forcing a failure. [ 200.063044][T11005] name failslab, interval 1, probability 0, space 0, times 0 [ 200.095739][T11005] CPU: 0 PID: 11005 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 21:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x88, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 200.104447][T11005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.114501][T11005] Call Trace: [ 200.117795][T11005] dump_stack+0x1f0/0x31e [ 200.122181][T11005] should_fail+0x38a/0x4e0 [ 200.126607][T11005] ? ext4_mb_new_blocks+0x2b6/0x1710 [ 200.131892][T11005] should_failslab+0x5/0x20 [ 200.136396][T11005] kmem_cache_alloc+0x53/0x2d0 [ 200.141168][T11005] ext4_mb_new_blocks+0x2b6/0x1710 [ 200.146393][T11005] ext4_ext_map_blocks+0x2ad5/0x6d20 [ 200.151698][T11005] ? ext4_map_blocks+0x7ea/0x19e0 [ 200.156741][T11005] ext4_map_blocks+0x8c1/0x19e0 21:09:22 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 200.161613][T11005] ext4_getblk+0xa4/0x460 [ 200.166040][T11005] ext4_bread+0x48/0x330 [ 200.170293][T11005] ext4_append+0x153/0x2d0 [ 200.174720][T11005] ext4_mkdir+0x75f/0x14c0 [ 200.179163][T11005] vfs_mkdir+0x42a/0x620 [ 200.183424][T11005] do_mkdirat+0x1b9/0x310 [ 200.187763][T11005] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 200.193827][T11005] do_syscall_64+0x73/0xe0 [ 200.198257][T11005] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 200.204218][T11005] RIP: 0033:0x45c027 [ 200.208085][T11005] Code: Bad RIP value. [ 200.212221][T11005] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 200.220869][T11005] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 200.228836][T11005] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 200.236879][T11005] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 200.244839][T11005] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 200.252796][T11005] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0xf9, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:22 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f900000000"]}, 0x1eb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 200.406719][T11030] xt_check_target: 17 callbacks suppressed [ 200.406729][T11030] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:22 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000002640)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 21:09:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xc102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) 21:09:22 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) 21:09:22 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f9000000000000000000415544495400"/398]}, 0x206) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x600, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x60, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:22 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 200.747175][T11053] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 200.749473][T11052] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 200.781755][T11054] FAULT_INJECTION: forcing a failure. [ 200.781755][T11054] name failslab, interval 1, probability 0, space 0, times 0 [ 200.837699][T11054] CPU: 1 PID: 11054 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 200.846438][T11054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.856492][T11054] Call Trace: [ 200.859795][T11054] dump_stack+0x1f0/0x31e [ 200.864132][T11054] should_fail+0x38a/0x4e0 [ 200.868567][T11054] ? kzalloc+0x16/0x30 [ 200.872732][T11054] should_failslab+0x5/0x20 [ 200.877246][T11054] __kmalloc+0x74/0x330 [ 200.881411][T11054] kzalloc+0x16/0x30 21:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x1100, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 200.885328][T11054] smk_parse_smack+0x189/0x220 [ 200.890101][T11054] smk_import_entry+0x22/0x550 [ 200.894870][T11054] smack_d_instantiate+0x6bb/0xce0 [ 200.899991][T11054] security_d_instantiate+0xa5/0x100 [ 200.905285][T11054] d_instantiate_new+0x61/0x110 [ 200.910213][T11054] ext4_mkdir+0xfa8/0x14c0 [ 200.914621][T11054] vfs_mkdir+0x42a/0x620 [ 200.918867][T11054] do_mkdirat+0x1b9/0x310 [ 200.923258][T11054] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 200.929336][T11054] do_syscall_64+0x73/0xe0 [ 200.933737][T11054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 200.939613][T11054] RIP: 0033:0x45c027 [ 200.944970][T11054] Code: Bad RIP value. [ 200.949023][T11054] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 200.957433][T11054] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 200.965396][T11054] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 200.973478][T11054] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 21:09:23 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/398]}, 0x206) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x68, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 200.981440][T11054] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 200.989405][T11054] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:23 executing program 2: open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000ffb000/0x4000)=nil) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) 21:09:23 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 201.177770][T11076] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:23 executing program 0: socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x3, 0x2) syz_open_dev$cec(0x0, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 21:09:23 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) 21:09:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6c, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x2000, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:09:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x6100) 21:09:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x3000, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 201.370109][T11101] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 21:09:23 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x213) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 201.441203][T11095] FAULT_INJECTION: forcing a failure. [ 201.441203][T11095] name failslab, interval 1, probability 0, space 0, times 0 21:09:23 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/tty/ldiscs\x00', 0x0, 0x0) [ 201.490010][T11095] CPU: 1 PID: 11095 Comm: syz-executor.5 Not tainted 5.8.0-rc4-syzkaller #0 [ 201.492038][T11100] device syz_tun entered promiscuous mode [ 201.498720][T11095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.498725][T11095] Call Trace: [ 201.498745][T11095] dump_stack+0x1f0/0x31e [ 201.498759][T11095] should_fail+0x38a/0x4e0 [ 201.498772][T11095] ? smack_d_instantiate+0x89d/0xce0 [ 201.498784][T11095] should_failslab+0x5/0x20 21:09:23 executing program 1: socket$unix(0x1, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e000000000000000000000000f3ffffff00000000000000000000000000000000000000113e000000f90000000000000000004155444954000000000000000000000000000000000000000008001000000000000000"]}, 0x213) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) [ 201.498794][T11095] kmem_cache_alloc_trace+0x57/0x300 [ 201.498809][T11095] smack_d_instantiate+0x89d/0xce0 [ 201.498829][T11095] security_d_instantiate+0xa5/0x100 [ 201.498843][T11095] d_instantiate_new+0x61/0x110 [ 201.498854][T11095] ext4_mkdir+0xfa8/0x14c0 [ 201.498880][T11095] vfs_mkdir+0x42a/0x620 [ 201.498896][T11095] do_mkdirat+0x1b9/0x310 [ 201.498913][T11095] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 201.498923][T11095] do_syscall_64+0x73/0xe0 [ 201.498935][T11095] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 201.498947][T11095] RIP: 0033:0x45c027 21:09:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x3f00, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) [ 201.531654][T11112] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 201.531986][T11095] Code: Bad RIP value. [ 201.603068][T11095] RSP: 002b:00007fa9e91f0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 201.612506][T11095] RAX: ffffffffffffffda RBX: 000000000050b440 RCX: 000000000045c027 [ 201.620483][T11095] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 201.628456][T11095] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 201.636424][T11095] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 201.644494][T11095] R13: 0000000000000c5d R14: 00000000004cea29 R15: 00007fa9e91f16d4 21:09:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x70, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:23 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffbffffc, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@fat=@errors_continue='errors=continue'}]}) [ 201.726404][T11100] ------------[ cut here ]------------ [ 201.731919][T11100] WARNING: CPU: 0 PID: 11100 at net/core/dev.c:8992 rollback_registered_many+0x1146/0x14a0 [ 201.740817][T11117] x_tables: eb_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 0 [ 201.812825][T11100] Kernel panic - not syncing: panic_on_warn set ... [ 201.819469][T11100] CPU: 0 PID: 11100 Comm: syz-executor.0 Not tainted 5.8.0-rc4-syzkaller #0 [ 201.828150][T11100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.838509][T11100] Call Trace: [ 201.841806][T11100] dump_stack+0x1f0/0x31e [ 201.846185][T11100] panic+0x264/0x7a0 [ 201.850189][T11100] ? __warn+0x102/0x250 [ 201.854358][T11100] ? rollback_registered_many+0x1146/0x14a0 [ 201.860358][T11100] ? rollback_registered_many+0x1146/0x14a0 [ 201.866274][T11100] __warn+0x227/0x250 [ 201.867500][T11124] FAULT_INJECTION: forcing a failure. [ 201.867500][T11124] name failslab, interval 1, probability 0, space 0, times 0 [ 201.870268][T11100] ? rollback_registered_many+0x1146/0x14a0 [ 201.888798][T11100] report_bug+0x1b1/0x2e0 [ 201.893210][T11100] handle_bug+0x42/0x80 [ 201.897467][T11100] exc_invalid_op+0x16/0x40 [ 201.902076][T11100] asm_exc_invalid_op+0x12/0x20 [ 201.906950][T11100] RIP: 0010:rollback_registered_many+0x1146/0x14a0 [ 201.913448][T11100] Code: 4c 8d bc 24 90 00 00 00 e9 97 f6 ff ff e8 42 aa 07 fb 0f 0b e9 e9 f6 ff ff e8 36 aa 07 fb 0f 0b e9 1c ff ff ff e8 2a aa 07 fb <0f> 0b e9 70 ff ff ff e8 1e aa 07 fb 0f 0b e9 fc f7 ff ff e8 12 aa [ 201.933038][T11100] RSP: 0018:ffffc900048071d8 EFLAGS: 00010283 [ 201.939091][T11100] RAX: ffffffff866ce1f6 RBX: ffff88804aaf40b8 RCX: 0000000000040000 [ 201.947058][T11100] RDX: ffffc900019e9000 RSI: 000000000002ca49 RDI: 000000000002ca4a [ 201.955810][T11100] RBP: ffff88804aaf4010 R08: ffffffff866ce11d R09: fffffbfff12b74c1 [ 201.963780][T11100] R10: fffffbfff12b74c1 R11: 0000000000000000 R12: dead000000000122 [ 201.971828][T11100] R13: dffffc0000000000 R14: ffff88804aaf4068 R15: ffffc900048072d0 [ 201.979805][T11100] ? rollback_registered_many+0x106d/0x14a0 [ 201.985700][T11100] ? rollback_registered_many+0x1146/0x14a0 [ 201.991582][T11100] ? rollback_registered_many+0x1146/0x14a0 [ 201.997483][T11100] unregister_netdevice_queue+0x2f3/0x4b0 [ 202.003193][T11100] hsr_dev_finalize+0x4d4/0x6d0 [ 202.008045][T11100] hsr_newlink+0x410/0x4c0 [ 202.012476][T11100] rtnl_newlink+0x143e/0x1bf0 [ 202.017146][T11100] ? __lock_acquire+0x116c/0x2c30 [ 202.022216][T11100] ? __mutex_lock_common+0x582/0x2fc0 [ 202.027593][T11100] ? trace_lock_release+0x137/0x1a0 [ 202.032795][T11100] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 202.037893][T11100] ? lock_is_held_type+0x87/0xe0 [ 202.042811][T11100] ? rtnl_setlink+0x490/0x490 [ 202.047467][T11100] rtnetlink_rcv_msg+0x889/0xd40 [ 202.052400][T11100] ? trace_lock_release+0x137/0x1a0 [ 202.057587][T11100] ? __local_bh_enable_ip+0x133/0x230 [ 202.062942][T11100] ? local_bh_enable+0x5/0x20 [ 202.067618][T11100] ? lockdep_hardirqs_on+0x38/0xe0 [ 202.072723][T11100] ? local_bh_enable+0x5/0x20 [ 202.077388][T11100] ? __local_bh_enable_ip+0x133/0x230 [ 202.082753][T11100] ? __dev_queue_xmit+0x1846/0x2940 [ 202.087950][T11100] netlink_rcv_skb+0x190/0x3a0 [ 202.092695][T11100] ? rtnetlink_bind+0x80/0x80 [ 202.097356][T11100] netlink_unicast+0x786/0x940 [ 202.102114][T11100] netlink_sendmsg+0xa57/0xd70 [ 202.106869][T11100] ? netlink_getsockopt+0x9e0/0x9e0 [ 202.112055][T11100] ____sys_sendmsg+0x519/0x800 [ 202.116832][T11100] ? import_iovec+0x12a/0x2c0 [ 202.121493][T11100] __sys_sendmsg+0x2b1/0x360 [ 202.126073][T11100] ? __might_fault+0xf5/0x150 [ 202.130742][T11100] ? _copy_to_user+0x100/0x140 [ 202.135510][T11100] ? lock_is_held_type+0x87/0xe0 [ 202.140430][T11100] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.146499][T11100] do_syscall_64+0x73/0xe0 [ 202.150902][T11100] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.156788][T11100] RIP: 0033:0x45cba9 [ 202.160661][T11100] Code: Bad RIP value. [ 202.164703][T11100] RSP: 002b:00007fb900446c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.173101][T11100] RAX: ffffffffffffffda RBX: 0000000000503800 RCX: 000000000045cba9 [ 202.181054][T11100] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 202.189016][T11100] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 202.196977][T11100] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 202.204934][T11100] R13: 0000000000000a6c R14: 00000000004cd48b R15: 00007fb9004476d4 [ 202.214419][T11100] Kernel Offset: disabled [ 202.218739][T11100] Rebooting in 86400 seconds..