0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 14:26:48 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) 14:26:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4080aea2, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:48 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000540)=""/250, 0x446a6e69) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:26:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5b000000, 0x0) 14:26:48 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400003, 0x0) read(r0, 0x0, 0x0) 14:26:48 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0xffffffffffffff1b) 14:26:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4080aebf, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) [ 1093.042793] XFS (loop2): Invalid superblock magic number 14:26:48 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000000)={0x1, 0x6, 0x9, 0x8}) read(r0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000040)) 14:26:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@ng={0x4, 0x4, "7252eaa702"}, 0x7, 0x3) 14:26:48 executing program 3: syz_extract_tcp_res(&(0x7f00000003c0), 0x1, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000300)={0x9b, 0x7d, 0x2, {{0x0, 0x86, 0x3, 0x5, {0x0, 0x1, 0x1}, 0x40000, 0x29, 0x9, 0x63c141e5, 0x1c, '.\'posix_acl_access+loem1&:}}', 0x12, '/proc/capi/capi20\x00', 0x12, '/proc/capi/capi20\x00', 0x13, 'securityem0]system}'}, 0x0, '', r1, r2, r3}}, 0x9b) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r4, 0x0, 0x0) 14:26:50 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4090ae82, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read(r0, 0x0, 0x0) 14:26:50 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000040)={0xd55, "12bf10bb569312a58c77893c67940cd4f6e595d8cdda25e0a382f445b04535d4", 0x20, 0x401, 0x2, 0x10, 0x5}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) fanotify_init(0x14, 0x88400) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x80800, 0x0) 14:26:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5c000000, 0x0) 14:26:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xe) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000) 14:26:50 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x44}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000380)=""/120, &(0x7f0000000100)=0xaa) semget$private(0x0, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b2}, 0x0, 0x0) 14:26:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) 14:26:50 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e22, 0xfffffffffffffffb, @dev={0xfe, 0x80, [], 0x23}, 0xe60}, {0xa, 0x4e22, 0x5, @remote, 0x7}, 0x13f959f3, [0x8, 0x5, 0x9, 0x7, 0x8000, 0x40, 0x8, 0x2]}, 0x5c) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000140)={0x7, r0, 0x1}) 14:26:50 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1095.278448] XFS (loop2): Invalid superblock magic number 14:26:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4138ae84, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) [ 1095.354157] input: syz0 as /devices/virtual/input/input5 14:26:50 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) 14:26:50 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) bind$bt_sco(r0, &(0x7f0000000080)={0x1f, {0xfffffffffffffff8, 0x800, 0x7fff, 0x9c, 0x1, 0x7f}}, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000100)=0xfcf6, 0x8) 14:26:51 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x6, 0x8002, 0x5, 0x6, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r1, 0x10001}, &(0x7f0000000280)=0x5a65d60) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r1, 0x0, 0xc5}, &(0x7f0000000140)=0x8) 14:26:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, 0x0) 14:26:51 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) [ 1096.062744] XFS (loop2): Invalid superblock magic number [ 1096.101193] input: syz0 as /devices/virtual/input/input6 14:26:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x44}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000380)=""/120, &(0x7f0000000100)=0xaa) semget$private(0x0, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b2}, 0x0, 0x0) 14:26:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4188aea7, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:51 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x26c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0x854}, &(0x7f0000000100)=0x8) 14:26:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) 14:26:51 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:51 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0xb8a5c3c918c77a3f) 14:26:51 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1096.377521] input: syz0 as /devices/virtual/input/input7 14:26:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x12, 0xa, 0x4, "dd1934cc277841164d3ae75cd07d137dfb573ed87680bd933213c96766d007ee5efd7c4e60e638b033382e0e505c6d5c48cce51cb25561145163e91300116f01", "12fe1d2c718dc397cc4b12218391f762a0697d4fc062ba78c09611b8bdc2c434", [0x2, 0x194a4179]}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000200)={0xfffffffffffffff8, 0xfffffffffffff801, 0x800}) read(r0, 0x0, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000240)={0x1f, {0xb04c, 0x6, 0x80000000, 0x9, 0x7, 0x7f}, 0x3f}, 0xa) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) 14:26:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x41a0ae8d, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00, 0x0) 14:26:52 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) 14:26:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x44}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000380)=""/120, &(0x7f0000000100)=0xaa) semget$private(0x0, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b2}, 0x0, 0x0) 14:26:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) shutdown(r0, 0x1) read(r0, 0x0, 0x0) 14:26:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4400ae8f, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:52 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x1, 0x4) read(r0, 0x0, 0x0) 14:26:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x80020000, 0x0) 14:26:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:52 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = shmget$private(0x0, 0x3000, 0x75c, &(0x7f0000ffc000/0x3000)=nil) timerfd_gettime(r0, &(0x7f0000000100)) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) read(r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f00000003c0)=0xe8) mount$9p_xen(&(0x7f0000000000)='/proc/capi/capi20\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000400)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}, {@version_L='version=9p2000.L'}], [{@obj_user={'obj_user', 0x3d, '/proc/capi/capi20\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x61, 0x38, 0x0, 0x0, 0x61, 0x0, 0x33], 0x2d, [0x31, 0x0, 0x38, 0x38], 0x2d, [0x39, 0x34, 0x38, 0x34], 0x2d, [0x35, 0x35, 0x3a, 0x7b], 0x2d, [0x36, 0x39, 0x67, 0x33, 0x30, 0x61, 0x36, 0x36]}}}, {@subj_type={'subj_type', 0x3d, 'access=user'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}}) [ 1097.346896] input: syz0 as /devices/virtual/input/input8 14:26:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x5000aea5, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:52 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x7ff, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000780)={0x0, {0x3, 0x3}}) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0xfffffffffffffe4d) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x25e6f1b9, 0x0, 0x8, 0x4, 0x1, 0xffffffff}) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000800)={0x1, 0x8, [@remote, @remote, @dev={[], 0x23}, @dev={[], 0xc}, @empty, @local, @local, @local]}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@ll={0x11, 0x2, r3, 0x1, 0x8, 0x6, @remote}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)="355aea912a6a2325396280642738bfd14b5a23b3c81f0fa6e3f7695dd8ebfff05265c8f57d396ae7bd9bbc93a7e2747e5e46fc4ff08b7e5c85142f14", 0x3c}], 0x1, &(0x7f0000000240)=[{0xf0, 0x197, 0x1, "3cd124191e5335f701024f988043586c0f0b6ffcd9a29cd3ee258d47212569e81aa481231bcfa47d90b00683de3aa1f97eeef185fb80004496606d802fb4397839235520e84f061c64cd9303c4fe4b59f90fb7a893ec500e78e32a7bd46aee6a85ec74c144c71b69c6fc4aff78b3f6bee7dd73cffe1e52bf3f48a2bc8e6e04daab1b3ffed191bfa7915453ac599983db141cbf9d58b06fdfc5903f0bff6708afc47ce8b8ce48cd2b6e7435e3b3767ad493aef1e650a0013e4a1e2f0ec86cccf8c3164b8b9e5e4f857320905b263e714f17690de4908631f90bc1119d29ff"}, {0x70, 0x13f, 0x9b, "854ae411ab630fc233abba8448a7d45241fc66e90604ca3626f28e340e2c1e64a5f8144160ab7f6185de9cce07c825b4be57801defe88aa3b9a87c5ef9e3b1e05c3a53743b7c36d62b3166fd3018b65a9f207abad488ef2dffdd8c81"}, {0xf8, 0x105, 0x10001, "6e6b22711482f40341976a9aa16076cee3ac0e709225554ba308a9c4d309375b775f4f4f378696d87fd426b2364769d41cd1972af0835d552bdf820a8d0a4570d0fb0f57e0a3c7f78788bc0582fdf3c1d1285a1d3299325430ffb2288ae9158fd31cca11c56f8f6a1785e5bd4795659e0b54f345a2f7779baeb9c35f5eac9062df99c3a0d805e11a3a4604ae9f8cfd11a33f97b09bc1455866f6a19f8877a2ba3f943e8dc5a7c096a67e4ca0028880574cf78e964cafb2cbf98ba47cca103ec49c82801642fd2d3cc5479d6271194baa70b3eaa6914c41330d72591313c4d25c0801ffa4cb4f85"}, {0x88, 0x10e, 0x7, "325c774a008126ec5678bb4062d2b54ecd6ad102a6a0d2d216bccd3b3553e6fd537d76926eee2490d730bdf8e2c285dfb6fd519093aef4f9c933b9b047b243d854f54e40d43206971c1635933366fca24d56f4ec4bd8d364718fad150e510990cac90ac700748f1706006ce7815767e22b5715cfde77604e"}, {0x110, 0x113, 0x7, "3de0c38de12a57cd887ad5036a79b770324373883643400e170bb745133ef3b6823e30b651f900d643ba9ff306c167bc80686a0a1283d56ad7833bee1d8fd34230731547c1d4f19c7baecaf44c50100eda21ea0d01506dac34d7f04faf13b4ec8efad2835f35d008af009a19afec77538956e39af9b0732b4d0e7ee3358e1a91596a83a6e1e759498215ca33daacde16fb92a756782d52dea447669dec74c0f90510d3bf37780ed10f9be0d34782311945993614d94f2eb0dae8cb4c28985f79af897760d55603872debc4e91a03855c4b71ece961363c90ef67bb552aa22ae2766be7f78e2f5d2c80b8b23878fcec3a1f49f577d1ae719a0d47"}, {0x48, 0x10e, 0x9, "c3035766bbcf065f5d146c9d0931c4779b0db6500904cfe4aa203b10e260b6a1c9b416c54a9b215028150e4e4b962506283dd9b6"}, {0x50, 0xff, 0x7fd, "1236fef5c098cac13959e407a002805f47baafe411146900a14355b0d29886bcbb13cc0be068532e49d655c594dcecbea53a7ea83bfeacbcef8328"}, {0x38, 0xc648523b51bda4b2, 0x96, "c9cca857002a194d6033f94c0b95227fd23b7462aa44735004d1cea8b5852a3a6ff5"}], 0x4c0}, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000007c0)) 14:26:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x80030000, 0x0) 14:26:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8004ae98, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="8b00000000000000150001c0000000863e"]) 14:26:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x101000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x8}, 0x80, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0x1b, 0x6, 0xfffffffffffffff7, 0x6, 0x3, @local}, 0x10) 14:26:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x80969800, 0x0) 14:26:53 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:53 executing program 3: r0 = fanotify_init(0x8, 0x8001) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x0) 14:26:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000000)={0x0, {0x1ff, 0xffffffffffffffe1}}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x3, 0x0, @ioapic={0x2000, 0x1, 0x10000, 0x6, 0x0, [{0x8, 0x3, 0x9, [], 0x3}, {0x0, 0x8, 0x7ff, [], 0x80000001}, {0x6, 0x10000, 0x0, [], 0x5}, {0x100000000, 0xffffffffffffffe1, 0x100000001, [], 0x6}, {0x6, 0x3, 0x7, [], 0x9}, {0x1, 0x5, 0x0, [], 0xf1f}, {0x10000000, 0x7ff, 0x3, [], 0x4}, {0x7, 0x26, 0x5, [], 0xffff}, {0x8, 0x2984, 0xde, [], 0x7f}, {0x3, 0x100000000, 0x3f, [], 0x2}, {0x0, 0x1, 0x100000001}, {0xfffffffffffffffb, 0x1, 0x6, [], 0xffff}, {0x3, 0x1, 0xfffffffffffffff9, [], 0xfffffffffffffffe}, {0x2, 0xf41, 0x7, [], 0x7}, {0xfffffffffffffffc, 0x840, 0x7f, [], 0xe596}, {0x4, 0x7, 0xfffffffffffffff8}, {0x2, 0x8, 0x6, [], 0x8001}, {0x491, 0x567238f2, 0x1, [], 0x3ff}, {0x9, 0x100000000, 0x5, [], 0x1}, {0x800, 0x200, 0x8001, [], 0x7fffffff}, {0x3, 0x3, 0x600000000, [], 0x8}, {0xffffffffffff8575, 0x8, 0x8000, [], 0x8}, {0x4, 0x4, 0x7, [], 0x5}, {0x1, 0x4, 0x3, [], 0x7fff}]}}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 14:26:53 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1098.317303] kvm [11680]: vcpu0, guest rIP: 0xfff0 unimplemented HWCR wrmsr: 0x36 14:26:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x84010000, 0x0) 14:26:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x80086601, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:53 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xff, 0x9, 0x0, 0x6, 0x0, 0x9, 0x4, 0x8, 0x56, 0xffff, 0x1, 0x4, 0xfffffffffffffff8, 0x4, 0x3, 0x7f, 0x20, 0x3, 0x8000, 0x401, 0x54a2, 0x3ff, 0x401, 0x7, 0x0, 0x3ff, 0x34, 0x0, 0xc033, 0xca2f, 0x0, 0xffffffffffffffe1, 0xe94, 0xd4, 0x2, 0x8691, 0x0, 0x0, 0x2, @perf_config_ext={0xfac8, 0x2}, 0x4000, 0x6, 0x514, 0x0, 0x4, 0x6, 0x7}, r0, 0xd, r1, 0x2) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bind$rose(r1, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @default}, 0x1c) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x101000, 0x0) read(r2, 0x0, 0x0) 14:26:54 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x3, 0x8}, 0xc) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x0) 14:26:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x10f) 14:26:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x80087601, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, 0x0) 14:26:54 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0xfff, 0xffff, 0x0, 0x0, 0x0, 0x4000, 0x1, 0x9, 0x4, 0x83, 0x4, 0xfff, 0x11, 0x8, 0x1, 0x800, 0x100000001, 0x9, 0x76, 0x11, 0x1, 0x5, 0x0, 0xfffffffffffffff7, 0x9, 0x1, 0x8000, 0x7fffffff, 0x29, 0x4, 0x1000, 0x0, 0x1, 0x728, 0xc9fe, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f0000000140)}, 0x100, 0x2, 0x8a72, 0x8, 0x3, 0x2, 0x1}, r2, 0x6, r0, 0x8) accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000280), 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000240)=0xac66, 0x4) 14:26:54 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x200, 0x0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x5, 0x70, 0x4402, 0x400, 0x2, 0x3, 0x0, 0x1f, 0x21000, 0x4, 0x9, 0x1ff, 0x100, 0x7, 0xff, 0x2, 0x2db, 0x2, 0x100000001, 0x8001, 0xf8, 0x5, 0xd287, 0xb4f40cc, 0x400000000, 0x9, 0x1, 0x7, 0x2, 0x0, 0x100, 0x2, 0xff, 0x200, 0x9, 0x0, 0xbd2, 0x6, 0x0, 0x8, 0x6, @perf_config_ext={0x8, 0xbd40}, 0x10, 0x2b517f43, 0xfffffffffffffff7, 0x5, 0x8001, 0x414, 0x1}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) read(r1, 0x0, 0x0) 14:26:54 executing program 1: 14:26:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:54 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r1, r0}) 14:26:54 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x400, {0x1, 0x7, 0x318a, 0x6, 0x3, 0x1ff}, 0x0, 0x8}, 0xe) 14:26:54 executing program 1: 14:26:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8040ae9f, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa4000000, 0x0) 14:26:54 executing program 1: 14:26:54 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setrlimit(0xb, &(0x7f0000000040)={0x1000, 0x7}) creat(&(0x7f0000000000)='./file0\x00', 0x100) read(r0, 0x0, 0x0) 14:26:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x10f, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2006d67c914667d4}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) read(r0, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000080)={0x7, 0x9, 0x101, 0xa5b1}, 0x10) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000240)) 14:26:54 executing program 1: 14:26:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8080aea1, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xac010000, 0x0) 14:26:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000000)=0x1ff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) fremovexattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e2f70726f632f636170692f63617069323000d176879a5166c7736bed5811bd8ad650ca9bd1e2d5558f80d843f6b109d6413941adc69786ae0cfd005596e6db4ea4fccb3d1c40ff2c722bb18a555da142514cd35b74787adca9bfd98ecf9178ec1ed9db01f997c40e5f7f31ee359f949a13371111612aa81252154893ee78"]) 14:26:55 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x424200, 0x0) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000180)=0xa, 0x4) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) 14:26:55 executing program 1: 14:26:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0xffffffffffffff53) 14:26:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, 0x0) 14:26:55 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0xdc, @local, 0x4e23, 0x0, 'fo\x00', 0x24, 0x4, 0x37}, {@remote, 0x4e21, 0x5, 0x4, 0x8, 0x8}}, 0x44) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x0) 14:26:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:55 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8090ae81, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ioprio_set$pid(0x0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000000)) read(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x3c, 0x0, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x7, 0x41dad1d8, 0x6, 0x1, 0x10000000000000}) [ 1100.184359] gfs2: not a GFS2 filesystem 14:26:55 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000440)=0xe8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX=r2, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX=r3, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC=r4, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) [ 1100.216038] XFS (loop2): Invalid superblock magic number 14:26:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x40000, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x0) write(r1, &(0x7f0000000100)="14539e1917ea6451b33e02586d37840b06b59d1137d86ff65bdd1ae27f387bdb0b15677b210e66ce730d2b811298d5bda5123c62c46ef5632a8b400b703872ab1a9769a251f7ea80d5209ebb6ba78e5575c512ffcfbfc69364b111fe9667feb5ac5e10a8091e57b03b6ef78281ab8af3588153d876144020a620527f637e5f717007297bc67b42da69d814621ccaae8079dbac2672ef018a729fa8e15064c421bf23a19b94e2a5bac168150e7487bcd00af957e5321db65021638f8c21c3e67e826da72ca2f7f6475dd6c0c330c14425cd0d18e3400cb09ed7ca", 0xda) 14:26:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8138ae83, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) [ 1100.429379] hfsplus: invalid gid specified [ 1100.438918] hfsplus: unable to parse mount options 14:26:55 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x6000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x6c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x10000}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c800) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f, 0x2) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000040)={0x0, "7de12a327da3feaf30746db4114dad4d4c700ccfe710492f8cc1315ebf05ea96", 0x3, 0x1}) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000000)=ANY=[]) [ 1100.526785] hfsplus: invalid gid specified [ 1100.539133] hfsplus: unable to parse mount options 14:26:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x101f, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="a9"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/member\x00', 0x2, 0x0) read(r1, 0x0, 0xffffffffffffff13) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000080)="9545592716eb39fedbfeb05d1adf3f3652872f089d41ed928d0d072fac4dd78d9a34fb8028454bc09a46930d5fec0ce435ea4f9fd6e516dffff3c3083a4811eb9338dba97578388d57e14542932be0982f13294840db0b343206061407250f3e7d4379d20c255869768c40ddfb731897d6dab7d989cb5cac8eee18e8bc63e66d42f9b187907dd3ed3116240cf98bb8a611211b9cb125a6085ab2922495d36238e259cc00abea828d2593dea3ae23266eaf3dc5402b405bc60303a8820184a05c9c82", 0xc2) getsockopt$inet6_dccp_int(r1, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 14:26:56 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x3, r0}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000140)={0x0, @reserved}) getpeername$unix(r1, &(0x7f00000002c0), &(0x7f0000000340)=0x6e) 14:26:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc4000000, 0x0) 14:26:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8188aea6, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:57 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=""/46, &(0x7f0000000040)=0xffffffffffffffea) 14:26:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001480)={0x0, 0x2, 0x6, [0x5, 0x7f, 0x4, 0x8, 0x1000, 0xff]}, &(0x7f00000014c0)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001500)={r1, @in={{0x2, 0x4e22, @multicast2}}, 0x16, 0x4, 0x5, 0x7}, &(0x7f00000015c0)=0x98) kexec_load(0x0, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000100)="e395b42b40c5ea91f9b6d64620257c10625719097549431926023d687bcd9daa3f5aa872cc722f39b27d6b1823455947cb1328ea31ca0ff1a095a83c3e061154fa8650bf4fd0ab6bc84fd20a2c0530d5e1468767b1eaa4ab6ca51ec71e1cce5c5632ada47854fb3c60d1786794c77551452d9bb7b160a33aa2fed6a5d5a1746a5e146985c83b5d1718849207ba01e0eb10d93291df8c60e757f8a404b71c4fc624a89d64cf48203f8ab0b85a6b1b9d862b69be534eab500db3c3751172725f30d3c7951176957329d845e68bfc73a05739d5387c35e28659c1ffb9c3df26c68558f3020fbff381", 0xe7, 0x1ff}, {&(0x7f0000000200)="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", 0x1000, 0x71, 0x7f}, {&(0x7f0000001200)="53dc09ea6292792c092a0d78435d4c31bad94a5dc09eeca7cbb17e4c6917f3b24a2911a636681b00e4ff1080b9ece92b22797716868d4f235cf81c24c7534f2d42979f705fec0608feae9d0d507cf171dbe7e9354678733571d549da900c8a6e0ad25803cb99191e313bbcd3b5d643a3d5987564ac9421d3126d1ffeac93639d007973e355dc3b58bd98c7bd4b96617dfa9658040024279b20ccdcc9f0ef59b37f1fca6f214a980b2cf782c9844ba41400fabd", 0xb3, 0x7, 0xe00}, {&(0x7f00000012c0)="10a8214475918ff5a359c82e1fefd1b9288add664f2614fa650a5b199887673ee8c43d1cbec224280e412d4daddea68f82856be09562420154fdfcf20f10a21f35cd0d7ac831ee9040d69c0e6b46a36c255bf55ece104bbc16ce667fffce2f36aae16b077632f51572383eb54ab25c3bd4911cd7c4e2de3d03f5c12d6d593b93a78f469b1126b73bd52fa207b82c0341f83261e5adf87ec52ba571070f1d21f893d58773182649622300a0cf561ed4018913952f04b518f368694645073fff5982414db4c176e8e5269d", 0xca, 0x9, 0x4}, {&(0x7f0000000080)="3f39b4498e", 0x5, 0xfffffffffffffffc, 0x8}], 0x160000) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000001600)={0x2858, "120d307bd49bc2ae6e595581ea604052149625ee0e5b05eb7068874ab96c6eb4", 0x3, 0x1}) 14:26:57 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd8020000, 0x0) 14:26:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x81a0ae8c, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) [ 1102.534700] gfs2: not a GFS2 filesystem 14:26:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x80000000, 0x4) read(r0, 0x0, 0x0) 14:26:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000100)=""/158, &(0x7f0000000080)=0x9e) 14:26:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8400ae8e, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe4000000, 0x0) 14:26:58 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0xff7fffffffffffff, 0x0) read(r0, 0x0, 0x0) 14:26:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:26:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x101000, 0x0) getrlimit(0x0, &(0x7f00000000c0)) read(r0, 0x0, 0xffffffe2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x400, 0x0) prctl$PR_GET_FP_MODE(0x2e) 14:26:59 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x20000, 0x0) read(r0, 0x0, 0x0) 14:26:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe8030000, 0x0) 14:26:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x9000aea4, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:26:59 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:00 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) read(r0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) 14:27:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x40040) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 14:27:00 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf0030000, 0x0) 14:27:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc0045878, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:27:00 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8002, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x10000, 0x0) 14:27:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:02 executing program 3: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x0) 14:27:02 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x60000, 0x0) read(r0, 0x0, 0x0) 14:27:02 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc0045878, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:27:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) 14:27:02 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0xfffffef2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1, {0x40, {0x1, 0x0, 0x3}, 0x6202ec9a7ed1df54, r1, r2, 0x81, 0x5, 0x73, 0x8, 0xf445, 0x3, 0x7, 0x100000000, 0x8, 0x2, 0x500, 0x6, 0x40, 0x7ff, 0x2}}, 0xa0) 14:27:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 14:27:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) 14:27:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:27:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000100)={0x0, 0x0, 0x7fff, 0x8c, r1}) read(r0, 0x0, 0x0) 14:27:02 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x86812, r0, 0x0) 14:27:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001800)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000001900)=0xe8) accept$packet(r0, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000019c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001a40)={'syzkaller0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001a80)={@loopback, @remote, 0x0}, &(0x7f0000001ac0)=0xc) accept$packet(r0, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002140)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000002180)={@remote, @multicast1, 0x0}, &(0x7f00000021c0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000022c0)={@multicast2, @rand_addr, 0x0}, &(0x7f0000002300)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002340)={'veth0_to_hsr\x00', 0x0}) accept4(r0, &(0x7f0000002b40)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002bc0)=0x80, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002c00)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002c40)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000002d40)=0xe8) accept$packet(r0, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003f80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004080)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000004180)=0xe8) recvmsg(r0, &(0x7f0000004840)={&(0x7f0000004440)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004780)=[{&(0x7f00000044c0)=""/230, 0xe6}, {&(0x7f00000045c0)=""/218, 0xda}, {&(0x7f00000046c0)=""/27, 0x1b}, {&(0x7f0000004700)=""/104, 0x68}], 0x4, &(0x7f00000047c0)=""/91, 0x5b}, 0x100) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004880)={0x0, @rand_addr, @multicast2}, &(0x7f00000048c0)=0xc) ioctl$sock_ifreq(r0, 0x89b9, &(0x7f0000007300)={'batadv0\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x3}}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007380)={0x0, @multicast1, @empty}, &(0x7f00000073c0)=0xc) getpeername$packet(r0, &(0x7f0000007400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007440)=0x14) accept$packet(r0, &(0x7f0000007480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000074c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007500)={{{@in6=@ipv4, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast2}}, &(0x7f0000007600)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000007640)={@mcast1, 0x0}, &(0x7f0000007680)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000076c0)={0x0, @loopback, @multicast1}, &(0x7f0000007700)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000008100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000080c0)={&(0x7f0000007740)={0x95c, r1, 0x10c, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x1e8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x4, 0xffff, 0x1d4, 0x6}, {0x0, 0x7fff, 0x8, 0x886}, {0x40, 0x8, 0x6, 0x8}, {0xfff, 0x6, 0x1, 0x9}, {0x0, 0x10000, 0x5, 0x4}, {0xf1, 0x7, 0xd59, 0x800}, {0x6, 0x9, 0x1, 0x3}, {0x80000001, 0x3, 0x8, 0x2}, {0x7, 0x410000000, 0x1000, 0xf0f}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0xf4, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3e}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x88f}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xc0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x1c, 0x4, 0x101, 0x40}, {0x0, 0x7f, 0x3, 0x1}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r9}, {0x80, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r11}, {0x268, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4, 0xffffffffffff34ca, 0x8, 0x4}, {0xffff, 0x7, 0x20, 0x9}, {0x9, 0x0, 0x0, 0x1000}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6d887301}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xe04}}}]}}, {{0x8, 0x1, r16}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff0ce}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xef9}}}]}}, {{0x8, 0x1, r19}, {0xfc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0x48, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x95c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r25 = shmget$private(0x0, 0x1000, 0xa8, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(r25, 0xb) read(r0, 0x0, 0x0) 14:27:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae91, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:27:04 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000002000000009000100"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 14:27:04 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x81) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000100)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0xffffffffffffff62) 14:27:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x2, 0xcbd, 0x32, 0x4, 0x800}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 14:27:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x18000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0xa1a5, 0x81, 0x9, 0x7a71, 0xb, 0x10000, 0x7, 0x0, 0x1b2, 0x100000001, 0xde, 0x7f}) ioctl$KDADDIO(r0, 0x4b34, 0x8000) read(r0, 0x0, 0x0) 14:27:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008aec1, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) [ 1108.878210] gfs2: not a GFS2 filesystem 14:27:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) 14:27:04 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffc}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0xffffffffffffff7b) 14:27:04 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x153, r1, 0xc00, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xa7}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x814}, 0x800) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000001c0)={0x60c, 0x1ff}) read(r2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x10001, 0x3, 0x3}, 0x20, 0x6}) 14:27:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 14:27:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc0189436, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) [ 1111.112976] gfs2: not a GFS2 filesystem [ 1113.429001] device bridge_slave_1 left promiscuous mode [ 1113.434600] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.489351] device bridge_slave_0 left promiscuous mode [ 1113.494955] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.481383] device hsr_slave_1 left promiscuous mode [ 1115.545172] device hsr_slave_0 left promiscuous mode [ 1115.583841] team0 (unregistering): Port device team_slave_1 removed [ 1115.594399] team0 (unregistering): Port device team_slave_0 removed [ 1115.604827] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1115.665508] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1115.734493] bond0 (unregistering): Released all slaves [ 1115.844752] IPVS: ftp: loaded support on port[0] = 21 [ 1115.909602] chnl_net:caif_netlink_parms(): no params data found [ 1115.941944] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.949108] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.956026] device bridge_slave_0 entered promiscuous mode [ 1115.973815] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.980323] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.987225] device bridge_slave_1 entered promiscuous mode [ 1116.002780] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1116.011992] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1116.028326] team0: Port device team_slave_0 added [ 1116.034292] team0: Port device team_slave_1 added [ 1116.141002] device hsr_slave_0 entered promiscuous mode [ 1116.184965] device hsr_slave_1 entered promiscuous mode [ 1116.304518] bridge0: port 2(bridge_slave_1) entered blocking state [ 1116.310970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1116.317633] bridge0: port 1(bridge_slave_0) entered blocking state [ 1116.324073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1116.396321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1116.417316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1116.425815] bridge0: port 1(bridge_slave_0) entered disabled state [ 1116.439306] bridge0: port 2(bridge_slave_1) entered disabled state [ 1116.459144] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.476638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1116.484951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1116.491376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1116.525173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1116.533625] bridge0: port 2(bridge_slave_1) entered blocking state [ 1116.540042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1116.554866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1116.579799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1116.594202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1116.603114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1116.620919] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1116.632835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1116.640843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1116.661855] 8021q: adding VLAN 0 to HW filter on device batadv0 14:27:12 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000002000000009000100"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:12 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6, 0x480800) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c540)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000d640)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f000000d740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f000000d840)={@remote, 0x0}, &(0x7f000000d880)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f000000d8c0)={@rand_addr, @dev, 0x0}, &(0x7f000000d900)=0xc) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockname(0xffffffffffffff9c, &(0x7f000000d940)=@xdp={0x2c, 0x0, 0x0}, &(0x7f000000d9c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f000000ddc0)={@rand_addr, @rand_addr, 0x0}, &(0x7f000000de00)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f000000dfc0)={@multicast1, @rand_addr, 0x0}, &(0x7f000000e000)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f000000e0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000e100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000e1c0)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f000000e2c0)=0xe8) getsockname$packet(r0, &(0x7f000000e300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000e340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000e380)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f000000e480)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f000000e900)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x42101208}, 0xc, &(0x7f000000e8c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="f8030000", @ANYRES16=r2, @ANYBLOB="000228bd7000fbdbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="7800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400090000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="340202003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b75700000000000000000000011b5a4b1080003000600000004002400080006009d18fcfd51199f773173167aa0806aa929ea77aae809e1a062b589df6329bbd6a05a16e6d4b885f77d5400e3cb009c37eea81f3f73e5bc9782715a05500b0906c7ced9eabe331f039ac2bd8063d177ae77b576bd56f562f53ba46633d500b3db9aad0bb2e8473ac10000000000000d889909e8892a044a4a51ae9446fbe8ec352368b1164e645e8000ccf4dc2e816a4e58c7f6a78906", @ANYRES32=r7, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004002000000008000600", @ANYRES32=r10, @ANYBLOB="84000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000005400040000107305020000009507a502e0eb000000000007c30500000000012a02000000090009004000000006000086a7e300000800ed05e0ffffff030041063100000001000507000000801f0000020700000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="2001020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000300000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400720000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040001000000"], 0x3f8}, 0x1, 0x0, 0x0, 0x24000001}, 0xc1) r14 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$UI_END_FF_ERASE(r14, 0x400c55cb, &(0x7f00000006c0)={0xd, 0xfe, 0xdfe3}) read(r14, 0x0, 0x0) 14:27:12 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x8, @empty, 0x9}, 0x1c) 14:27:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x881dd704d8, 0x0) 14:27:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc018ae85, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:27:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:12 executing program 3: mq_open(&(0x7f0000000080)='[,[usereth0\x00', 0x40, 0x2, &(0x7f0000000200)={0x1, 0x1, 0x15, 0x10000, 0xffff, 0xfffffffffffeffff, 0x7, 0x8}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x3fffc, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000100)={'team0\x00', 0x2}) read(r0, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000280)={0x0, 0x401, 0x2, [], &(0x7f0000000240)=0x5}) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/95) [ 1116.942307] gfs2: not a GFS2 filesystem 14:27:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x881fb72a03, 0x0) 14:27:12 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x3ffff, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000000)={0x8, 0x8, 0x8001, 0x100000001, 0x1, 0x9}) read(r0, 0x0, 0x0) 14:27:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100), 0x10) read(r0, 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)) 14:27:12 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000002000000009000100"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc020660b, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:27:12 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x8000040000, 0x0) read(r0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/30) 14:27:12 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0xe282) 14:27:12 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000"], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) 14:27:12 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000"], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:14 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x40000, 0x0) 14:27:14 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0x8) r2 = perf_event_open(&(0x7f0000000100)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f37a559}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80, 0x0) read(r2, 0x0, 0xfffffffffffffe54) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000000)) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x20, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) 14:27:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc028ae92, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:27:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 14:27:14 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000"], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:14 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc00030000000000850000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x1b0) 14:27:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc080aebe, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) [ 1119.457720] gfs2: not a GFS2 filesystem 14:27:14 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) fstat(r0, &(0x7f0000000100)) 14:27:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000, 0x0) 14:27:15 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc00030000000000850000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:16 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x32000, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000001c0)={0x400, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e23, @multicast2}}}, 0x108) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x8, 0x5, 0x27, 'queue0\x00', 0x1}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r1, 0x0, 0x0) 14:27:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x2, [{0xc0010015}]}) 14:27:16 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x2e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xa, 0x2, 0x8, 0x4, 0x0, 0x1ff, 0x400, 0x5, 0xe3, 0x1, 0x40, 0xe3, 0x8, 0x9, 0x8aa4, 0x28b, 0x7f, 0x2, 0x1, 0x8001, 0x8, 0x8000, 0x20, 0xffffffffffffffe1, 0x2, 0x4, 0xfb, 0x1, 0x3, 0x9, 0x2, 0x2, 0x6, 0x5, 0x0, 0x8000, 0x0, 0x2, 0x0, @perf_config_ext={0x6, 0x9}, 0x208, 0x3ff, 0xaf, 0x4, 0xfffffffffffffff7, 0x8, 0x8}, r2, 0xc, r0, 0x1) read(r1, 0x0, 0x0) 14:27:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000000000, 0x0) 14:27:16 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc00030000000000850000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x600, 0x40) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 14:27:16 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) read(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="e793246cfd6d7e9e1e7c680430000000", @ANYRES16=r1, @ANYBLOB="000328bd7000ffdbdf2501000000000000000841000000140018000004007564703a73797a3200000000"], 0x30}, 0x1, 0x0, 0x0, 0x24000001}, 0x4000890) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000180)=@default) 14:27:16 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1121.420423] gfs2: not a GFS2 filesystem 14:27:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, 0x0) 14:27:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4, [{0xc0010015}]}) 14:27:17 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x0, @remote, 0x4e20, 0x4, 'fo\x00', 0x20, 0x7fff, 0x54}, {@multicast2, 0x4e22, 0x10000, 0x8, 0x5, 0xb15}}, 0x44) 14:27:18 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000100)={0x80000000, 0xb, "404adda0219091a1807bc3449870cf4fd3cb1a4ff8922310526c837a8e269437", 0x5d53, 0x0, 0x3, 0x7fffffff, 0x2, 0xfffffffffffff801, 0x8, 0x100, [0x4, 0x0, 0x1, 0x6]}) 14:27:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8, [{0xc0010015}]}) 14:27:18 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x1, 0x894, 0x2}) 14:27:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe000000000000, 0x0) 14:27:18 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:18 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = getpgid(0x0) r2 = getpgrp(0xffffffffffffffff) kcmp(r1, r2, 0x5, r0, r0) read(r0, 0x0, 0x0) 14:27:18 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20102008}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x2, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 14:27:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, 0x0) [ 1123.525659] gfs2: not a GFS2 filesystem 14:27:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x10, [{0xc0010015}]}) 14:27:19 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:20 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0x0) 14:27:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0xf9ac6fd44d22d16b) 14:27:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x11, [{0xc0010015}]}) 14:27:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 14:27:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:20 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0xc0) read(r0, 0x0, 0x0) 14:27:21 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x12, [{0xc0010015}]}) [ 1125.655474] gfs2: not a GFS2 filesystem 14:27:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 14:27:21 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) epoll_create(0x9) read(r0, 0x0, 0xfffffffffffffeb4) 14:27:21 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x280000, 0x0) read(r0, 0x0, 0x0) 14:27:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:22 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f8000000000000"], 0x67) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x7a, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000080)={0x60, 0xfffffffffffffffe, 0x4, {{0x3, 0x5, 0xa7c, 0xffff, 0x9, 0x401, 0x1, 0x80}}}, 0x60) read(r0, 0x0, 0x0) 14:27:22 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r0, 0x0, 0xfffffd69) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000380)=""/250, &(0x7f0000000340)=0x4f) r1 = getuid() mount$9p_unix(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='9p\x00', 0x1, &(0x7f0000000200)={'trans=unix,', {[{@version_9p2000='version=9p2000'}, {@aname={'aname'}}, {@version_u='version=9p2000.u'}, {@noextend='noextend'}], [{@smackfsroot={'smackfsroot', 0x3d, 'GPLnodev-(trusted'}}, {@pcr={'pcr', 0x3d, 0x6}}, {@obj_role={'obj_role'}}, {@fsname={'fsname'}}, {@context={'context', 0x3d, 'system_u'}}, {@fsname={'fsname', 0x3d, '/proc/capi/capi20\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, '/proc/capi/capi20\x00'}}, {@audit='audit'}, {@fowner_gt={'fowner>', r1}}]}}) 14:27:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1b, [{0xc0010015}]}) 14:27:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 14:27:23 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f8000000000000"], 0x67) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:23 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x500, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x80803, 0x6) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100)='/', 0x1}], 0x1) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000001d0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) read(r0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) 14:27:23 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e24, 0x91aa, @mcast1, 0x3e8a}, {0xa, 0x4e24, 0x8, @mcast1, 0x7fff}, 0x89fb, [0xeb58, 0x7, 0x401, 0xff, 0x9e, 0x1, 0xffffffff80000001, 0x2]}, 0x5c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x1000, 0x4) 14:27:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x32ab71f88000000, 0x0) 14:27:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x34, [{0xc0010015}]}) [ 1127.786913] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 14:27:23 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f8000000000000"], 0x67) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1127.915788] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 14:27:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') read(r0, 0x0, 0x0) 14:27:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40200, 0x0) read(r0, 0x0, 0x0) 14:27:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 14:27:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x3a, [{0xc0010015}]}) 14:27:24 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:25 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x500, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x80803, 0x6) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100)='/', 0x1}], 0x1) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000001d0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) read(r0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) 14:27:25 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x3b, [{0xc0010015}]}) [ 1129.739206] gfs2: not a GFS2 filesystem 14:27:25 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x100000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x9}}, {@cachetag={'cachetag'}}, {@version_u='version=9p2000.u'}, {@access_client='access=client'}], [{@fowner_gt={'fowner>', r2}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) read(r1, 0x0, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000004c0)=""/250) epoll_wait(r1, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x6) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x9, 0x4) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0', [{0x20, 'vmnet0em1'}, {0x20, 'T\\$vmnet1'}, {0x20, '&securityeth0eth0eth1[/\\'}, {0x20, '(\'vmnet1'}, {0x20, 'rfdno'}, {0x20, 'keyring%'}, {0x20, ',+:wlan1/lo())^m-\x85$lovboxnet1trusted'}, {}], 0xa, "3ef4bb404dfe4be16e27e8a6dd519de7ec5576a8ffe7c83821636db06c12fa19e8fd3d4a9dcb1e6c6aeb9cba60977eb906ebc84b8862f3c5d2dca698251f8d046f3ec8ed046960992adf2d76f82cff01b4e448142d51c4fa01d3136336df861e1d75c0c4416ecd25c47579671cd22a52dac5889c8370609ba7c14b6327f67360a76f9e862a396881893a6bc8fa6828a98fcb59f2"}, 0x10a) 14:27:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) [ 1129.974687] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 14:27:25 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x500, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x80803, 0x6) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100)='/', 0x1}], 0x1) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000001d0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) read(r0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) 14:27:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:27 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400000, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)="96ddca099f0e") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0xf}}, 0x5) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x3, 0x5}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000240)) read(0xffffffffffffffff, 0x0, 0xffffffffffffff8b) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0x46f4, 0x2, 0x7, 0x1, 0x8, 0x5, 0x1}) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) 14:27:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) 14:27:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x48, [{0xc0010015}]}) 14:27:27 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:27 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x49, [{0xc0010015}]}) [ 1131.903935] gfs2: not a GFS2 filesystem 14:27:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 14:27:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) 14:27:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0xfffffffffffffd9f) 14:27:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x79, [{0xc0010015}]}) 14:27:29 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) 14:27:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x218040, 0x0) write$binfmt_elf64(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x91b) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000a40), &(0x7f0000000a80)=0x8) read(r0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000a00)={0x4, 0x8000, 0x4}) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000200)={0x1f, 0x40e, &(0x7f00000000c0)="0c75bfa9a1fa7d5d5ef0b73f78a40f7741348f1061e562bb79722f65689a284f0589e4f6ba6a28ad6218d085cca73edc", &(0x7f0000000100)="ab7d70c8d524047920b2fdac4b3c061f0f2f0575f6cd0a83b315f903bd80db75aaa9e27d044b5ac3fac677e41423d5b3f9f4e3a61949848d43d08b17c8f5723de591061c328a0fcb6c8e36e6ac44403dd5eec68cc66c954fb384d8a7d0f5f6dc99fdf407a187cb2025f13e0f411a127e9bd0f1ce6d58208668b508b012a69b7560576e4c0b4630bf38f4d94d386d01bae35920c81394322eebca8f441bc2d04ed11af97a4f3e4a60adc0d3113ab67cbcce87f2232ec4f17cdbced71fd47afe820c0d433e2573", 0x30, 0xc6}) 14:27:29 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000440)=0xe8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX=r2, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX=r3, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC=r4, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:29 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8b, [{0xc0010015}]}) 14:27:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) fstat(r0, &(0x7f0000000140)) [ 1133.962261] hfsplus: invalid gid specified [ 1133.966566] hfsplus: unable to parse mount options [ 1134.130627] gfs2: not a GFS2 filesystem 14:27:29 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x802000000000000, 0x0) 14:27:29 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000440)=0xe8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX=r2, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX=r3, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC=r4, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) [ 1134.410698] hfsplus: invalid gid specified [ 1134.415011] hfsplus: unable to parse mount options 14:27:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:31 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x400, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000100)=@bcast) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) socketpair(0xa, 0x4, 0x5, &(0x7f0000000140)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) 14:27:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x9e, [{0xc0010015}]}) 14:27:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 14:27:31 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000440)=0xe8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX=r2, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX=r3, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC=r4, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1136.120731] hfsplus: invalid gid specified [ 1136.145841] hfsplus: unable to parse mount options 14:27:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) 14:27:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0, [{0xc0010015}]}) 14:27:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:31 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x880, 0x0) read(r0, 0x0, 0xfffffffffffffd08) fcntl$setpipe(r0, 0x407, 0xfffffffffffffffd) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x7, 0x4) 14:27:31 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000440)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX=r2, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX=r3, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1f, 0x800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20001}, 0xfffffffffffffebb, &(0x7f0000000240)={&(0x7f0000000180)={0x31, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x19e}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x2}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20040005}, 0x4800) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) [ 1136.642380] hfsplus: invalid gid specified 14:27:32 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, 0x0) 14:27:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc1, [{0xc0010015}]}) [ 1136.671978] hfsplus: unable to parse mount options 14:27:32 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:32 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX=r2, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:32 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:32 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x10280, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000140)={0x0, 0x1, 0x1, [], &(0x7f0000000100)=0x4}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x100000400801, 0x0) read(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e24, @rand_addr=0xda2}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r3, 0xffffffffffffffff}, &(0x7f0000000280)=0x8) prctl$PR_CAPBSET_DROP(0x18, 0x17) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) 14:27:32 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1137.094634] hfsplus: invalid gid specified [ 1137.107273] hfsplus: unable to parse mount options 14:27:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd00000000000000, 0x0) 14:27:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc2, [{0xc0010015}]}) 14:27:32 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:32 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:27:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2c}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 14:27:32 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) shutdown(r0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) [ 1137.512462] hfsplus: invalid gid specified [ 1137.516755] hfsplus: unable to parse mount options 14:27:33 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:27:33 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pwrite64(r0, &(0x7f0000000100)="3fbd24c85fbf786e58cdc0aa2713cb28d27b2d905ddd986c2aefc6a66ccba77ff8e6e383312943d1e99d258457ddad1f0857671cb970f5b7adf762084d3b5c344befbdc9d609e201956e82cdd88aed3e98771075c0f47d891e5547a270d6833d8e16edb1044d36e71c4e88177266cc15ae6b2c73495125358d20f6d55b77d7ea87b7c36b9f432eb3c66b5cb284bef5ba892358c6c52077d077dc5c0a15c5bb9042326a97a03e2710df24ae7b936b04f347c1fb371ad8dde762bbd0105d9c4b0eaee7e3a0174557f0d460fd226a653fc82ec90b36b9dbf9a561311d488a7f694daea192c11fe941187abd4821376f31e0c4cf82c8f879", 0xf6, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) 14:27:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xce, [{0xc0010015}]}) 14:27:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:33 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, 0x0) 14:27:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x10a, [{0xc0010015}]}) [ 1137.964002] hfsplus: invalid gid specified [ 1137.983653] hfsplus: unable to parse mount options 14:27:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x3, 0x3, 0xaaaf, 0x3, 0x3, 0x0, 0x3, 0xe2, 0x38, 0x2c4, 0x200, 0x200, 0x20, 0x2, 0x10001, 0xb4, 0x3ff}, [{0x70000000, 0x3f, 0x1, 0x4, 0x6, 0x4, 0x3ff}], "b610fe826f74092de1af38b563e13a622671c910114ae61fe6204090eaf5c4eb93c680cbfb7bbb4d2454f70e29617cd0649e8f40faff64f162ca490acf6f14be8aa7ceb5e122e9c841de983965128ccbec0acf6987653929d35f51b13a604c9b2555b097d800f06ba46320c3b5b8edad744c2afcc33f5b459dcf3fa12d5598547b6235192279f21b70fee4fa87736c198cb324a98bef4c0545ccad5db6f31a0fe836f30ad1329162", [[], []]}, 0x300) read(r0, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40, 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0xffffffffffffffc0, 0x0, 0x7fff, 0x7, 0x0, 0x5, 0x200, 0xd, 0x3, 0x2, 0x3c7c, 0x5, 0x2d, 0xe0ae, 0x20, 0x2, 0x6, 0xba8, 0x9, 0x8, 0x5, 0xfffffffffffff001, 0x8000, 0x6, 0x2, 0xf8a, 0x100000001, 0xe1, 0x1, 0x40, 0x10000, 0x0, 0x5fd, 0xffffffffffffffe0, 0xf, 0xff, 0x0, 0x8, 0x6, @perf_config_ext={0xffffffffffffff7f, 0x3ff}, 0x8, 0x6, 0x5, 0x5, 0x100000001, 0xfffffffffffffff8, 0x9}, r2, 0xe, r1, 0x2) ioctl$RTC_AIE_OFF(r0, 0x7002) 14:27:33 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x11e, [{0xc0010015}]}) [ 1138.367954] hfsplus: invalid gid specified 14:27:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x200) r1 = getuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f00000004c0)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) r6 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r6, 0x110, 0x5, &(0x7f0000000440)=[0x2], 0x2) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000380)={{0x3, r1, r2, r3, r5, 0x1, 0x8}, 0x1000, 0x100000000}) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20\x00', 0x7fffd, 0x0) read(r7, 0x0, 0x0) 14:27:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) [ 1138.406220] hfsplus: unable to parse mount options 14:27:35 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:27:35 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:35 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000140)=[{{r1, r2/1000+10000}, 0x0, 0x3, 0x20}, {{0x0, 0x2710}, 0x0, 0x0, 0x5}, {{0x0, 0x2710}, 0x0, 0x1c9, 0x5}], 0x48) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r3, 0x0, 0x0) 14:27:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x4000, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x140, [{0xc0010015}]}) 14:27:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2400000000000000, 0x0) [ 1140.172139] hfsplus: invalid gid specified [ 1140.193286] hfsplus: unable to parse mount options 14:27:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x342, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000300)={{0x200, 0xc2}, 'port1\x00', 0x80, 0x8, 0x0, 0x81, 0x9, 0x20, 0x1, 0x0, 0x0, 0x3ff}) r1 = syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x689c7672, 0x1) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f00000002c0)=0x405) recvfrom$rxrpc(r0, &(0x7f0000000480)=""/157, 0x9d, 0x2003, &(0x7f0000000540)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x9, @ipv4={[], [], @multicast2}, 0x10000}}, 0x24) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000400)={r2, 0x5, 0x1, [0x3]}, &(0x7f0000000440)=0xa) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000580)={r0, 0x0, 0xfffffffffffff000, 0xfffffffff0011000}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) statx(r3, &(0x7f0000000080)='./file0\x00', 0x1000, 0x7ff, &(0x7f0000000100)) read(r3, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000005c0)=0x4000, 0x4) socket$nl_route(0x10, 0x3, 0x0) 14:27:35 executing program 3: syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:35 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x0) 14:27:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x174, [{0xc0010015}]}) 14:27:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2602000000000000, 0x0) [ 1140.539870] hfsplus: invalid gid specified [ 1140.544151] hfsplus: unable to parse mount options 14:27:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:36 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8, 0x1c5000) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000100)=""/73, 0x49) read(r1, 0x0, 0x7b1fb8a686a7367) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) 14:27:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x175, [{0xc0010015}]}) 14:27:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) [ 1140.824616] hfsplus: invalid gid specified [ 1140.853962] hfsplus: unable to parse mount options 14:27:37 executing program 3: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0xffffffffffffff92) 14:27:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x176, [{0xc0010015}]}) 14:27:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 14:27:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:37 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x0) 14:27:38 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) read(r1, 0x0, 0x56) 14:27:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x17a, [{0xc0010015}]}) 14:27:38 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x0) 14:27:38 executing program 3: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4253465800000000, 0x0) 14:27:38 executing program 0: socket$inet6(0xa, 0x2, 0x1) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 14:27:38 executing program 3: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x17b, [{0xc0010015}]}) 14:27:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5a00000000000000, 0x0) 14:27:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x185, [{0xc0010015}]}) 14:27:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/141, 0x8d}, {&(0x7f0000000280)=""/19, 0x13}], 0x2, &(0x7f0000000300)=""/110, 0x6e}, 0x5}, {{&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/214, 0xd6}], 0x1, &(0x7f0000000540)=""/206, 0xce}, 0x6}], 0x2, 0x40, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000006c0)=0x1, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400080, 0x0) connect$x25(r1, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000700)={0x7, 0x70, 0x5cd, 0x40, 0x9, 0x7, 0x0, 0x80000001, 0x200, 0x4, 0x7, 0x18, 0x8, 0x9, 0x2f, 0x13221408, 0x5, 0x2, 0x7fffffff, 0x3, 0xe, 0x1, 0x5, 0x9, 0x9, 0x401, 0x7fffffff, 0xcc, 0xee, 0x9, 0x8, 0x5, 0x9, 0xfffffffffffffff8, 0xa3, 0x5a90b5a0, 0x1, 0x7fffffff, 0x0, 0x200, 0x1, @perf_config_ext={0x200, 0xfffffffffffffffa}, 0x800, 0x0, 0x6000000000000000, 0x9, 0x9, 0x80, 0x5}, r1, 0xb, 0xffffffffffffff9c, 0x8) read(r2, 0x0, 0x0) 14:27:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', 0x0, 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5b00000000000000, 0x0) 14:27:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x186, [{0xc0010015}]}) 14:27:40 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x1) write$P9_RMKDIR(r0, &(0x7f0000000140)={0x14}, 0x14) 14:27:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x83, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) syncfs(0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x8, 0x4a) 14:27:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) read(r0, 0x0, 0xfe86) 14:27:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x187, [{0xc0010015}]}) 14:27:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5c00000000000000, 0x0) 14:27:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', 0x0, 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) [ 1145.189784] audit: type=1400 audit(1551968860.609:104): avc: denied { setopt } for pid=13577 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 14:27:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x83, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x8, 0x4a) 14:27:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:42 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000340)={r0}) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r2, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40001) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)=0x0) capget(&(0x7f00000002c0)={0x39980732, r4}, &(0x7f0000000300)={0x4, 0x2, 0x1f, 0x800, 0x8fe6, 0xaa6d}) read(r3, 0x0, 0x0) r5 = getpgid(0xffffffffffffffff) get_robust_list(r5, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000240)=0x18) 14:27:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, 0x0) 14:27:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', 0x0, 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1a0, [{0xc0010015}]}) 14:27:42 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='mounts\x00') sendfile(r4, r5, 0x0, 0x80000001) [ 1146.926790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=13615 comm=syz-executor.4 14:27:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x4000, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) 14:27:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1c0, [{0xc0010015}]}) 14:27:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="9ca6aa65be509ce37ba778", 0xb, 0xfffffffffffffffc}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 14:27:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 14:27:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1d9, [{0xc0010015}]}) [ 1147.320248] hfsplus: invalid gid specified [ 1147.324806] hfsplus: unable to parse mount options 14:27:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8002000000000000, 0x0) 14:27:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:44 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000080)={0x7, 0x80000001}) read(r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000280)={0x3, 0x1, 0x63, 0x2, 0x9152, 0x9d25, 0x3, 0x100}, &(0x7f00000002c0)={0x6, 0x2, 0xffffffffffffff47, 0x0, 0x9, 0x7, 0x3, 0x2}, &(0x7f0000000300)={0xd26d, 0x45, 0x3, 0xff, 0xa8, 0xffffffffffffff81, 0xf0ae, 0x3}, &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={0x9}, 0x8}) pselect6(0x40, &(0x7f0000000100)={0x0, 0x80000001, 0x2, 0x2, 0x3, 0x0, 0x3478, 0xfff}, &(0x7f0000000140)={0x10000, 0x8, 0x5, 0x1f, 0x6, 0x95, 0xffffffffffff5616, 0x3ff}, &(0x7f0000000180)={0x3, 0x1f10000000000000, 0x0, 0x1, 0x7, 0x1ff, 0xfffffffffffff000, 0xffffffffffffffa8}, &(0x7f00000001c0), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) 14:27:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x277, [{0xc0010015}]}) 14:27:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) pwritev(r2, &(0x7f0000000440)=[{&(0x7f0000000380)='S', 0x1}], 0x1, 0x4081886) sendfile(r0, r2, 0x0, 0x100000000) sendfile(r0, r2, 0x0, 0x20020102000007) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) dup2(r2, r1) [ 1149.011462] hfsplus: invalid gid specified [ 1149.039778] hfsplus: unable to parse mount options 14:27:44 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0xfffffffffffffeeb) 14:27:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x2ff, [{0xc0010015}]}) 14:27:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="747970653d264af4972c6769643d", @ANYRESHEX, @ANYBLOB="2c706172743d307830303030303030ea0f0f12a40d97dc302c666f3fd6652c7569643d", @ANYRESHEX, @ANYBLOB=',nodecompose,fowner<', @ANYRESDEC, @ANYBLOB=',obj_role=@systemsecurity,dont_measure,obj_type=},dont_measure,\x00']) 14:27:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8003000000000000, 0x0) [ 1149.330535] hfsplus: invalid gid specified [ 1149.334865] hfsplus: unable to parse mount options 14:27:44 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000100)={0x4, 0x4}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r1, 0x0, 0x0) 14:27:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1149.588644] hfsplus: unable to find HFS+ superblock 14:27:46 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x308, [{0xc0010015}]}) 14:27:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8096980000000000, 0x0) 14:27:46 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0x8, 0x4) 14:27:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:27:46 executing program 4: delete_module(0x0, 0x200) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x6e, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r0, r1) [ 1151.429657] hfsplus: unable to find HFS+ superblock 14:27:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) sendto$x25(r0, &(0x7f0000000080)="93917de488623425472049a13cd9", 0xe, 0x4000, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) 14:27:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x47f, [{0xc0010015}]}) 14:27:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:27:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8401000000000000, 0x0) 14:27:47 executing program 4: delete_module(0x0, 0x200) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x6e, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r0, r1) [ 1151.738978] hfsplus: unable to find HFS+ superblock 14:27:47 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) readahead(r0, 0x9, 0x5) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000100)={'rose0\x00', {0x2, 0x4e20, @multicast1}}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 14:27:48 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x480, [{0xc0010015}]}) 14:27:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 14:27:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 14:27:48 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000100)) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0xfffffffffffffffe, 0x0) read(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000140)=""/63) 14:27:48 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000002400)=""/238, 0xee}], 0x1}, 0x0) write$P9_RSTATu(r0, &(0x7f0000000240)={0x4a, 0x7d, 0x0, {{0x0, 0x35, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0x1, '#', 0xfffffd99, '', 0x1, '\\'}}}, 0x4a) [ 1153.431909] input: syz0 as /devices/virtual/input/input9 14:27:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x1) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000280), 0x10) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, r0, 0xd, 0x3}, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x201, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x18, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'ip6erspan0\x00'}}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 14:27:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1153.528661] input: syz0 as /devices/virtual/input/input10 14:27:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa400000000000000, 0x0) 14:27:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000014c0)=""/4096) 14:27:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x491, [{0xc0010015}]}) 14:27:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x5, 0x27e, 0x8001, 0x4, 0x0, 0xb6c, 0x100, 0x3, 0x10000, 0x1000000, 0xffffffffffffbc34, 0xffffffff, 0x1, 0x7fffffff, 0x83, 0x2, 0x30000, 0x3, 0x97, 0x2, 0xd5, 0x4, 0x81, 0x7ff, 0x5, 0x8001, 0x4, 0x7, 0xfff, 0x3, 0x1f, 0xee, 0x7, 0x101, 0x1f, 0x100000000, 0x0, 0x1ff, 0x2, @perf_config_ext={0x86, 0x2}, 0x20000, 0x2, 0x3, 0x3, 0x1, 0xfffffffffffffff9, 0xaa31}, r1, 0x0, 0xffffffffffffffff, 0x1) read(r0, 0x0, 0x0) 14:27:50 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:27:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:27:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xac01000000000000, 0x0) 14:27:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4d0, [{0xc0010015}]}) 14:27:50 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200800, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000100)=0x81, 0x4) r1 = fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="350000003701000200080000000000000800000000000000", @ANYRES32=r1, @ANYBLOB="170065746831263a73656c662c2b6d6c6d655f74797065242d"], 0x35) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000180)=0x6f) read(r2, 0x0, 0x21b) fremovexattr(r3, &(0x7f00000003c0)=@random={'btrfs.', 'wlan0/vboxnet0,-\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@ethernet={0x307, @dev={[], 0x22}}, {&(0x7f00000001c0)=""/176, 0xb0}, &(0x7f0000000280), 0x20}, 0xa0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x6, 0x0, 0x9, 0x1, 0x7, 0xffffffff, 0xc85, 0x1, 0x9, 0x8, 0xab, 0x7}) 14:27:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 14:27:51 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) 14:27:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[0x2, 0x9, 0xff, 0x7fff, 0x800000000000007, 0x10000009]}) read(r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x2000, 0x0) setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000200)=0x80000001, 0x4) 14:27:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x560, [{0xc0010015}]}) 14:27:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc400000000000000, 0x0) 14:27:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x4000, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) 14:27:51 executing program 0: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000180)={0x6, 0x7ff, 0x1f, 0x1}, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000100)={0x4, 0x20, 0x3}) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 14:27:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x561, [{0xc0010015}]}) 14:28:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x200) r1 = getuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f00000004c0)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) r6 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r6, 0x110, 0x5, &(0x7f0000000440)=[0x2], 0x2) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000380)={{0x3, r1, r2, r3, r5, 0x1, 0x8}, 0x1000, 0x100000000}) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20\x00', 0x7fffd, 0x0) read(r7, 0x0, 0x0) 14:28:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd802000000000000, 0x0) 14:28:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000100)=0xcc8e) ioctl$SIOCNRDECOBS(r0, 0x89e2) read(r0, 0x0, 0xfffffffffffffd78) 14:28:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:01 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd804d71d88000000, 0x0) 14:28:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x2040) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 14:28:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x570, [{0xc0010015}]}) 14:28:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="30020000", @ANYRES16=r3, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0x4010}, 0x48000) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000100)={r1, r2/1000+30000}, 0x10) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) read(r0, 0x0, 0x0) 14:28:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe400000000000000, 0x0) 14:28:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x571, [{0xc0010015}]}) 14:28:11 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x40440, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r1, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r2, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 14:28:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe803000000000000, 0x0) 14:28:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:11 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x180) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402500}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa0, r1, 0x308, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @remote}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x4}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4800}, 0xc000) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 14:28:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x572, [{0xc0010015}]}) 14:28:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf003000000000000, 0x0) 14:28:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x24000, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000000c0)={0x80, 0x2}) read(r0, 0x0, 0xffffff72) 14:28:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x580, [{0xc0010015}]}) 14:28:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 14:28:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) set_mempolicy(0x1, &(0x7f0000000080)=0x3, 0x2288) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x20000000000100, 0x0) read(r0, 0x0, 0x0) 14:28:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x587, [{0xc0010015}]}) 14:28:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 14:28:21 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:22 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000100)="9c600e15a90f24b2365f4b5c9783bd9f01a8b023cda38c2595839e5e96b844b1a096d475570788cf406c02376335082790fa242ec897765df6742e6514ebb0017bad40dd1d655bff44a7de89aca9b35486e4f03d88af0f75b41b9f6fc06c27e8ea037e569ec5f84f26bc039db99ccdb19d9238d587696aaa0edec8db2fd910c0f6e6c2df1ffb80cb0a3a4c33d6a3825ce08f52953dff4b89fe97f8bd9f820e2f7c7abe67ce57d5d670cb4ab76a41b71541c04eda174f9b8e85d96c105b7296ce795ec624238f2c89e0c6222c72583bd590baf0dce4d26f9a2cfdcd5e86238cb8c7edbfbf76ae8e81bd4bdbee7965b782d583") r1 = socket(0x40000000015, 0x5, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x20400, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x2, 0x4) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f00000002c0)={0x3, @default}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000300)) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) read(r2, 0x0, 0xcb) 14:28:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) 14:28:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4004ae86, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:28:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x6e0, [{0xc0010015}]}) 14:28:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) 14:28:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4004ae86, &(0x7f0000000000)={0x100000000000008b, 0x0, [{0xc0010015}]}) 14:28:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x803, [{0xc0010015}]}) 14:28:24 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:28:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xa01, [{0xc0010015}]}) 14:28:24 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1188.734956] FAULT_INJECTION: forcing a failure. [ 1188.734956] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.786281] CPU: 0 PID: 14469 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1188.793249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.802604] Call Trace: [ 1188.805207] dump_stack+0x172/0x1f0 [ 1188.808854] should_fail.cold+0xa/0x15 [ 1188.812772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1188.817918] ? ___might_sleep+0x163/0x280 [ 1188.822106] __should_failslab+0x121/0x190 [ 1188.826377] should_failslab+0x9/0x14 [ 1188.830192] __kmalloc+0x2dc/0x740 [ 1188.833750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1188.839291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1188.844833] ? strnlen_user+0x1f0/0x280 [ 1188.848805] ? __x64_sys_memfd_create+0x13c/0x470 [ 1188.853649] __x64_sys_memfd_create+0x13c/0x470 [ 1188.858338] ? memfd_fcntl+0x1550/0x1550 [ 1188.862405] ? do_syscall_64+0x26/0x610 [ 1188.866379] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1188.870962] ? trace_hardirqs_on+0x67/0x230 [ 1188.875288] do_syscall_64+0x103/0x610 [ 1188.879190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1188.884380] RIP: 0033:0x457f29 [ 1188.887572] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1188.906472] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1188.914178] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1188.921442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1188.928707] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 14:28:24 executing program 4 (fault-call:6 fault-nth:0): syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1188.935983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa366e3a6d4 [ 1188.943249] R13: 00000000004c6827 R14: 00000000004dbdd8 R15: 0000000000000003 14:28:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xbff, [{0xc0010015}]}) 14:28:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sched_rr_get_interval(r2, &(0x7f0000000240)) [ 1189.099808] FAULT_INJECTION: forcing a failure. [ 1189.099808] name failslab, interval 1, probability 0, space 0, times 0 [ 1189.155015] CPU: 1 PID: 14486 Comm: syz-executor.4 Not tainted 5.0.0+ #10 [ 1189.161988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.171350] Call Trace: [ 1189.173964] dump_stack+0x172/0x1f0 [ 1189.177625] should_fail.cold+0xa/0x15 [ 1189.181544] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1189.186722] ? ___might_sleep+0x163/0x280 [ 1189.190892] __should_failslab+0x121/0x190 [ 1189.195158] should_failslab+0x9/0x14 [ 1189.198982] kmem_cache_alloc+0x2b2/0x6f0 14:28:24 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1189.203154] ? ksys_write+0x166/0x1f0 [ 1189.206970] getname_flags+0xd6/0x5b0 [ 1189.210804] ? do_syscall_64+0x26/0x610 [ 1189.214799] __x64_sys_execveat+0xd4/0x130 [ 1189.219060] do_syscall_64+0x103/0x610 [ 1189.222979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.228182] RIP: 0033:0x457f29 [ 1189.231389] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1189.250301] RSP: 002b:00007fa58cb38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1189.258021] RAX: ffffffffffffffda RBX: 00007fa58cb38c90 RCX: 0000000000457f29 [ 1189.261214] FAULT_INJECTION: forcing a failure. [ 1189.261214] name failslab, interval 1, probability 0, space 0, times 0 [ 1189.265299] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 1189.265309] RBP: 000000000073bfa0 R08: 0000000000001000 R09: 0000000000000000 [ 1189.265318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa58cb396d4 [ 1189.265327] R13: 00000000004be51a R14: 00000000004cee18 R15: 0000000000000005 [ 1189.332112] CPU: 0 PID: 14491 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1189.339059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.348430] Call Trace: [ 1189.351030] dump_stack+0x172/0x1f0 [ 1189.354739] should_fail.cold+0xa/0x15 [ 1189.358641] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1189.363755] ? ___might_sleep+0x163/0x280 [ 1189.367923] __should_failslab+0x121/0x190 [ 1189.372777] ? shmem_destroy_callback+0xc0/0xc0 [ 1189.377456] should_failslab+0x9/0x14 [ 1189.381266] kmem_cache_alloc+0x2b2/0x6f0 [ 1189.385424] ? __alloc_fd+0x430/0x530 [ 1189.389238] ? shmem_destroy_callback+0xc0/0xc0 [ 1189.393912] shmem_alloc_inode+0x1c/0x50 [ 1189.397977] alloc_inode+0x66/0x190 [ 1189.401613] new_inode_pseudo+0x19/0xf0 [ 1189.405590] new_inode+0x1f/0x40 [ 1189.408964] shmem_get_inode+0x84/0x780 [ 1189.412964] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1189.418143] shmem_file_setup+0x66/0x90 [ 1189.422128] __x64_sys_memfd_create+0x2a2/0x470 [ 1189.426807] ? memfd_fcntl+0x1550/0x1550 [ 1189.431322] ? do_syscall_64+0x26/0x610 [ 1189.435312] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1189.439910] ? trace_hardirqs_on+0x67/0x230 [ 1189.444243] do_syscall_64+0x103/0x610 [ 1189.448158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.453350] RIP: 0033:0x457f29 [ 1189.456550] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1189.475459] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1189.483171] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1189.490440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1189.497740] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1189.505024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa366e3a6d4 [ 1189.512297] R13: 00000000004c6827 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1189.592929] XFS (loop2): Invalid superblock magic number 14:28:32 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xd90, [{0xc0010015}]}) 14:28:32 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:32 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x100000, 0x0) 14:28:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:32 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1197.404784] FAULT_INJECTION: forcing a failure. [ 1197.404784] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.427164] CPU: 0 PID: 14524 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1197.434133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.443493] Call Trace: [ 1197.446100] dump_stack+0x172/0x1f0 [ 1197.449748] should_fail.cold+0xa/0x15 [ 1197.453648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1197.458772] ? ___might_sleep+0x163/0x280 [ 1197.462926] __should_failslab+0x121/0x190 [ 1197.467168] should_failslab+0x9/0x14 [ 1197.470974] kmem_cache_alloc+0x2b2/0x6f0 [ 1197.475122] ? map_id_range_down+0x1ee/0x370 [ 1197.479532] ? __put_user_ns+0x70/0x70 [ 1197.483423] ? shmem_alloc_inode+0x1c/0x50 [ 1197.487667] selinux_inode_alloc_security+0xb6/0x2a0 [ 1197.492775] security_inode_alloc+0x90/0xe0 [ 1197.497103] inode_init_always+0x56e/0xb50 [ 1197.501342] alloc_inode+0x83/0x190 [ 1197.504971] new_inode_pseudo+0x19/0xf0 [ 1197.508950] new_inode+0x1f/0x40 [ 1197.512320] shmem_get_inode+0x84/0x780 [ 1197.516303] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1197.521153] shmem_file_setup+0x66/0x90 [ 1197.525339] __x64_sys_memfd_create+0x2a2/0x470 [ 1197.530008] ? memfd_fcntl+0x1550/0x1550 [ 1197.534085] ? do_syscall_64+0x26/0x610 [ 1197.538060] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1197.542659] ? trace_hardirqs_on+0x67/0x230 [ 1197.546984] do_syscall_64+0x103/0x610 [ 1197.550879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.556076] RIP: 0033:0x457f29 [ 1197.559279] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1197.578181] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1197.585892] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1197.593156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1197.600421] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1197.607687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa366e3a6d4 [ 1197.614951] R13: 00000000004c6827 R14: 00000000004dbdd8 R15: 0000000000000003 14:28:33 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xda0, [{0xc0010015}]}) 14:28:33 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) recvmsg(r0, &(0x7f00000005c0)={&(0x7f00000000c0)=@tipc, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/189, 0xbd}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/224, 0xe0}, {&(0x7f0000000340)=""/83, 0x53}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/99, 0x63}], 0x6, &(0x7f0000000540)=""/97, 0x61}, 0x2142) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1197.826943] FAULT_INJECTION: forcing a failure. [ 1197.826943] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.882107] CPU: 0 PID: 14547 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1197.889109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.898593] Call Trace: [ 1197.901193] dump_stack+0x172/0x1f0 [ 1197.904837] should_fail.cold+0xa/0x15 [ 1197.908762] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1197.913881] ? ___might_sleep+0x163/0x280 [ 1197.918044] __should_failslab+0x121/0x190 [ 1197.918083] should_failslab+0x9/0x14 [ 1197.918110] kmem_cache_alloc+0x2b2/0x6f0 [ 1197.930304] ? map_id_range_down+0x1ee/0x370 [ 1197.930323] ? __put_user_ns+0x70/0x70 [ 1197.930340] ? shmem_alloc_inode+0x1c/0x50 [ 1197.930362] selinux_inode_alloc_security+0xb6/0x2a0 [ 1197.930381] security_inode_alloc+0x90/0xe0 [ 1197.930398] inode_init_always+0x56e/0xb50 [ 1197.930415] alloc_inode+0x83/0x190 [ 1197.930431] new_inode_pseudo+0x19/0xf0 [ 1197.930446] new_inode+0x1f/0x40 [ 1197.930462] shmem_get_inode+0x84/0x780 [ 1197.971534] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1197.971557] shmem_file_setup+0x66/0x90 [ 1197.971575] __x64_sys_memfd_create+0x2a2/0x470 [ 1197.971599] ? memfd_fcntl+0x1550/0x1550 [ 1197.989161] ? do_syscall_64+0x26/0x610 [ 1197.993155] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1197.997746] ? trace_hardirqs_on+0x67/0x230 [ 1198.002109] do_syscall_64+0x103/0x610 [ 1198.006006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.011191] RIP: 0033:0x457f29 [ 1198.014382] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1198.033278] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1198.040985] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1198.048250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1198.055524] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1198.062788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa366e3a6d4 [ 1198.070073] R13: 00000000004c6827 R14: 00000000004dbdd8 R15: 0000000000000003 14:28:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1100, [{0xc0010015}]}) 14:28:33 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1198.208095] XFS (loop2): Invalid superblock magic number [ 1198.291078] FAULT_INJECTION: forcing a failure. [ 1198.291078] name failslab, interval 1, probability 0, space 0, times 0 [ 1198.344519] CPU: 1 PID: 14569 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1198.351508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.360876] Call Trace: [ 1198.363490] dump_stack+0x172/0x1f0 [ 1198.367149] should_fail.cold+0xa/0x15 [ 1198.371065] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1198.376214] ? ___might_sleep+0x163/0x280 [ 1198.380388] __should_failslab+0x121/0x190 [ 1198.384647] should_failslab+0x9/0x14 [ 1198.388480] kmem_cache_alloc+0x2b2/0x6f0 [ 1198.392663] ? current_time+0x6b/0x140 [ 1198.396595] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1198.401727] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1198.406330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.411885] ? timespec64_trunc+0xf0/0x180 [ 1198.416155] __d_alloc+0x2e/0x8c0 [ 1198.419639] d_alloc_pseudo+0x1e/0x30 [ 1198.423459] alloc_file_pseudo+0xe2/0x280 [ 1198.427646] ? alloc_file+0x4d0/0x4d0 [ 1198.431467] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1198.437034] __shmem_file_setup.part.0+0x108/0x2b0 [ 1198.442053] shmem_file_setup+0x66/0x90 [ 1198.446059] __x64_sys_memfd_create+0x2a2/0x470 [ 1198.450765] ? memfd_fcntl+0x1550/0x1550 [ 1198.454863] ? do_syscall_64+0x26/0x610 [ 1198.458875] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1198.463478] ? trace_hardirqs_on+0x67/0x230 [ 1198.467825] do_syscall_64+0x103/0x610 [ 1198.471736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.476942] RIP: 0033:0x457f29 [ 1198.480158] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1198.499082] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1198.506816] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1198.514106] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1198.521475] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1198.528820] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa366e3a6d4 [ 1198.536109] R13: 00000000004c6827 R14: 00000000004dbdd8 R15: 0000000000000003 14:28:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1200, [{0xc0010015}]}) 14:28:35 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x108) 14:28:35 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1b00, [{0xc0010015}]}) 14:28:35 executing program 2: setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40400, 0x0) connect$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e22}, 0x6e) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x208a, 0x0) [ 1199.955919] FAULT_INJECTION: forcing a failure. [ 1199.955919] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.968091] CPU: 1 PID: 14588 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1199.975059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.984452] Call Trace: [ 1199.987082] dump_stack+0x172/0x1f0 [ 1199.990742] should_fail.cold+0xa/0x15 [ 1199.990772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1199.990797] ? ___might_sleep+0x163/0x280 [ 1200.003955] __should_failslab+0x121/0x190 [ 1200.008220] should_failslab+0x9/0x14 [ 1200.012047] kmem_cache_alloc+0x2b2/0x6f0 [ 1200.016226] ? __alloc_file+0x27/0x300 [ 1200.020136] ? rcu_read_lock_sched_held+0x110/0x130 [ 1200.025177] selinux_file_alloc_security+0xb4/0x190 [ 1200.030207] security_file_alloc+0x69/0xb0 [ 1200.034458] __alloc_file+0xac/0x300 [ 1200.038188] alloc_empty_file+0x72/0x170 [ 1200.042265] alloc_file+0x5e/0x4d0 [ 1200.045821] alloc_file_pseudo+0x189/0x280 [ 1200.050082] ? alloc_file+0x4d0/0x4d0 [ 1200.053902] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1200.059459] __shmem_file_setup.part.0+0x108/0x2b0 [ 1200.064401] shmem_file_setup+0x66/0x90 [ 1200.068391] __x64_sys_memfd_create+0x2a2/0x470 [ 1200.073079] ? memfd_fcntl+0x1550/0x1550 [ 1200.077246] ? do_syscall_64+0x26/0x610 [ 1200.081230] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1200.085825] ? trace_hardirqs_on+0x67/0x230 [ 1200.090159] do_syscall_64+0x103/0x610 [ 1200.094073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.099270] RIP: 0033:0x457f29 [ 1200.102470] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.121408] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1200.129132] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1200.136415] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1200.143698] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1200.150981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa366e3a6d4 [ 1200.158259] R13: 00000000004c6827 R14: 00000000004dbdd8 R15: 0000000000000003 14:28:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:43 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:43 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='id_legacy\x00$\xa0\xe6c\'\x1d>\xf2\r+|z:\x17\xd1\x16\xde\xb0;)c\xa8-\xa3zD]eN\xe5\xca\xc1#v\x02\xfe;\x1b3h\x96\x1dg\"\xfb\xce\xe3\xcc\x90C\x82\xaa\xf3\tN\xa0\'\xadQS\xf7h\xdb]+Ce\t\xc2\x85\b\xbe\xdbs\xc0%\xaf\x10N\xc8\xfbna\xc1\xe5s,z!\x8d\x05\xfd\xa5\xbd\x8e\x11M\xabr\x85?\x91\xc2\x121F\t\xc5C\x13\xa1\t^L\xcd\xc8P\xd0\xd6\x00\xeb\xc3\xc4\xad9\xee^\x9a\xdc\xcf\x14\x03\xb0\xf3@\xd0S\xaa\xaaI\xb6V\xb3\xaagl\x93\xb8\x819\n\x7f=', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0xffffffffffffff62, r0) keyctl$reject(0x13, r0, 0x2, 0x2, r1) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1e01, [{0xc0010015}]}) 14:28:43 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x300) 14:28:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1208.286827] FAULT_INJECTION: forcing a failure. [ 1208.286827] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.344702] CPU: 0 PID: 14668 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1208.351666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.361016] Call Trace: [ 1208.363624] dump_stack+0x172/0x1f0 [ 1208.367264] should_fail.cold+0xa/0x15 [ 1208.371161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1208.376287] ? ___might_sleep+0x163/0x280 [ 1208.380441] __should_failslab+0x121/0x190 [ 1208.384696] should_failslab+0x9/0x14 [ 1208.388509] kmem_cache_alloc+0x2b2/0x6f0 [ 1208.392659] ? notify_change+0x6d5/0xfb0 [ 1208.396721] ? do_sys_ftruncate+0x41e/0x550 [ 1208.401047] getname_flags+0xd6/0x5b0 [ 1208.404856] getname+0x1a/0x20 [ 1208.408048] do_sys_open+0x2c9/0x5d0 [ 1208.411777] ? filp_open+0x80/0x80 [ 1208.415326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1208.420091] ? do_syscall_64+0x26/0x610 [ 1208.424072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.429441] ? do_syscall_64+0x26/0x610 [ 1208.433421] __x64_sys_open+0x7e/0xc0 [ 1208.437222] do_syscall_64+0x103/0x610 [ 1208.441119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.446318] RIP: 0033:0x412011 [ 1208.449546] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1208.468882] RSP: 002b:00007fa366e39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1208.476589] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1208.483869] RDX: 00007fa366e39afa RSI: 0000000000000002 RDI: 00007fa366e39af0 [ 1208.491135] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1208.498403] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1208.505669] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1208.548093] XFS (loop2): Invalid superblock magic number 14:28:44 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:44 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:44 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x500) 14:28:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1208.792376] FAULT_INJECTION: forcing a failure. [ 1208.792376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1208.804237] CPU: 0 PID: 14711 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1208.811167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.820517] Call Trace: [ 1208.823136] dump_stack+0x172/0x1f0 [ 1208.826789] should_fail.cold+0xa/0x15 [ 1208.830703] ? __lock_acquire+0x548/0x3fb0 [ 1208.834957] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1208.840086] ? __lock_acquire+0x548/0x3fb0 [ 1208.844337] should_fail_alloc_page+0x50/0x60 [ 1208.848848] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1208.853530] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1208.858565] ? find_held_lock+0x35/0x130 [ 1208.862637] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1208.867759] cache_grow_begin+0x9c/0x860 [ 1208.871835] ? getname_flags+0xd6/0x5b0 [ 1208.875819] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1208.881366] kmem_cache_alloc+0x62d/0x6f0 [ 1208.885521] ? notify_change+0x6d5/0xfb0 [ 1208.889602] ? do_sys_ftruncate+0x41e/0x550 [ 1208.893938] getname_flags+0xd6/0x5b0 [ 1208.897751] getname+0x1a/0x20 [ 1208.900953] do_sys_open+0x2c9/0x5d0 [ 1208.904680] ? filp_open+0x80/0x80 [ 1208.908231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1208.913007] ? do_syscall_64+0x26/0x610 [ 1208.916994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.922362] ? do_syscall_64+0x26/0x610 [ 1208.926355] __x64_sys_open+0x7e/0xc0 [ 1208.930169] do_syscall_64+0x103/0x610 [ 1208.934074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.939279] RIP: 0033:0x412011 [ 1208.942480] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1208.961389] RSP: 002b:00007fa366e39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1208.969111] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1208.976386] RDX: 00007fa366e39afa RSI: 0000000000000002 RDI: 00007fa366e39af0 [ 1208.983659] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:28:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x3400, [{0xc0010015}]}) [ 1208.990961] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1208.998232] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1209.133396] hfsplus: unable to find HFS+ superblock 14:28:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x3a00, [{0xc0010015}]}) 14:28:44 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x600) 14:28:44 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x3}, 0x28, 0x2) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:44 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1209.437926] FAULT_INJECTION: forcing a failure. [ 1209.437926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1209.449815] CPU: 1 PID: 14837 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1209.456757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.466119] Call Trace: [ 1209.468733] dump_stack+0x172/0x1f0 [ 1209.472391] should_fail.cold+0xa/0x15 [ 1209.472410] ? __lock_acquire+0x548/0x3fb0 [ 1209.472431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1209.480553] ? __lock_acquire+0x548/0x3fb0 [ 1209.480587] should_fail_alloc_page+0x50/0x60 [ 1209.480605] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1209.499157] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1209.504213] ? find_held_lock+0x35/0x130 [ 1209.508302] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1209.513426] cache_grow_begin+0x9c/0x860 [ 1209.517516] ? getname_flags+0xd6/0x5b0 [ 1209.521513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1209.527073] kmem_cache_alloc+0x62d/0x6f0 [ 1209.531240] ? notify_change+0x6d5/0xfb0 14:28:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x3b00, [{0xc0010015}]}) [ 1209.535320] ? do_sys_ftruncate+0x41e/0x550 [ 1209.539668] getname_flags+0xd6/0x5b0 [ 1209.543494] getname+0x1a/0x20 [ 1209.546746] do_sys_open+0x2c9/0x5d0 [ 1209.550475] ? filp_open+0x80/0x80 [ 1209.554037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1209.558816] ? do_syscall_64+0x26/0x610 [ 1209.562815] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1209.568194] ? do_syscall_64+0x26/0x610 [ 1209.572233] __x64_sys_open+0x7e/0xc0 [ 1209.576048] do_syscall_64+0x103/0x610 [ 1209.579962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1209.585186] RIP: 0033:0x412011 [ 1209.588396] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1209.607316] RSP: 002b:00007fa366e39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1209.615046] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1209.622310] RDX: 00007fa366e39afa RSI: 0000000000000002 RDI: 00007fa366e39af0 [ 1209.629590] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:28:45 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x700) [ 1209.636874] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1209.644153] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1209.696682] hfsplus: unable to find HFS+ superblock [ 1209.941442] XFS (loop2): Invalid superblock magic number [ 1211.974787] IPVS: ftp: loaded support on port[0] = 21 [ 1212.093470] chnl_net:caif_netlink_parms(): no params data found [ 1212.183124] bridge0: port 1(bridge_slave_0) entered blocking state [ 1212.189701] bridge0: port 1(bridge_slave_0) entered disabled state [ 1212.196596] device bridge_slave_0 entered promiscuous mode [ 1212.265038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.271578] bridge0: port 2(bridge_slave_1) entered disabled state [ 1212.278608] device bridge_slave_1 entered promiscuous mode [ 1212.296392] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1212.306050] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1212.383346] team0: Port device team_slave_0 added [ 1212.389686] team0: Port device team_slave_1 added [ 1212.461020] device hsr_slave_0 entered promiscuous mode [ 1212.528558] device hsr_slave_1 entered promiscuous mode [ 1212.665792] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.672230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.678920] bridge0: port 1(bridge_slave_0) entered blocking state [ 1212.685287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1212.716716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1212.727472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1212.736762] bridge0: port 1(bridge_slave_0) entered disabled state [ 1212.744624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1212.752582] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1212.825881] 8021q: adding VLAN 0 to HW filter on device team0 [ 1212.837807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1212.845433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1212.851850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1212.869099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1212.876759] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.883212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.891310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1212.899477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1212.976673] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1212.986680] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1212.997708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1213.006682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1213.014807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1213.022659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1213.106951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1213.129397] device bridge_slave_1 left promiscuous mode [ 1213.134912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1213.189513] device bridge_slave_0 left promiscuous mode [ 1213.195025] bridge0: port 1(bridge_slave_0) entered disabled state [ 1214.971151] device hsr_slave_1 left promiscuous mode [ 1215.041986] device hsr_slave_0 left promiscuous mode [ 1215.114039] team0 (unregistering): Port device team_slave_1 removed [ 1215.124829] team0 (unregistering): Port device team_slave_0 removed [ 1215.135305] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1215.175339] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1215.276578] bond0 (unregistering): Released all slaves [ 1215.448590] gfs2: not a GFS2 filesystem 14:28:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:28:54 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x900) 14:28:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4001, [{0xc0010015}]}) 14:28:54 executing program 2: syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffb, 0xaaaaaaaaaaaaab0, &(0x7f00000014c0)=[{&(0x7f0000000100)="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", 0xfffffffffffffdb4, 0xf27}, {&(0x7f0000001100)="eaa178ce05c9dbab46e5e5525fb045976b76f46ec1f334632f767173289536c07aed2152c9967a1b89a865610415274dcb9a4be261739e15eec1215fb18358c1d721511bf9197d476cf34ae5fb242c22d9c975a8b5383ef9895b3ce59de7c24e", 0x60, 0x1}, {&(0x7f00000015c0)="3eb16016a8acb66ba8964614e02908450da99678468160ae2498ee970e3374883f29f2b89be7e808f21a4558323779bd54347f744654dae36f02982b91d182b4a235ca714a57999fba667cfceda6d821006d62664b", 0x55}, {&(0x7f0000001200)="d08accb196ca145e3c05653a7bb2ef3ea038766aed25a8cf54c72e6398674cf1d286dc008941e68e5560461975c860f84627eae5d8db477a0d81289856a96e8aafe9675f703cb2957db84452d4767a3fe410b2b6338501520c99865b729f247c7102d32e62fbf20f288946adacd4197ff69afcb101a9479937f9f535e695941233dea779cd10665491fb84a8254f5a564e25059e6bf3f2624f04978ba598720a1aa9e14e28f4231d80a7c252bd6ecafbe6169859fb1f99dfc8c88e86035107889e574252cbb498bf5170da572f3457e5ff5cc6ffdf4e3f486f57", 0xda, 0x4}, {&(0x7f0000001300)="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", 0xfa, 0x2}, {&(0x7f0000001400)="da0e6bd39925449483b7f02d08b84e3343f686fcd0e4e004c7", 0x19, 0x401}, {&(0x7f0000001440)="9c9b86a2f22be1d5e4e98b2a57db88b3dd2f8d746868837afd0d156ffabaf6c2f7f9f73b3c2537250a9350869b0adc38d8b5b1377c907a7865dd8f5430292078fdbd6a150247fea0f1c53fe8cc3dc83103b44dc8929ccd84dbc089c97e797926a709810a4970", 0x66, 0x401}], 0x80, &(0x7f0000001640)=ANY=[@ANYBLOB="6e6f686561702c6163746976655f6cfa93f126322c696e6c696e655f64656e745b0c06ac390ecf3537e672792c6d6561737572652c7365636c6162656c2c0098fee49f3c41406fad8e1f8cc28a58e72985b6c22e925d2a3dbcf5da12d672e7b0cfc8918bc267a6e167f4f57deeeb88a6d398e4b745025d35e82adb1f284f633722612f816ceba91a508ca2578424d115bd4555126985367b4e6b80b2e426eb712a829a2d546776eedee443bfb2ae54f315ccc1bad61037426793d23c9ab71a2b4b8c99077eccd7f7cf3c"]) r0 = syz_open_dev$admmidi(&(0x7f0000001180)='/dev/admmidi#\x00', 0x1000, 0x2000) ioctl$CAPI_INSTALLED(r0, 0x80024322) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 14:28:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1219.170812] FAULT_INJECTION: forcing a failure. [ 1219.170812] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.201980] CPU: 0 PID: 14900 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1219.203545] gfs2: not a GFS2 filesystem [ 1219.209021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.209028] Call Trace: [ 1219.209068] dump_stack+0x172/0x1f0 [ 1219.209103] should_fail.cold+0xa/0x15 [ 1219.232507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1219.237618] ? ___might_sleep+0x163/0x280 [ 1219.241794] __should_failslab+0x121/0x190 [ 1219.246038] should_failslab+0x9/0x14 [ 1219.249840] kmem_cache_alloc+0x2b2/0x6f0 [ 1219.253995] ? __alloc_file+0x27/0x300 [ 1219.257887] ? rcu_read_lock_sched_held+0x110/0x130 [ 1219.262908] selinux_file_alloc_security+0xb4/0x190 [ 1219.267927] security_file_alloc+0x69/0xb0 [ 1219.272170] __alloc_file+0xac/0x300 [ 1219.275892] alloc_empty_file+0x72/0x170 [ 1219.279955] path_openat+0xef/0x46e0 [ 1219.283682] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1219.288785] ? kasan_slab_alloc+0xf/0x20 [ 1219.292849] ? kmem_cache_alloc+0x11a/0x6f0 [ 1219.297173] ? getname_flags+0xd6/0x5b0 [ 1219.301146] ? getname+0x1a/0x20 [ 1219.304509] ? do_sys_open+0x2c9/0x5d0 [ 1219.308395] ? __x64_sys_open+0x7e/0xc0 [ 1219.312858] ? do_syscall_64+0x103/0x610 [ 1219.316939] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1219.322318] ? __lock_acquire+0x548/0x3fb0 [ 1219.326557] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1219.331237] ? __alloc_fd+0x430/0x530 [ 1219.335139] do_filp_open+0x1a1/0x280 [ 1219.338944] ? may_open_dev+0x100/0x100 [ 1219.342927] ? lock_downgrade+0x880/0x880 [ 1219.347118] ? kasan_check_read+0x11/0x20 [ 1219.351286] ? do_raw_spin_unlock+0x57/0x270 [ 1219.355721] ? _raw_spin_unlock+0x2d/0x50 [ 1219.359883] ? __alloc_fd+0x430/0x530 [ 1219.363700] do_sys_open+0x3fe/0x5d0 [ 1219.367421] ? filp_open+0x80/0x80 [ 1219.370970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1219.375733] ? do_syscall_64+0x26/0x610 [ 1219.379711] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1219.385090] ? do_syscall_64+0x26/0x610 [ 1219.389129] __x64_sys_open+0x7e/0xc0 [ 1219.392946] do_syscall_64+0x103/0x610 [ 1219.396838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1219.402114] RIP: 0033:0x412011 [ 1219.405305] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1219.424428] RSP: 002b:00007fa366e39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1219.432149] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1219.439415] RDX: 00007fa366e39afa RSI: 0000000000000002 RDI: 00007fa366e39af0 [ 1219.446681] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1219.453952] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1219.461221] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:28:54 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:28:55 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0xa00) 14:28:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:28:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4800, [{0xc0010015}]}) [ 1219.618452] XFS (loop2): Invalid superblock magic number 14:28:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1219.809404] FAULT_INJECTION: forcing a failure. [ 1219.809404] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.833474] CPU: 1 PID: 14933 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1219.840447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.849823] Call Trace: [ 1219.852437] dump_stack+0x172/0x1f0 [ 1219.856108] should_fail.cold+0xa/0x15 [ 1219.860027] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1219.865168] ? ___might_sleep+0x163/0x280 [ 1219.869346] __should_failslab+0x121/0x190 [ 1219.873629] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1219.878448] should_failslab+0x9/0x14 [ 1219.882276] kmem_cache_alloc_trace+0x2d1/0x760 [ 1219.886969] ? lockdep_init_map+0x1be/0x6d0 [ 1219.891325] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1219.896121] __kthread_create_on_node+0xf2/0x460 [ 1219.900904] ? lock_acquire+0x16f/0x3f0 [ 1219.904905] ? kthread_parkme+0xb0/0xb0 14:28:55 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0xb00) [ 1219.908912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1219.914473] ? mutex_trylock+0x1e0/0x1e0 [ 1219.918823] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1219.923622] kthread_create_on_node+0xbb/0xf0 [ 1219.928169] ? __kthread_create_on_node+0x460/0x460 [ 1219.933210] ? lockdep_init_map+0x1be/0x6d0 [ 1219.937554] ? lockdep_init_map+0x1be/0x6d0 [ 1219.941913] lo_ioctl+0xafb/0x20d0 [ 1219.945493] ? lo_rw_aio+0x1530/0x1530 [ 1219.949404] blkdev_ioctl+0xee8/0x1c40 [ 1219.953308] ? __lock_acquire+0x548/0x3fb0 [ 1219.957561] ? blkpg_ioctl+0xa90/0xa90 [ 1219.961494] ? find_held_lock+0x35/0x130 [ 1219.965595] ? ___might_sleep+0x163/0x280 [ 1219.969780] block_ioctl+0xee/0x130 [ 1219.973419] ? blkdev_fallocate+0x410/0x410 [ 1219.977766] do_vfs_ioctl+0xd6e/0x1390 [ 1219.981672] ? selinux_file_ioctl+0x46f/0x5e0 [ 1219.986189] ? selinux_file_ioctl+0x125/0x5e0 [ 1219.990711] ? ioctl_preallocate+0x210/0x210 [ 1219.995126] ? selinux_file_mprotect+0x620/0x620 [ 1219.999906] ? ksys_dup3+0x3e0/0x3e0 [ 1220.003629] ? do_sys_open+0x31d/0x5d0 [ 1220.007527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1220.013059] ? security_file_ioctl+0x93/0xc0 [ 1220.017497] ksys_ioctl+0xab/0xd0 [ 1220.020962] __x64_sys_ioctl+0x73/0xb0 [ 1220.024867] do_syscall_64+0x103/0x610 [ 1220.028777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1220.033969] RIP: 0033:0x457d97 [ 1220.037172] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1220.056090] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1220.063821] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1220.071099] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1220.078385] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1220.085657] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1220.092939] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:29:05 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4900, [{0xc0010015}]}) 14:29:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:05 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:05 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0xc00) 14:29:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="45b2ec918c1e24e5eb8ea3f34caa95b1eba7b76e69cc23d33b3ede620b1bfadfac7800585310233870e2ae7ffeaf7f31eb7e818f77068633cac6a8745e16bf79da0fb4b3b102ec99969c96dba2f7e7730a1644dc4403304074fe0a524060656a26252eb3eddb3ad50af50d0a315f2b5a5d0482c2d55b3c77f16de23e6f5fb3addfee0333c7d12ea6cf25a9a95c86fc16892dc7c0d2797ed08f8e7b9cbbd8d3049b", 0xa1, 0x7}], 0x12000, &(0x7f00000003c0)={[{@bsdgroups='bsdgroups'}, {@discard='discard'}, {@nodiscard='nodiscard'}, {@noattr2='noattr2'}, {@nobarrier='nobarrier'}, {@norecovery='norecovery'}, {@attr2='attr2'}], [{@uid_lt={'uid<', r0}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', r1}}, {@uid_gt={'uid>', r2}}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x23}}]}) [ 1230.054735] FAULT_INJECTION: forcing a failure. [ 1230.054735] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.079163] CPU: 1 PID: 14981 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1230.086197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.095595] Call Trace: [ 1230.098198] dump_stack+0x172/0x1f0 [ 1230.101857] should_fail.cold+0xa/0x15 [ 1230.105770] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1230.110891] ? ___might_sleep+0x163/0x280 [ 1230.115060] __should_failslab+0x121/0x190 [ 1230.119326] should_failslab+0x9/0x14 [ 1230.123152] kmem_cache_alloc+0x2b2/0x6f0 [ 1230.127313] ? __schedule+0x1387/0x1cc0 [ 1230.131314] __kernfs_new_node+0xef/0x690 [ 1230.135471] ? _raw_spin_unlock_irq+0x28/0x90 [ 1230.139998] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1230.144760] ? kasan_check_read+0x11/0x20 [ 1230.148920] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1230.153425] ? __schedule+0x1387/0x1cc0 [ 1230.157419] ? __lock_acquire+0x548/0x3fb0 [ 1230.161680] kernfs_new_node+0x99/0x130 [ 1230.165671] kernfs_create_dir_ns+0x52/0x160 [ 1230.170107] internal_create_group+0x7f8/0xc40 [ 1230.174712] ? bd_set_size+0x89/0xb0 [ 1230.178464] ? remove_files.isra.0+0x190/0x190 [ 1230.183080] sysfs_create_group+0x20/0x30 [ 1230.187247] lo_ioctl+0xf8f/0x20d0 [ 1230.190799] ? lo_rw_aio+0x1530/0x1530 [ 1230.194707] blkdev_ioctl+0xee8/0x1c40 [ 1230.198608] ? __lock_acquire+0x548/0x3fb0 [ 1230.202855] ? blkpg_ioctl+0xa90/0xa90 [ 1230.206743] ? find_held_lock+0x35/0x130 [ 1230.210838] ? ___might_sleep+0x163/0x280 [ 1230.215016] block_ioctl+0xee/0x130 [ 1230.218649] ? blkdev_fallocate+0x410/0x410 [ 1230.223102] do_vfs_ioctl+0xd6e/0x1390 [ 1230.227003] ? selinux_file_ioctl+0x46f/0x5e0 [ 1230.231505] ? selinux_file_ioctl+0x125/0x5e0 [ 1230.236017] ? ioctl_preallocate+0x210/0x210 [ 1230.240433] ? selinux_file_mprotect+0x620/0x620 [ 1230.245206] ? ksys_dup3+0x3e0/0x3e0 [ 1230.248930] ? do_sys_open+0x31d/0x5d0 [ 1230.252855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1230.258406] ? security_file_ioctl+0x93/0xc0 [ 1230.262834] ksys_ioctl+0xab/0xd0 [ 1230.266304] __x64_sys_ioctl+0x73/0xb0 [ 1230.270209] do_syscall_64+0x103/0x610 [ 1230.274122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1230.279323] RIP: 0033:0x457d97 [ 1230.282527] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1230.301433] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1230.309151] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1230.316433] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1230.323710] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1230.330987] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1230.338266] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1230.394324] hfsplus: unable to find HFS+ superblock 14:29:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x6005, [{0xc0010015}]}) 14:29:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:05 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0xd00) [ 1230.546351] XFS (loop2): Invalid superblock magic number 14:29:06 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x6105, [{0xc0010015}]}) [ 1230.700459] FAULT_INJECTION: forcing a failure. [ 1230.700459] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.716961] CPU: 0 PID: 15031 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1230.723901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.733241] Call Trace: [ 1230.735822] dump_stack+0x172/0x1f0 [ 1230.739454] should_fail.cold+0xa/0x15 [ 1230.743443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1230.748557] ? ___might_sleep+0x163/0x280 [ 1230.752710] __should_failslab+0x121/0x190 [ 1230.756971] should_failslab+0x9/0x14 [ 1230.760783] kmem_cache_alloc+0x2b2/0x6f0 [ 1230.764944] ? __schedule+0x1387/0x1cc0 [ 1230.768936] __kernfs_new_node+0xef/0x690 [ 1230.773114] ? _raw_spin_unlock_irq+0x28/0x90 [ 1230.777613] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1230.782369] ? kasan_check_read+0x11/0x20 [ 1230.786527] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1230.791033] ? __schedule+0x1387/0x1cc0 [ 1230.795028] ? __lock_acquire+0x548/0x3fb0 [ 1230.799266] kernfs_new_node+0x99/0x130 [ 1230.803252] kernfs_create_dir_ns+0x52/0x160 [ 1230.807657] internal_create_group+0x7f8/0xc40 [ 1230.812227] ? bd_set_size+0x89/0xb0 [ 1230.815947] ? remove_files.isra.0+0x190/0x190 [ 1230.820555] sysfs_create_group+0x20/0x30 [ 1230.824725] lo_ioctl+0xf8f/0x20d0 [ 1230.828285] ? lo_rw_aio+0x1530/0x1530 [ 1230.832181] blkdev_ioctl+0xee8/0x1c40 [ 1230.836098] ? __lock_acquire+0x548/0x3fb0 [ 1230.840355] ? blkpg_ioctl+0xa90/0xa90 [ 1230.844236] ? find_held_lock+0x35/0x130 [ 1230.848316] ? ___might_sleep+0x163/0x280 [ 1230.852468] block_ioctl+0xee/0x130 [ 1230.856126] ? blkdev_fallocate+0x410/0x410 [ 1230.860461] do_vfs_ioctl+0xd6e/0x1390 [ 1230.864346] ? selinux_file_ioctl+0x46f/0x5e0 [ 1230.868834] ? selinux_file_ioctl+0x125/0x5e0 [ 1230.873324] ? ioctl_preallocate+0x210/0x210 [ 1230.877723] ? selinux_file_mprotect+0x620/0x620 [ 1230.882485] ? ksys_dup3+0x3e0/0x3e0 [ 1230.886199] ? do_sys_open+0x31d/0x5d0 [ 1230.890109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1230.895659] ? security_file_ioctl+0x93/0xc0 [ 1230.900108] ksys_ioctl+0xab/0xd0 [ 1230.903565] __x64_sys_ioctl+0x73/0xb0 [ 1230.907450] do_syscall_64+0x103/0x610 [ 1230.911342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1230.916541] RIP: 0033:0x457d97 [ 1230.919737] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1230.938638] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1230.938654] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1230.938662] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1230.938671] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1230.938679] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1230.938688] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1231.006406] hfsplus: unable to find HFS+ superblock 14:29:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:16 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0xe00) 14:29:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7005, [{0xc0010015}]}) 14:29:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:16 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x396, 0x0, 0x0, 0x0) socket$inet6(0xa, 0xa, 0x2) [ 1240.958873] FAULT_INJECTION: forcing a failure. [ 1240.958873] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.970247] CPU: 1 PID: 15065 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1240.977198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.986564] Call Trace: [ 1240.989197] dump_stack+0x172/0x1f0 [ 1240.992849] should_fail.cold+0xa/0x15 [ 1240.996777] ? kernel_text_address+0x73/0xf0 [ 1241.001202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1241.006328] __should_failslab+0x121/0x190 [ 1241.010591] should_failslab+0x9/0x14 [ 1241.014409] kmem_cache_alloc+0x47/0x6f0 [ 1241.018492] ? save_stack+0xa9/0xd0 [ 1241.022136] ? save_stack+0x45/0xd0 [ 1241.025773] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1241.030897] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1241.036555] idr_get_free+0x425/0x8d0 [ 1241.040387] idr_alloc_u32+0x19e/0x330 [ 1241.044287] ? __fprop_inc_percpu_max+0x230/0x230 [ 1241.049146] ? mark_held_locks+0xf0/0xf0 [ 1241.053238] idr_alloc_cyclic+0x132/0x270 [ 1241.057411] ? idr_alloc+0x150/0x150 [ 1241.061160] __kernfs_new_node+0x171/0x690 [ 1241.065407] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1241.070178] ? kasan_check_read+0x11/0x20 [ 1241.074345] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1241.078847] ? __schedule+0x1387/0x1cc0 [ 1241.082841] ? __lock_acquire+0x548/0x3fb0 [ 1241.087097] kernfs_new_node+0x99/0x130 [ 1241.091097] kernfs_create_dir_ns+0x52/0x160 [ 1241.095526] internal_create_group+0x7f8/0xc40 [ 1241.100159] ? bd_set_size+0x89/0xb0 [ 1241.103892] ? remove_files.isra.0+0x190/0x190 [ 1241.108501] sysfs_create_group+0x20/0x30 [ 1241.112666] lo_ioctl+0xf8f/0x20d0 [ 1241.116220] ? lo_rw_aio+0x1530/0x1530 [ 1241.120128] blkdev_ioctl+0xee8/0x1c40 [ 1241.124033] ? __lock_acquire+0x548/0x3fb0 [ 1241.128291] ? blkpg_ioctl+0xa90/0xa90 [ 1241.132193] ? find_held_lock+0x35/0x130 [ 1241.136281] ? ___might_sleep+0x163/0x280 [ 1241.140450] block_ioctl+0xee/0x130 [ 1241.144091] ? blkdev_fallocate+0x410/0x410 [ 1241.148430] do_vfs_ioctl+0xd6e/0x1390 [ 1241.152333] ? selinux_file_ioctl+0x46f/0x5e0 [ 1241.156836] ? selinux_file_ioctl+0x125/0x5e0 [ 1241.161348] ? ioctl_preallocate+0x210/0x210 [ 1241.165771] ? selinux_file_mprotect+0x620/0x620 [ 1241.170549] ? ksys_dup3+0x3e0/0x3e0 [ 1241.174282] ? do_sys_open+0x31d/0x5d0 [ 1241.178188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1241.183741] ? security_file_ioctl+0x93/0xc0 [ 1241.188163] ksys_ioctl+0xab/0xd0 [ 1241.191630] __x64_sys_ioctl+0x73/0xb0 [ 1241.195531] do_syscall_64+0x103/0x610 [ 1241.199439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1241.204657] RIP: 0033:0x457d97 [ 1241.207874] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1241.226794] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1241.234528] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1241.241812] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1241.249114] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:29:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1241.256395] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1241.263681] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:29:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:16 executing program 2: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) sendto$unix(r0, &(0x7f00000000c0)="d909ce7f13948d6ea0e8", 0xa, 0x4000, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) socket$tipc(0x1e, 0x5, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x4) [ 1241.325278] hfsplus: unable to find HFS+ superblock 14:29:16 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1001) 14:29:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:16 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1241.592870] FAULT_INJECTION: forcing a failure. [ 1241.592870] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.609807] CPU: 0 PID: 15105 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1241.616746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.626099] Call Trace: [ 1241.628695] dump_stack+0x172/0x1f0 [ 1241.632345] should_fail.cold+0xa/0x15 [ 1241.636240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1241.641346] ? ___might_sleep+0x163/0x280 [ 1241.645526] __should_failslab+0x121/0x190 [ 1241.649771] should_failslab+0x9/0x14 [ 1241.653580] kmem_cache_alloc+0x2b2/0x6f0 [ 1241.657738] ? lock_downgrade+0x880/0x880 [ 1241.661888] ? kasan_check_read+0x11/0x20 [ 1241.666035] __kernfs_new_node+0xef/0x690 [ 1241.670207] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1241.674967] ? wait_for_completion+0x440/0x440 [ 1241.679556] ? mutex_unlock+0xd/0x10 [ 1241.683264] ? kernfs_activate+0x192/0x1f0 [ 1241.687490] kernfs_new_node+0x99/0x130 [ 1241.691465] __kernfs_create_file+0x51/0x340 [ 1241.695877] sysfs_add_file_mode_ns+0x222/0x560 [ 1241.700568] internal_create_group+0x35b/0xc40 [ 1241.705164] ? bd_set_size+0x89/0xb0 [ 1241.708901] ? remove_files.isra.0+0x190/0x190 [ 1241.713490] sysfs_create_group+0x20/0x30 [ 1241.717638] lo_ioctl+0xf8f/0x20d0 [ 1241.721195] ? lo_rw_aio+0x1530/0x1530 [ 1241.725115] blkdev_ioctl+0xee8/0x1c40 [ 1241.729014] ? __lock_acquire+0x548/0x3fb0 [ 1241.733264] ? blkpg_ioctl+0xa90/0xa90 [ 1241.737158] ? find_held_lock+0x35/0x130 [ 1241.741243] ? ___might_sleep+0x163/0x280 [ 1241.745408] block_ioctl+0xee/0x130 [ 1241.749042] ? blkdev_fallocate+0x410/0x410 [ 1241.753390] do_vfs_ioctl+0xd6e/0x1390 [ 1241.757265] ? selinux_file_ioctl+0x46f/0x5e0 [ 1241.761756] ? selinux_file_ioctl+0x125/0x5e0 [ 1241.766427] ? ioctl_preallocate+0x210/0x210 [ 1241.770823] ? selinux_file_mprotect+0x620/0x620 [ 1241.775577] ? ksys_dup3+0x3e0/0x3e0 [ 1241.779293] ? do_sys_open+0x31d/0x5d0 [ 1241.783181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1241.788715] ? security_file_ioctl+0x93/0xc0 [ 1241.793122] ksys_ioctl+0xab/0xd0 [ 1241.796565] __x64_sys_ioctl+0x73/0xb0 [ 1241.800465] do_syscall_64+0x103/0x610 [ 1241.804361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1241.809547] RIP: 0033:0x457d97 [ 1241.812740] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1241.831627] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:29:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7105, [{0xc0010015}]}) [ 1241.839330] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1241.846597] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1241.853852] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1241.861110] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1241.868388] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1241.879011] XFS (loop2): Invalid superblock magic number [ 1241.912039] hfsplus: unable to find HFS+ superblock 14:29:17 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1002) 14:29:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:17 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7205, [{0xc0010015}]}) [ 1242.124897] FAULT_INJECTION: forcing a failure. [ 1242.124897] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.145529] CPU: 1 PID: 15132 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1242.152510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.161884] Call Trace: [ 1242.164514] dump_stack+0x172/0x1f0 [ 1242.168178] should_fail.cold+0xa/0x15 14:29:17 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1003) [ 1242.172104] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1242.177239] ? ___might_sleep+0x163/0x280 [ 1242.181410] __should_failslab+0x121/0x190 [ 1242.185650] should_failslab+0x9/0x14 [ 1242.189464] kmem_cache_alloc+0x2b2/0x6f0 [ 1242.193639] ? lock_downgrade+0x880/0x880 [ 1242.197803] ? kasan_check_read+0x11/0x20 [ 1242.201952] __kernfs_new_node+0xef/0x690 [ 1242.206111] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1242.210874] ? wait_for_completion+0x440/0x440 [ 1242.215462] ? mutex_unlock+0xd/0x10 [ 1242.219172] ? kernfs_activate+0x192/0x1f0 [ 1242.223423] kernfs_new_node+0x99/0x130 [ 1242.227431] __kernfs_create_file+0x51/0x340 [ 1242.231857] sysfs_add_file_mode_ns+0x222/0x560 [ 1242.236546] internal_create_group+0x35b/0xc40 [ 1242.241147] ? bd_set_size+0x89/0xb0 [ 1242.244891] ? remove_files.isra.0+0x190/0x190 [ 1242.249478] sysfs_create_group+0x20/0x30 [ 1242.253627] lo_ioctl+0xf8f/0x20d0 [ 1242.257163] ? lo_rw_aio+0x1530/0x1530 [ 1242.261053] blkdev_ioctl+0xee8/0x1c40 [ 1242.264945] ? __lock_acquire+0x548/0x3fb0 [ 1242.269176] ? blkpg_ioctl+0xa90/0xa90 [ 1242.273059] ? find_held_lock+0x35/0x130 [ 1242.277138] ? ___might_sleep+0x163/0x280 [ 1242.281322] block_ioctl+0xee/0x130 [ 1242.284943] ? blkdev_fallocate+0x410/0x410 [ 1242.289285] do_vfs_ioctl+0xd6e/0x1390 [ 1242.293181] ? selinux_file_ioctl+0x46f/0x5e0 [ 1242.297695] ? selinux_file_ioctl+0x125/0x5e0 [ 1242.302217] ? ioctl_preallocate+0x210/0x210 [ 1242.306647] ? selinux_file_mprotect+0x620/0x620 [ 1242.311428] ? ksys_dup3+0x3e0/0x3e0 [ 1242.315158] ? do_sys_open+0x31d/0x5d0 [ 1242.319051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1242.324603] ? security_file_ioctl+0x93/0xc0 [ 1242.329009] ksys_ioctl+0xab/0xd0 [ 1242.332459] __x64_sys_ioctl+0x73/0xb0 [ 1242.336353] do_syscall_64+0x103/0x610 [ 1242.340248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1242.345437] RIP: 0033:0x457d97 [ 1242.348626] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1242.367519] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1242.375407] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1242.382671] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1242.389945] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1242.397209] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1242.404471] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1242.436185] hfsplus: unable to find HFS+ superblock 14:29:27 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:27 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1004) 14:29:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7401, [{0xc0010015}]}) 14:29:27 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xb778, 0x2c, 0x0, 0x8000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000240)='xfs\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x7f, 0x0) perf_event_open(&(0x7f0000000100)={0x9fb8ac9224bbe27f, 0x70, 0x8, 0x0, 0xfffffffffffffffb, 0xd4a, 0x0, 0x6, 0x101a1, 0x6, 0x1, 0x3f, 0x4, 0x703, 0x1, 0x2, 0xbc, 0x9, 0x3, 0x8, 0x0, 0x4, 0x3e15, 0x8, 0x1, 0x80000000, 0x200, 0xfff, 0x1, 0x5, 0x1, 0x81, 0x6, 0x5, 0x6, 0x7b4, 0x9, 0x7, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x4500, 0x4, 0x8000, 0x1, 0x4, 0x2800000000000000, 0x4}, r0, 0x7, r1, 0xa) 14:29:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x100000000, 0x0, 0x80, 0xfffffffffffffc01}, {0x0, 0x7, 0x0, 0x1}, {0x176, 0x8, 0x4, 0x809}, {0x2, 0x5, 0x0, 0x9}, {0x5, 0x1f, 0x8, 0x5}]}) socket$caif_stream(0x25, 0x1, 0x3) socket$caif_stream(0x25, 0x1, 0xfffffffffffffffb) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={@remote={[], 0x2}, 0x6, 'vlan0\x00'}) [ 1251.852287] FAULT_INJECTION: forcing a failure. [ 1251.852287] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.885335] CPU: 1 PID: 15164 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1251.892300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.901669] Call Trace: [ 1251.904287] dump_stack+0x172/0x1f0 [ 1251.907949] should_fail.cold+0xa/0x15 [ 1251.911861] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1251.916994] ? ___might_sleep+0x163/0x280 [ 1251.921165] __should_failslab+0x121/0x190 [ 1251.921190] should_failslab+0x9/0x14 [ 1251.921208] kmem_cache_alloc+0x2b2/0x6f0 [ 1251.921229] ? lock_downgrade+0x880/0x880 [ 1251.921246] ? kasan_check_read+0x11/0x20 [ 1251.921267] __kernfs_new_node+0xef/0x690 [ 1251.921293] ? kernfs_dop_revalidate+0x3c0/0x3c0 14:29:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7501, [{0xc0010015}]}) [ 1251.921313] ? wait_for_completion+0x440/0x440 [ 1251.929609] ? mutex_unlock+0xd/0x10 [ 1251.929625] ? kernfs_activate+0x192/0x1f0 [ 1251.929644] kernfs_new_node+0x99/0x130 [ 1251.929665] __kernfs_create_file+0x51/0x340 [ 1251.929702] sysfs_add_file_mode_ns+0x222/0x560 [ 1251.929726] internal_create_group+0x35b/0xc40 [ 1251.938193] ? bd_set_size+0x89/0xb0 [ 1251.938220] ? remove_files.isra.0+0x190/0x190 [ 1251.938249] sysfs_create_group+0x20/0x30 [ 1251.938267] lo_ioctl+0xf8f/0x20d0 [ 1251.938286] ? lo_rw_aio+0x1530/0x1530 [ 1251.946592] blkdev_ioctl+0xee8/0x1c40 [ 1251.946609] ? __lock_acquire+0x548/0x3fb0 [ 1251.946625] ? blkpg_ioctl+0xa90/0xa90 [ 1251.946641] ? find_held_lock+0x35/0x130 [ 1251.955991] ? ___might_sleep+0x163/0x280 [ 1251.956013] block_ioctl+0xee/0x130 [ 1251.956027] ? blkdev_fallocate+0x410/0x410 [ 1251.956046] do_vfs_ioctl+0xd6e/0x1390 [ 1251.956071] ? selinux_file_ioctl+0x46f/0x5e0 [ 1251.964250] ? selinux_file_ioctl+0x125/0x5e0 [ 1251.964268] ? ioctl_preallocate+0x210/0x210 [ 1251.964283] ? selinux_file_mprotect+0x620/0x620 [ 1251.964307] ? ksys_dup3+0x3e0/0x3e0 [ 1251.964330] ? do_sys_open+0x31d/0x5d0 [ 1251.972720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.972740] ? security_file_ioctl+0x93/0xc0 [ 1251.972759] ksys_ioctl+0xab/0xd0 [ 1251.972778] __x64_sys_ioctl+0x73/0xb0 [ 1251.972799] do_syscall_64+0x103/0x610 [ 1251.990351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.990365] RIP: 0033:0x457d97 [ 1251.990382] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1251.990390] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1251.998101] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1251.998110] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1251.998120] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1251.998129] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1251.998142] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:29:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1005) [ 1252.087171] hfsplus: unable to find HFS+ superblock 14:29:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1252.277622] XFS (loop2): Invalid superblock magic number 14:29:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7601, [{0xc0010015}]}) 14:29:27 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1006) [ 1252.479196] FAULT_INJECTION: forcing a failure. [ 1252.479196] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.513819] CPU: 0 PID: 15228 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1252.520792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.520799] Call Trace: [ 1252.520825] dump_stack+0x172/0x1f0 [ 1252.520850] should_fail.cold+0xa/0x15 [ 1252.540318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1252.545429] ? ___might_sleep+0x163/0x280 [ 1252.549586] __should_failslab+0x121/0x190 [ 1252.553837] should_failslab+0x9/0x14 [ 1252.557651] kmem_cache_alloc+0x2b2/0x6f0 [ 1252.561813] ? lock_downgrade+0x880/0x880 [ 1252.565965] ? kasan_check_read+0x11/0x20 [ 1252.570152] __kernfs_new_node+0xef/0x690 [ 1252.574304] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1252.579082] ? wait_for_completion+0x440/0x440 [ 1252.583675] ? mutex_unlock+0xd/0x10 [ 1252.587394] ? kernfs_activate+0x192/0x1f0 [ 1252.591636] kernfs_new_node+0x99/0x130 [ 1252.595616] __kernfs_create_file+0x51/0x340 [ 1252.600036] sysfs_add_file_mode_ns+0x222/0x560 [ 1252.604720] internal_create_group+0x35b/0xc40 [ 1252.609302] ? bd_set_size+0x89/0xb0 [ 1252.613048] ? remove_files.isra.0+0x190/0x190 [ 1252.617651] sysfs_create_group+0x20/0x30 [ 1252.621808] lo_ioctl+0xf8f/0x20d0 [ 1252.625377] ? lo_rw_aio+0x1530/0x1530 [ 1252.629270] blkdev_ioctl+0xee8/0x1c40 [ 1252.633162] ? __lock_acquire+0x548/0x3fb0 [ 1252.637400] ? blkpg_ioctl+0xa90/0xa90 [ 1252.641287] ? find_held_lock+0x35/0x130 [ 1252.645362] ? ___might_sleep+0x163/0x280 [ 1252.649518] block_ioctl+0xee/0x130 [ 1252.653173] ? blkdev_fallocate+0x410/0x410 [ 1252.657499] do_vfs_ioctl+0xd6e/0x1390 [ 1252.661393] ? selinux_file_ioctl+0x46f/0x5e0 [ 1252.665885] ? selinux_file_ioctl+0x125/0x5e0 [ 1252.670387] ? ioctl_preallocate+0x210/0x210 [ 1252.674795] ? selinux_file_mprotect+0x620/0x620 [ 1252.679571] ? ksys_dup3+0x3e0/0x3e0 [ 1252.683285] ? do_sys_open+0x31d/0x5d0 [ 1252.687182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1252.692727] ? security_file_ioctl+0x93/0xc0 [ 1252.697163] ksys_ioctl+0xab/0xd0 [ 1252.700622] __x64_sys_ioctl+0x73/0xb0 [ 1252.704514] do_syscall_64+0x103/0x610 [ 1252.708410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1252.713606] RIP: 0033:0x457d97 14:29:28 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1252.716808] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1252.735703] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1252.743411] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1252.750677] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1252.757940] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1252.765206] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1252.772472] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1252.827083] hfsplus: unable to find HFS+ superblock 14:29:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7702, [{0xc0010015}]}) 14:29:28 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1007) 14:29:28 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1253.001864] FAULT_INJECTION: forcing a failure. [ 1253.001864] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.015457] CPU: 0 PID: 15255 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1253.022397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.031748] Call Trace: [ 1253.034349] dump_stack+0x172/0x1f0 [ 1253.038011] should_fail.cold+0xa/0x15 [ 1253.041959] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1253.047094] ? ___might_sleep+0x163/0x280 [ 1253.051260] __should_failslab+0x121/0x190 [ 1253.055507] should_failslab+0x9/0x14 [ 1253.059343] kmem_cache_alloc_trace+0x2d1/0x760 [ 1253.064027] kobject_uevent_env+0x2fb/0x1030 [ 1253.068455] kobject_uevent+0x20/0x26 [ 1253.072275] lo_ioctl+0x100b/0x20d0 [ 1253.075923] ? lo_rw_aio+0x1530/0x1530 [ 1253.079819] blkdev_ioctl+0xee8/0x1c40 [ 1253.084056] ? __lock_acquire+0x548/0x3fb0 [ 1253.088301] ? blkpg_ioctl+0xa90/0xa90 [ 1253.092189] ? find_held_lock+0x35/0x130 [ 1253.096273] ? ___might_sleep+0x163/0x280 [ 1253.100431] block_ioctl+0xee/0x130 [ 1253.104055] ? blkdev_fallocate+0x410/0x410 [ 1253.108572] do_vfs_ioctl+0xd6e/0x1390 [ 1253.112461] ? selinux_file_ioctl+0x46f/0x5e0 [ 1253.116950] ? selinux_file_ioctl+0x125/0x5e0 [ 1253.121447] ? ioctl_preallocate+0x210/0x210 [ 1253.125853] ? selinux_file_mprotect+0x620/0x620 [ 1253.130615] ? ksys_dup3+0x3e0/0x3e0 [ 1253.134332] ? do_sys_open+0x31d/0x5d0 [ 1253.138260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.143819] ? security_file_ioctl+0x93/0xc0 [ 1253.148229] ksys_ioctl+0xab/0xd0 [ 1253.151690] __x64_sys_ioctl+0x73/0xb0 [ 1253.155581] do_syscall_64+0x103/0x610 [ 1253.159482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1253.164669] RIP: 0033:0x457d97 [ 1253.167865] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1253.186771] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1253.194481] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1253.201753] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1253.209044] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1253.216313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1253.223581] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1253.278557] hfsplus: unable to find HFS+ superblock 14:29:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lookup_dcookie(0x40, &(0x7f00000000c0)=""/255, 0xff) socket$packet(0x11, 0x2, 0x300) 14:29:28 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:29:28 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x102f) 14:29:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7900, [{0xc0010015}]}) 14:29:28 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1253.457969] FAULT_INJECTION: forcing a failure. [ 1253.457969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1253.469812] CPU: 0 PID: 15297 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1253.476745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.486108] Call Trace: [ 1253.486135] dump_stack+0x172/0x1f0 [ 1253.486160] should_fail.cold+0xa/0x15 [ 1253.486180] ? mark_held_locks+0xa4/0xf0 [ 1253.486205] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1253.492418] ? __lock_acquire+0x548/0x3fb0 [ 1253.492436] ? trace_hardirqs_on+0x67/0x230 [ 1253.492459] should_fail_alloc_page+0x50/0x60 [ 1253.492476] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1253.492496] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1253.492512] ? find_held_lock+0x35/0x130 [ 1253.532305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1253.537424] cache_grow_begin+0x9c/0x860 [ 1253.541497] ? kobject_uevent_env+0x2fb/0x1030 [ 1253.546114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1253.551662] kmem_cache_alloc_trace+0x67f/0x760 [ 1253.556352] kobject_uevent_env+0x2fb/0x1030 [ 1253.560813] kobject_uevent+0x20/0x26 [ 1253.564638] lo_ioctl+0x100b/0x20d0 [ 1253.568276] ? lo_rw_aio+0x1530/0x1530 [ 1253.572182] blkdev_ioctl+0xee8/0x1c40 [ 1253.576101] ? __lock_acquire+0x548/0x3fb0 [ 1253.580369] ? blkpg_ioctl+0xa90/0xa90 [ 1253.584261] ? find_held_lock+0x35/0x130 [ 1253.588342] ? ___might_sleep+0x163/0x280 [ 1253.592510] block_ioctl+0xee/0x130 [ 1253.596141] ? blkdev_fallocate+0x410/0x410 [ 1253.600474] do_vfs_ioctl+0xd6e/0x1390 14:29:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7a01, [{0xc0010015}]}) [ 1253.604373] ? selinux_file_ioctl+0x46f/0x5e0 [ 1253.608878] ? selinux_file_ioctl+0x125/0x5e0 [ 1253.613380] ? ioctl_preallocate+0x210/0x210 [ 1253.617792] ? selinux_file_mprotect+0x620/0x620 [ 1253.622561] ? ksys_dup3+0x3e0/0x3e0 [ 1253.626288] ? do_sys_open+0x31d/0x5d0 [ 1253.630193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.635734] ? security_file_ioctl+0x93/0xc0 [ 1253.640166] ksys_ioctl+0xab/0xd0 [ 1253.643631] __x64_sys_ioctl+0x73/0xb0 [ 1253.647537] do_syscall_64+0x103/0x610 [ 1253.651437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1253.656643] RIP: 0033:0x457d97 [ 1253.659872] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1253.678807] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1253.686525] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1253.693798] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1253.701085] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1253.708364] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1253.715659] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1253.754175] hfsplus: unable to find HFS+ superblock [ 1253.768309] protocol 88fb is buggy, dev hsr_slave_0 [ 1253.768343] protocol 88fb is buggy, dev hsr_slave_1 [ 1253.773364] protocol 88fb is buggy, dev hsr_slave_1 [ 1253.957891] XFS (loop2): Invalid superblock magic number 14:29:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:38 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7b01, [{0xc0010015}]}) 14:29:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x90400, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x1000000) 14:29:38 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1048) 14:29:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1262.709966] FAULT_INJECTION: forcing a failure. [ 1262.709966] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.729360] CPU: 1 PID: 15350 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1262.736343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1262.745713] Call Trace: [ 1262.748370] dump_stack+0x172/0x1f0 [ 1262.752035] should_fail.cold+0xa/0x15 [ 1262.755962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1262.761101] ? ___might_sleep+0x163/0x280 [ 1262.765281] __should_failslab+0x121/0x190 [ 1262.769564] should_failslab+0x9/0x14 [ 1262.773388] kmem_cache_alloc_node+0x264/0x710 [ 1262.777988] ? find_held_lock+0x35/0x130 [ 1262.782087] __alloc_skb+0xd5/0x5e0 [ 1262.785827] ? skb_trim+0x190/0x190 [ 1262.789476] ? kasan_check_read+0x11/0x20 [ 1262.793647] alloc_uevent_skb+0x83/0x1e2 [ 1262.797760] kobject_uevent_env+0xa63/0x1030 [ 1262.802209] kobject_uevent+0x20/0x26 [ 1262.806043] lo_ioctl+0x100b/0x20d0 [ 1262.809710] ? lo_rw_aio+0x1530/0x1530 [ 1262.813626] blkdev_ioctl+0xee8/0x1c40 [ 1262.817538] ? __lock_acquire+0x548/0x3fb0 [ 1262.821848] ? blkpg_ioctl+0xa90/0xa90 [ 1262.825767] ? find_held_lock+0x35/0x130 [ 1262.829875] ? ___might_sleep+0x163/0x280 [ 1262.834050] block_ioctl+0xee/0x130 [ 1262.837709] ? blkdev_fallocate+0x410/0x410 [ 1262.842051] do_vfs_ioctl+0xd6e/0x1390 [ 1262.845974] ? selinux_file_ioctl+0x46f/0x5e0 [ 1262.850483] ? selinux_file_ioctl+0x125/0x5e0 [ 1262.854999] ? ioctl_preallocate+0x210/0x210 [ 1262.859426] ? selinux_file_mprotect+0x620/0x620 [ 1262.864212] ? ksys_dup3+0x3e0/0x3e0 [ 1262.867954] ? do_sys_open+0x31d/0x5d0 [ 1262.871874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1262.877438] ? security_file_ioctl+0x93/0xc0 [ 1262.881884] ksys_ioctl+0xab/0xd0 [ 1262.885370] __x64_sys_ioctl+0x73/0xb0 [ 1262.889287] do_syscall_64+0x103/0x610 [ 1262.893207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1262.898419] RIP: 0033:0x457d97 [ 1262.901639] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1262.920596] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1262.928344] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1262.935629] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1262.942912] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1262.950211] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1262.957515] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1262.989185] hfsplus: unable to find HFS+ superblock [ 1263.027994] XFS (loop2): Invalid superblock magic number 14:29:38 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7f04, [{0xc0010015}]}) [ 1263.179542] FAULT_INJECTION: forcing a failure. [ 1263.179542] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.200957] CPU: 0 PID: 15374 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1263.207937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.217377] Call Trace: [ 1263.219975] dump_stack+0x172/0x1f0 [ 1263.223618] should_fail.cold+0xa/0x15 [ 1263.227523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1263.232666] ? ___might_sleep+0x163/0x280 [ 1263.236826] __should_failslab+0x121/0x190 [ 1263.241095] should_failslab+0x9/0x14 [ 1263.244904] kmem_cache_alloc_node+0x264/0x710 [ 1263.249495] ? find_held_lock+0x35/0x130 [ 1263.253586] __alloc_skb+0xd5/0x5e0 [ 1263.257227] ? skb_trim+0x190/0x190 [ 1263.260865] ? kasan_check_read+0x11/0x20 [ 1263.265032] alloc_uevent_skb+0x83/0x1e2 [ 1263.269129] kobject_uevent_env+0xa63/0x1030 [ 1263.273554] kobject_uevent+0x20/0x26 [ 1263.277360] lo_ioctl+0x100b/0x20d0 [ 1263.281007] ? lo_rw_aio+0x1530/0x1530 [ 1263.284912] blkdev_ioctl+0xee8/0x1c40 [ 1263.288816] ? __lock_acquire+0x548/0x3fb0 [ 1263.293086] ? blkpg_ioctl+0xa90/0xa90 [ 1263.296986] ? find_held_lock+0x35/0x130 [ 1263.301103] ? ___might_sleep+0x163/0x280 [ 1263.305289] block_ioctl+0xee/0x130 [ 1263.308924] ? blkdev_fallocate+0x410/0x410 [ 1263.313744] do_vfs_ioctl+0xd6e/0x1390 [ 1263.317642] ? selinux_file_ioctl+0x46f/0x5e0 [ 1263.322160] ? selinux_file_ioctl+0x125/0x5e0 [ 1263.326663] ? ioctl_preallocate+0x210/0x210 [ 1263.331145] ? selinux_file_mprotect+0x620/0x620 [ 1263.335925] ? ksys_dup3+0x3e0/0x3e0 [ 1263.339660] ? do_sys_open+0x31d/0x5d0 [ 1263.343557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1263.349134] ? security_file_ioctl+0x93/0xc0 [ 1263.353557] ksys_ioctl+0xab/0xd0 [ 1263.357024] __x64_sys_ioctl+0x73/0xb0 [ 1263.360949] do_syscall_64+0x103/0x610 [ 1263.364850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1263.370055] RIP: 0033:0x457d97 [ 1263.373285] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1263.392219] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1263.399944] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1263.407216] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1263.414485] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1263.422129] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1263.429403] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1263.458948] hfsplus: unable to find HFS+ superblock 14:29:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8004, [{0xc0010015}]}) 14:29:38 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1263.637194] FAULT_INJECTION: forcing a failure. [ 1263.637194] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.656731] CPU: 1 PID: 15387 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1263.663686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.673050] Call Trace: [ 1263.673086] dump_stack+0x172/0x1f0 [ 1263.673113] should_fail.cold+0xa/0x15 [ 1263.673136] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1263.673160] ? ___might_sleep+0x163/0x280 [ 1263.673181] __should_failslab+0x121/0x190 [ 1263.673208] should_failslab+0x9/0x14 [ 1263.683302] kmem_cache_alloc+0x2b2/0x6f0 [ 1263.692553] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1263.709848] ? lock_downgrade+0x880/0x880 [ 1263.714018] skb_clone+0x150/0x3b0 [ 1263.717587] netlink_broadcast_filtered+0x870/0xb20 [ 1263.722635] netlink_broadcast+0x3a/0x50 [ 1263.726719] kobject_uevent_env+0xa94/0x1030 [ 1263.731156] kobject_uevent+0x20/0x26 [ 1263.735007] lo_ioctl+0x100b/0x20d0 [ 1263.738669] ? lo_rw_aio+0x1530/0x1530 [ 1263.742586] blkdev_ioctl+0xee8/0x1c40 [ 1263.746502] ? __lock_acquire+0x548/0x3fb0 [ 1263.750757] ? blkpg_ioctl+0xa90/0xa90 [ 1263.754663] ? find_held_lock+0x35/0x130 [ 1263.758759] ? ___might_sleep+0x163/0x280 [ 1263.762936] block_ioctl+0xee/0x130 [ 1263.766576] ? blkdev_fallocate+0x410/0x410 [ 1263.770927] do_vfs_ioctl+0xd6e/0x1390 [ 1263.774836] ? selinux_file_ioctl+0x46f/0x5e0 [ 1263.779346] ? selinux_file_ioctl+0x125/0x5e0 [ 1263.783859] ? ioctl_preallocate+0x210/0x210 [ 1263.788286] ? selinux_file_mprotect+0x620/0x620 [ 1263.793077] ? ksys_dup3+0x3e0/0x3e0 [ 1263.796813] ? do_sys_open+0x31d/0x5d0 [ 1263.800727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1263.806287] ? security_file_ioctl+0x93/0xc0 [ 1263.810730] ksys_ioctl+0xab/0xd0 [ 1263.814239] __x64_sys_ioctl+0x73/0xb0 [ 1263.818183] do_syscall_64+0x103/0x610 [ 1263.822149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1263.827352] RIP: 0033:0x457d97 [ 1263.830560] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1263.849485] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1263.857210] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457d97 [ 1263.864496] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1263.871780] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1263.879061] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1263.886353] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1263.904880] hfsplus: unable to find HFS+ superblock 14:29:39 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8005, [{0xc0010015}]}) [ 1264.165756] FAULT_INJECTION: forcing a failure. [ 1264.165756] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.184089] CPU: 1 PID: 15393 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1264.191040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1264.200419] Call Trace: [ 1264.203030] dump_stack+0x172/0x1f0 [ 1264.206697] should_fail.cold+0xa/0x15 [ 1264.210616] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1264.215745] ? ___might_sleep+0x163/0x280 [ 1264.219919] __should_failslab+0x121/0x190 [ 1264.224185] should_failslab+0x9/0x14 [ 1264.228006] kmem_cache_alloc+0x2b2/0x6f0 [ 1264.232182] getname_flags+0xd6/0x5b0 [ 1264.236002] do_mkdirat+0xa0/0x2a0 [ 1264.239570] ? __ia32_sys_mknod+0xb0/0xb0 [ 1264.243750] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1264.248523] ? do_syscall_64+0x26/0x610 [ 1264.252514] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.257903] ? do_syscall_64+0x26/0x610 [ 1264.261898] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1264.266504] __x64_sys_mkdir+0x5c/0x80 [ 1264.270411] do_syscall_64+0x103/0x610 [ 1264.274326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.279533] RIP: 0033:0x457347 [ 1264.282751] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1264.301665] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1264.309386] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1264.316670] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1264.323963] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1264.331252] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1264.338532] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:29:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() ioprio_get$pid(0x3, r0) 14:29:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8501, [{0xc0010015}]}) 14:29:48 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:48 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x104c) 14:29:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1273.598895] FAULT_INJECTION: forcing a failure. [ 1273.598895] name failslab, interval 1, probability 0, space 0, times 0 [ 1273.637939] CPU: 0 PID: 15401 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1273.644916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.654276] Call Trace: [ 1273.656877] dump_stack+0x172/0x1f0 [ 1273.660524] should_fail.cold+0xa/0x15 [ 1273.664436] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1273.669557] ? ___might_sleep+0x163/0x280 [ 1273.673727] __should_failslab+0x121/0x190 [ 1273.678003] should_failslab+0x9/0x14 [ 1273.681863] kmem_cache_alloc+0x2b2/0x6f0 [ 1273.686038] getname_flags+0xd6/0x5b0 [ 1273.689852] do_mkdirat+0xa0/0x2a0 [ 1273.693407] ? __ia32_sys_mknod+0xb0/0xb0 [ 1273.697570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1273.702336] ? do_syscall_64+0x26/0x610 [ 1273.706321] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1273.711692] ? do_syscall_64+0x26/0x610 [ 1273.715704] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1273.720298] __x64_sys_mkdir+0x5c/0x80 [ 1273.724203] do_syscall_64+0x103/0x610 [ 1273.728109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1273.733305] RIP: 0033:0x457347 14:29:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8601, [{0xc0010015}]}) [ 1273.736510] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1273.755428] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1273.763147] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1273.770420] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1273.777695] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1273.784968] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1273.792242] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:29:49 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1273.881218] XFS (loop2): Invalid superblock magic number [ 1273.972136] FAULT_INJECTION: forcing a failure. [ 1273.972136] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1273.983973] CPU: 0 PID: 15429 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1273.990903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.000257] Call Trace: [ 1274.002862] dump_stack+0x172/0x1f0 [ 1274.006513] should_fail.cold+0xa/0x15 [ 1274.010420] ? lo_ioctl+0x188/0x20d0 [ 1274.014147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1274.019262] ? __lock_acquire+0x548/0x3fb0 [ 1274.023514] should_fail_alloc_page+0x50/0x60 [ 1274.028023] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1274.032709] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1274.037759] ? find_held_lock+0x35/0x130 [ 1274.041838] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1274.046960] cache_grow_begin+0x9c/0x860 [ 1274.051037] ? getname_flags+0xd6/0x5b0 [ 1274.055020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1274.060583] kmem_cache_alloc+0x62d/0x6f0 [ 1274.064755] getname_flags+0xd6/0x5b0 [ 1274.068569] do_mkdirat+0xa0/0x2a0 [ 1274.072125] ? __ia32_sys_mknod+0xb0/0xb0 [ 1274.076287] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1274.081053] ? do_syscall_64+0x26/0x610 [ 1274.085046] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.090425] ? do_syscall_64+0x26/0x610 [ 1274.094411] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1274.099045] __x64_sys_mkdir+0x5c/0x80 [ 1274.102974] do_syscall_64+0x103/0x610 [ 1274.106876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.112072] RIP: 0033:0x457347 [ 1274.115281] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1274.134191] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1274.141899] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1274.149190] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1274.156463] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1274.163748] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1274.171022] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:29:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8701, [{0xc0010015}]}) [ 1274.395088] hfsplus: unable to find HFS+ superblock 14:29:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8705, [{0xc0010015}]}) 14:29:49 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1000002, 0x0) [ 1274.616489] FAULT_INJECTION: forcing a failure. [ 1274.616489] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1274.628381] CPU: 1 PID: 15445 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1274.635315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.644679] Call Trace: [ 1274.647301] dump_stack+0x172/0x1f0 [ 1274.650971] should_fail.cold+0xa/0x15 [ 1274.654876] ? lo_ioctl+0x188/0x20d0 [ 1274.658623] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1274.658658] ? __lock_acquire+0x548/0x3fb0 [ 1274.658686] should_fail_alloc_page+0x50/0x60 [ 1274.658705] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1274.677235] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1274.677250] ? find_held_lock+0x35/0x130 [ 1274.677273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1274.691455] cache_grow_begin+0x9c/0x860 [ 1274.695560] ? getname_flags+0xd6/0x5b0 [ 1274.699570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1274.705138] kmem_cache_alloc+0x62d/0x6f0 [ 1274.709315] getname_flags+0xd6/0x5b0 [ 1274.713142] do_mkdirat+0xa0/0x2a0 [ 1274.716703] ? __ia32_sys_mknod+0xb0/0xb0 [ 1274.720877] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1274.725652] ? do_syscall_64+0x26/0x610 [ 1274.729651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.735042] ? do_syscall_64+0x26/0x610 [ 1274.739056] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1274.743679] __x64_sys_mkdir+0x5c/0x80 [ 1274.747596] do_syscall_64+0x103/0x610 [ 1274.751509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.756713] RIP: 0033:0x457347 [ 1274.759949] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1274.778888] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1274.786612] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1274.793893] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1274.801177] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1274.808461] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1274.815759] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1274.840650] hfsplus: unable to find HFS+ superblock [ 1274.847475] XFS (loop2): Invalid superblock magic number 14:29:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:29:59 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1068) 14:29:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8b00, [{0xc0010015}]}) 14:29:59 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:59 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x731000, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x60000, 0x1) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:29:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1283.838962] FAULT_INJECTION: forcing a failure. [ 1283.838962] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.880745] CPU: 0 PID: 15467 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1283.887717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.897072] Call Trace: [ 1283.899699] dump_stack+0x172/0x1f0 [ 1283.903344] should_fail.cold+0xa/0x15 [ 1283.907255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1283.912368] ? ___might_sleep+0x163/0x280 [ 1283.916537] __should_failslab+0x121/0x190 [ 1283.920776] ? ratelimit_state_init+0xb0/0xb0 [ 1283.925284] should_failslab+0x9/0x14 [ 1283.929117] kmem_cache_alloc+0x2b2/0x6f0 [ 1283.933273] ? ratelimit_state_init+0xb0/0xb0 [ 1283.937773] ext4_alloc_inode+0x1f/0x640 [ 1283.941839] ? ratelimit_state_init+0xb0/0xb0 [ 1283.946350] alloc_inode+0x66/0x190 [ 1283.949979] new_inode_pseudo+0x19/0xf0 [ 1283.953975] new_inode+0x1f/0x40 [ 1283.957345] __ext4_new_inode+0x3cb/0x5290 [ 1283.961584] ? kasan_check_read+0x11/0x20 [ 1283.965760] ? ext4_free_inode+0x1450/0x1450 [ 1283.970179] ? dqget+0x10d0/0x10d0 [ 1283.973729] ? selinux_determine_inode_label+0x1b1/0x360 [ 1283.979221] ext4_mkdir+0x3d5/0xdf0 [ 1283.982883] ? ext4_init_dot_dotdot+0x520/0x520 [ 1283.987568] ? selinux_inode_mkdir+0x23/0x30 [ 1283.991983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.997525] ? security_inode_mkdir+0xee/0x120 [ 1284.002119] vfs_mkdir+0x433/0x690 [ 1284.005671] do_mkdirat+0x234/0x2a0 [ 1284.009301] ? __ia32_sys_mknod+0xb0/0xb0 [ 1284.013464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1284.018236] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.023640] ? do_syscall_64+0x26/0x610 [ 1284.027621] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1284.032205] __x64_sys_mkdir+0x5c/0x80 [ 1284.036111] do_syscall_64+0x103/0x610 [ 1284.040009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.045199] RIP: 0033:0x457347 [ 1284.048395] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1284.067293] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1284.075000] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1284.082275] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1284.089542] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1284.096806] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1284.104075] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1284.189588] XFS (loop2): Invalid superblock magic number 14:29:59 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1284.535793] FAULT_INJECTION: forcing a failure. [ 1284.535793] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.547510] CPU: 0 PID: 15592 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1284.554449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.563804] Call Trace: [ 1284.566404] dump_stack+0x172/0x1f0 [ 1284.570065] should_fail.cold+0xa/0x15 [ 1284.573976] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1284.579099] ? __lock_acquire+0x548/0x3fb0 [ 1284.583349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1284.588899] __should_failslab+0x121/0x190 [ 1284.593147] should_failslab+0x9/0x14 [ 1284.596959] __kmalloc+0x71/0x740 [ 1284.600430] ? context_struct_to_string+0x428/0x880 [ 1284.605458] context_struct_to_string+0x428/0x880 [ 1284.610318] ? dump_masked_av_helper+0xa0/0xa0 [ 1284.614910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1284.620455] ? sidtab_search_core+0x164/0x210 [ 1284.624977] security_sid_to_context_core.isra.0+0x244/0x320 [ 1284.630801] security_sid_to_context_force+0x38/0x50 [ 1284.635943] selinux_inode_init_security+0x3b6/0x7a0 [ 1284.641089] ? selinux_inode_create+0x30/0x30 [ 1284.645615] ? lock_downgrade+0x880/0x880 [ 1284.649775] ? kasan_check_read+0x11/0x20 [ 1284.653940] security_inode_init_security+0x1b3/0x3c0 [ 1284.659153] ? ext4_init_acl+0x290/0x290 [ 1284.663223] ? security_kernel_load_data+0xb0/0xb0 [ 1284.668163] ? posix_acl_create+0x11a/0x430 [ 1284.672490] ? lock_downgrade+0x880/0x880 [ 1284.676676] ? ext4_set_acl+0x4f0/0x4f0 [ 1284.680685] ? _raw_spin_unlock+0x2d/0x50 [ 1284.684854] ext4_init_security+0x34/0x40 [ 1284.689018] __ext4_new_inode+0x3b34/0x5290 [ 1284.693363] ? ext4_free_inode+0x1450/0x1450 [ 1284.697790] ? dqget+0x10d0/0x10d0 [ 1284.701360] ? selinux_determine_inode_label+0x1b1/0x360 [ 1284.706828] ext4_mkdir+0x3d5/0xdf0 [ 1284.710481] ? ext4_init_dot_dotdot+0x520/0x520 [ 1284.715171] ? selinux_inode_mkdir+0x23/0x30 [ 1284.719590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1284.725162] ? security_inode_mkdir+0xee/0x120 [ 1284.729785] vfs_mkdir+0x433/0x690 [ 1284.733335] do_mkdirat+0x234/0x2a0 [ 1284.736981] ? __ia32_sys_mknod+0xb0/0xb0 [ 1284.741143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1284.745907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.751274] ? do_syscall_64+0x26/0x610 [ 1284.755260] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1284.759853] __x64_sys_mkdir+0x5c/0x80 [ 1284.763763] do_syscall_64+0x103/0x610 [ 1284.767666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.772861] RIP: 0033:0x457347 [ 1284.776064] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1284.794974] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1284.802688] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1284.809969] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1284.817242] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1284.824517] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:30:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x900d, [{0xc0010015}]}) [ 1284.831821] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:00 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x9104, [{0xc0010015}]}) 14:30:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/217) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000000)) 14:30:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x9e00, [{0xc0010015}]}) [ 1285.054284] FAULT_INJECTION: forcing a failure. [ 1285.054284] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.082982] CPU: 1 PID: 15602 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1285.090001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.090008] Call Trace: [ 1285.090033] dump_stack+0x172/0x1f0 [ 1285.090058] should_fail.cold+0xa/0x15 [ 1285.090098] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1285.090122] ? ___might_sleep+0x163/0x280 [ 1285.090144] __should_failslab+0x121/0x190 [ 1285.090165] should_failslab+0x9/0x14 [ 1285.090187] kmem_cache_alloc+0x2b2/0x6f0 [ 1285.118925] ? map_id_range_down+0x1ee/0x370 [ 1285.118943] ? __put_user_ns+0x70/0x70 [ 1285.118967] selinux_inode_alloc_security+0xb6/0x2a0 [ 1285.118987] security_inode_alloc+0x90/0xe0 [ 1285.119005] inode_init_always+0x56e/0xb50 [ 1285.119020] alloc_inode+0x83/0x190 [ 1285.156805] new_inode_pseudo+0x19/0xf0 [ 1285.160802] new_inode+0x1f/0x40 [ 1285.164190] __ext4_new_inode+0x3cb/0x5290 [ 1285.168467] ? kasan_check_read+0x11/0x20 [ 1285.172650] ? ext4_free_inode+0x1450/0x1450 [ 1285.177099] ? dqget+0x10d0/0x10d0 [ 1285.180671] ? selinux_determine_inode_label+0x1b1/0x360 [ 1285.186156] ext4_mkdir+0x3d5/0xdf0 [ 1285.189825] ? ext4_init_dot_dotdot+0x520/0x520 [ 1285.194519] ? selinux_inode_mkdir+0x23/0x30 [ 1285.198950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1285.204518] ? security_inode_mkdir+0xee/0x120 [ 1285.209135] vfs_mkdir+0x433/0x690 [ 1285.212714] do_mkdirat+0x234/0x2a0 [ 1285.216361] ? __ia32_sys_mknod+0xb0/0xb0 [ 1285.220534] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1285.225321] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.230702] ? do_syscall_64+0x26/0x610 [ 1285.234699] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1285.239310] __x64_sys_mkdir+0x5c/0x80 [ 1285.243223] do_syscall_64+0x103/0x610 [ 1285.247335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.252545] RIP: 0033:0x457347 [ 1285.255771] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1285.274692] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1285.282442] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1285.289728] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1285.297011] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1285.304293] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1285.311746] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1285.398826] XFS (loop2): Invalid superblock magic number 14:30:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:30:10 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xa001, [{0xc0010015}]}) 14:30:10 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) ptrace$setregset(0x4205, r0, 0x200, &(0x7f0000000100)={&(0x7f00000000c0)="1041", 0x2}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x70c, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x55) 14:30:10 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x106c) 14:30:10 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1294.733508] FAULT_INJECTION: forcing a failure. [ 1294.733508] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.744940] CPU: 0 PID: 15640 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1294.751901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.761251] Call Trace: [ 1294.763852] dump_stack+0x172/0x1f0 [ 1294.767489] should_fail.cold+0xa/0x15 [ 1294.771383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1294.776513] ? __lock_acquire+0x548/0x3fb0 [ 1294.780781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.786325] __should_failslab+0x121/0x190 [ 1294.790569] should_failslab+0x9/0x14 [ 1294.794389] __kmalloc+0x71/0x740 [ 1294.797859] ? context_struct_to_string+0x428/0x880 [ 1294.802891] context_struct_to_string+0x428/0x880 [ 1294.807752] ? dump_masked_av_helper+0xa0/0xa0 [ 1294.812339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.817877] ? sidtab_search_core+0x164/0x210 [ 1294.822380] security_sid_to_context_core.isra.0+0x244/0x320 [ 1294.828186] security_sid_to_context_force+0x38/0x50 [ 1294.833294] selinux_inode_init_security+0x3b6/0x7a0 [ 1294.838416] ? selinux_inode_create+0x30/0x30 [ 1294.842912] ? lock_downgrade+0x880/0x880 [ 1294.847066] ? kasan_check_read+0x11/0x20 [ 1294.851242] security_inode_init_security+0x1b3/0x3c0 [ 1294.856434] ? ext4_init_acl+0x290/0x290 [ 1294.860499] ? security_kernel_load_data+0xb0/0xb0 [ 1294.865428] ? posix_acl_create+0x11a/0x430 [ 1294.869748] ? lock_downgrade+0x880/0x880 [ 1294.873908] ? ext4_set_acl+0x4f0/0x4f0 [ 1294.877895] ? _raw_spin_unlock+0x2d/0x50 [ 1294.882061] ext4_init_security+0x34/0x40 [ 1294.886245] __ext4_new_inode+0x3b34/0x5290 [ 1294.890587] ? ext4_free_inode+0x1450/0x1450 [ 1294.895016] ? dqget+0x10d0/0x10d0 [ 1294.898578] ? selinux_determine_inode_label+0x1b1/0x360 [ 1294.904048] ext4_mkdir+0x3d5/0xdf0 [ 1294.907695] ? ext4_init_dot_dotdot+0x520/0x520 [ 1294.912375] ? selinux_inode_mkdir+0x23/0x30 [ 1294.916787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.922325] ? security_inode_mkdir+0xee/0x120 [ 1294.926906] vfs_mkdir+0x433/0x690 [ 1294.930451] do_mkdirat+0x234/0x2a0 [ 1294.934117] ? __ia32_sys_mknod+0xb0/0xb0 [ 1294.938269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1294.943040] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.948408] ? do_syscall_64+0x26/0x610 [ 1294.952384] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1294.956968] __x64_sys_mkdir+0x5c/0x80 [ 1294.960878] do_syscall_64+0x103/0x610 [ 1294.964775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.969974] RIP: 0033:0x457347 [ 1294.973167] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1294.992068] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1294.999818] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1295.007094] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1295.014375] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1295.021639] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1295.028906] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1295.103459] XFS (loop2): Invalid superblock magic number 14:30:10 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1295.245974] FAULT_INJECTION: forcing a failure. [ 1295.245974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1295.257825] CPU: 1 PID: 15659 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1295.257836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.257842] Call Trace: [ 1295.257868] dump_stack+0x172/0x1f0 [ 1295.257906] should_fail.cold+0xa/0x15 [ 1295.257928] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1295.257958] ? __lock_acquire+0x548/0x3fb0 [ 1295.257976] ? save_stack+0x45/0xd0 [ 1295.257993] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1295.258008] ? kasan_slab_alloc+0xf/0x20 [ 1295.258049] ? kmem_cache_alloc+0x11a/0x6f0 [ 1295.258084] ? ext4_alloc_inode+0x1f/0x640 [ 1295.258104] ? alloc_inode+0x66/0x190 [ 1295.319215] should_fail_alloc_page+0x50/0x60 [ 1295.323761] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1295.328454] ? __debug_object_init+0x190/0xc30 [ 1295.333057] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1295.338093] ? __debug_object_init+0x190/0xc30 [ 1295.342714] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1295.347844] cache_grow_begin+0x9c/0x860 [ 1295.351924] ? selinux_inode_alloc_security+0xb6/0x2a0 [ 1295.351943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1295.351962] kmem_cache_alloc+0x62d/0x6f0 [ 1295.351991] ? map_id_range_down+0x1ee/0x370 [ 1295.371360] selinux_inode_alloc_security+0xb6/0x2a0 [ 1295.376485] security_inode_alloc+0x90/0xe0 [ 1295.380824] inode_init_always+0x56e/0xb50 [ 1295.385087] alloc_inode+0x83/0x190 [ 1295.388755] new_inode_pseudo+0x19/0xf0 [ 1295.392743] new_inode+0x1f/0x40 [ 1295.396131] __ext4_new_inode+0x3cb/0x5290 [ 1295.400393] ? kasan_check_read+0x11/0x20 [ 1295.404595] ? ext4_free_inode+0x1450/0x1450 [ 1295.409020] ? dqget+0x10d0/0x10d0 [ 1295.412586] ? selinux_determine_inode_label+0x1b1/0x360 [ 1295.418534] ext4_mkdir+0x3d5/0xdf0 [ 1295.422407] ? ext4_init_dot_dotdot+0x520/0x520 [ 1295.427129] ? selinux_inode_mkdir+0x23/0x30 [ 1295.431555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.437129] ? security_inode_mkdir+0xee/0x120 [ 1295.441739] vfs_mkdir+0x433/0x690 [ 1295.445293] do_mkdirat+0x234/0x2a0 [ 1295.448945] ? __ia32_sys_mknod+0xb0/0xb0 [ 1295.453116] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1295.458412] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.463785] ? do_syscall_64+0x26/0x610 [ 1295.467769] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1295.472362] __x64_sys_mkdir+0x5c/0x80 [ 1295.476350] do_syscall_64+0x103/0x610 [ 1295.480257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.485455] RIP: 0033:0x457347 [ 1295.488675] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.507603] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1295.515339] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1295.522620] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1295.529899] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1295.537175] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1295.544450] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1295.564000] hfsplus: unable to find HFS+ superblock 14:30:11 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xa00d, [{0xc0010015}]}) [ 1295.686392] FAULT_INJECTION: forcing a failure. [ 1295.686392] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.698754] CPU: 0 PID: 15663 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1295.705697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.715050] Call Trace: [ 1295.717654] dump_stack+0x172/0x1f0 [ 1295.721320] should_fail.cold+0xa/0x15 [ 1295.725225] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1295.730354] ? ___might_sleep+0x163/0x280 [ 1295.734515] __should_failslab+0x121/0x190 [ 1295.738766] should_failslab+0x9/0x14 [ 1295.742579] __kmalloc+0x2dc/0x740 [ 1295.746133] ? mark_held_locks+0xa4/0xf0 [ 1295.750286] ? kfree+0x173/0x230 [ 1295.753671] ? ext4_find_extent+0x76e/0x9d0 [ 1295.758000] ext4_find_extent+0x76e/0x9d0 [ 1295.762167] ext4_ext_map_blocks+0x1cc/0x4e50 [ 1295.766684] ? ext4_ext_release+0x10/0x10 [ 1295.770844] ? find_held_lock+0x35/0x130 [ 1295.774922] ? lock_acquire+0x16f/0x3f0 [ 1295.778904] ? ext4_map_blocks+0x884/0x1a20 [ 1295.783243] ext4_map_blocks+0x8ec/0x1a20 [ 1295.787412] ? ext4_issue_zeroout+0x170/0x170 [ 1295.791921] ? kasan_check_write+0x14/0x20 [ 1295.796167] ? __brelse+0x95/0xb0 [ 1295.799635] ext4_getblk+0xc4/0x510 [ 1295.803431] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1295.807768] ? ext4_free_inode+0x1450/0x1450 [ 1295.812196] ext4_bread+0x8f/0x230 [ 1295.815746] ? ext4_getblk+0x510/0x510 [ 1295.819655] ext4_append+0x155/0x370 [ 1295.823383] ext4_mkdir+0x61b/0xdf0 [ 1295.827044] ? ext4_init_dot_dotdot+0x520/0x520 [ 1295.831728] ? selinux_inode_mkdir+0x23/0x30 [ 1295.836150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.841709] ? security_inode_mkdir+0xee/0x120 [ 1295.846313] vfs_mkdir+0x433/0x690 [ 1295.849868] do_mkdirat+0x234/0x2a0 [ 1295.853505] ? __ia32_sys_mknod+0xb0/0xb0 [ 1295.857663] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1295.862432] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.867806] ? do_syscall_64+0x26/0x610 [ 1295.871794] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1295.876398] __x64_sys_mkdir+0x5c/0x80 [ 1295.880299] do_syscall_64+0x103/0x610 [ 1295.884204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.889401] RIP: 0033:0x457347 [ 1295.892618] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.911524] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1295.919258] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1295.926546] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 14:30:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc000, [{0xc0010015}]}) [ 1295.933834] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1295.941109] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1295.948384] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x1000045, 0x0) 14:30:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc100, [{0xc0010015}]}) 14:30:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:30:20 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x210800, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') getpeername$tipc(r0, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xffffffffffffffdf, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x300, 0x70bd2b, 0x25dfdbfe}, 0xfffffffffffffe98}, 0x1, 0x0, 0x0, 0x4000}, 0x40) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@md5={0x1, "a527c934304b1ee9ed3addcc4b00bb7a"}, 0x11, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) fcntl$setown(r0, 0x8, r2) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc200, [{0xc0010015}]}) 14:30:20 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1074) 14:30:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1305.614466] FAULT_INJECTION: forcing a failure. [ 1305.614466] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.626401] CPU: 0 PID: 15691 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1305.633345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.642698] Call Trace: [ 1305.645360] dump_stack+0x172/0x1f0 [ 1305.649018] should_fail.cold+0xa/0x15 [ 1305.649038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1305.649058] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1305.649094] __should_failslab+0x121/0x190 [ 1305.658094] should_failslab+0x9/0x14 [ 1305.658113] kmem_cache_alloc+0x47/0x6f0 [ 1305.667281] ? ext4_es_scan+0x6f0/0x6f0 [ 1305.675164] ? do_raw_write_lock+0x124/0x290 [ 1305.675185] __es_insert_extent+0x2cc/0xf20 [ 1305.675208] ext4_es_insert_extent+0x2b7/0xa40 [ 1305.683579] ? ext4_es_scan_clu+0x50/0x50 [ 1305.683600] ? rcu_read_lock_sched_held+0x110/0x130 [ 1305.683615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1305.683640] ? ext4_es_find_extent_range+0xff/0x600 [ 1305.683660] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1305.701705] ? ext4_rereserve_cluster+0x240/0x240 [ 1305.701721] ? ext4_find_extent+0x76e/0x9d0 [ 1305.701740] ? ext4_find_extent+0x6a6/0x9d0 [ 1305.701762] ext4_ext_map_blocks+0x216a/0x4e50 [ 1305.712314] ? ext4_ext_release+0x10/0x10 [ 1305.712344] ? lock_acquire+0x16f/0x3f0 [ 1305.712363] ? ext4_map_blocks+0x424/0x1a20 [ 1305.735301] ext4_map_blocks+0xecb/0x1a20 [ 1305.743423] ? ext4_issue_zeroout+0x170/0x170 [ 1305.743449] ? kasan_check_write+0x14/0x20 [ 1305.743468] ? __brelse+0x95/0xb0 [ 1305.756411] ext4_getblk+0xc4/0x510 [ 1305.756430] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1305.756453] ? ext4_free_inode+0x1450/0x1450 [ 1305.756472] ext4_bread+0x8f/0x230 [ 1305.756487] ? ext4_getblk+0x510/0x510 [ 1305.783917] ext4_append+0x155/0x370 [ 1305.787638] ext4_mkdir+0x61b/0xdf0 [ 1305.791308] ? ext4_init_dot_dotdot+0x520/0x520 [ 1305.796000] ? selinux_inode_mkdir+0x23/0x30 [ 1305.800412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1305.805953] ? security_inode_mkdir+0xee/0x120 [ 1305.810544] vfs_mkdir+0x433/0x690 [ 1305.814121] do_mkdirat+0x234/0x2a0 [ 1305.817789] ? __ia32_sys_mknod+0xb0/0xb0 [ 1305.821943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1305.826709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.832102] ? do_syscall_64+0x26/0x610 [ 1305.836098] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1305.840693] __x64_sys_mkdir+0x5c/0x80 [ 1305.844579] do_syscall_64+0x103/0x610 [ 1305.848489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.853687] RIP: 0033:0x457347 [ 1305.856876] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1305.875793] RSP: 002b:00007fa366e39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1305.883511] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457347 [ 1305.890800] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1305.898085] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1305.905354] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1305.912617] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1305.987104] hfsplus: unable to find HFS+ superblock [ 1305.999180] XFS (loop2): Invalid superblock magic number 14:30:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xce00, [{0xc0010015}]}) 14:30:21 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1306.128780] FAULT_INJECTION: forcing a failure. [ 1306.128780] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.140051] CPU: 1 PID: 15722 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1306.140165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.140174] Call Trace: [ 1306.159069] dump_stack+0x172/0x1f0 [ 1306.159093] should_fail.cold+0xa/0x15 [ 1306.159113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1306.159129] ? __sigqueue_alloc+0x173/0x4d0 [ 1306.159145] ? find_held_lock+0x35/0x130 [ 1306.159169] __should_failslab+0x121/0x190 [ 1306.159190] should_failslab+0x9/0x14 [ 1306.159208] kmem_cache_alloc+0x47/0x6f0 [ 1306.176168] ? kasan_check_read+0x11/0x20 [ 1306.176191] __sigqueue_alloc+0x268/0x4d0 [ 1306.176210] __send_signal+0xda3/0x1590 [ 1306.176230] send_signal+0x49/0xd0 [ 1306.196559] force_sig_info+0x251/0x310 [ 1306.196593] force_sig_fault+0xbb/0xf0 [ 1306.196611] ? force_sigsegv+0x120/0x120 [ 1306.220220] ? trace_hardirqs_on+0x67/0x230 [ 1306.224571] __bad_area_nosemaphore+0x332/0x420 [ 1306.229269] bad_area+0x69/0x80 [ 1306.232569] __do_page_fault+0x971/0xd60 [ 1306.236667] do_page_fault+0x71/0x581 [ 1306.240536] ? page_fault+0x8/0x30 [ 1306.244108] page_fault+0x1e/0x30 [ 1306.247656] RIP: 0033:0x451bdf [ 1306.250857] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1306.269773] RSP: 002b:00007fa366e39a88 EFLAGS: 00010283 [ 1306.275142] RAX: 00007fa366e39b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 1306.282420] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fa366e39b30 [ 1306.289696] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 1306.296978] R10: 0000000000000075 R11: 00000000004e1160 R12: 0000000000000004 [ 1306.304261] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1306.325208] hfsplus: unable to find HFS+ superblock 14:30:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xd004, [{0xc0010015}]}) 14:30:21 executing program 0 (fault-call:0 fault-nth:35): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1306.494246] FAULT_INJECTION: forcing a failure. [ 1306.494246] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.505497] CPU: 0 PID: 15729 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1306.512429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.521787] Call Trace: [ 1306.524385] dump_stack+0x172/0x1f0 [ 1306.528041] should_fail.cold+0xa/0x15 [ 1306.531941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1306.537053] ? __sigqueue_alloc+0x173/0x4d0 [ 1306.541432] ? find_held_lock+0x35/0x130 [ 1306.545521] __should_failslab+0x121/0x190 [ 1306.549782] should_failslab+0x9/0x14 [ 1306.553617] kmem_cache_alloc+0x47/0x6f0 [ 1306.557703] ? kasan_check_read+0x11/0x20 [ 1306.561871] __sigqueue_alloc+0x268/0x4d0 [ 1306.566042] __send_signal+0xda3/0x1590 [ 1306.570035] send_signal+0x49/0xd0 [ 1306.573577] force_sig_info+0x251/0x310 [ 1306.577579] force_sig_fault+0xbb/0xf0 [ 1306.581471] ? force_sigsegv+0x120/0x120 [ 1306.585559] ? trace_hardirqs_on+0x67/0x230 [ 1306.589902] __bad_area_nosemaphore+0x332/0x420 [ 1306.594582] bad_area+0x69/0x80 [ 1306.597869] __do_page_fault+0x971/0xd60 [ 1306.601944] do_page_fault+0x71/0x581 [ 1306.605751] ? page_fault+0x8/0x30 [ 1306.609293] page_fault+0x1e/0x30 [ 1306.612741] RIP: 0033:0x451bdf [ 1306.615929] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1306.634830] RSP: 002b:00007fa366e39a88 EFLAGS: 00010283 [ 1306.640190] RAX: 00007fa366e39b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 1306.647460] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fa366e39b30 [ 1306.654730] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 1306.662000] R10: 0000000000000075 R11: 00000000004e1160 R12: 0000000000000004 [ 1306.669270] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000100)={@loopback, 0x0}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', r1}) 14:30:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xd901, [{0xc0010015}]}) [ 1306.877755] hfsplus: unable to find HFS+ superblock [ 1306.923357] XFS (loop2): Invalid superblock magic number 14:30:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:30:31 executing program 0 (fault-call:0 fault-nth:36): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xe006, [{0xc0010015}]}) 14:30:31 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0xff, 0x2000) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000280)={0x23, 0x2, &(0x7f0000000180)="f7fff01519ee96f42c2417ccae7792a8ec159aac6976cdb4658e7c9f3f3826464baad746e021097a89ebbdd093d973ffb20f13a6c8624b385e9c9bce7a4838881079da248c4b5241a575fb568c264d8ae6a7dd3adbda273bb46db29ea77b6ec830b6022f8f99f63815ab01a3e674b9a1ecc795bcee8fe2715da2a701b74dd2120ba2a7b913dcd0c33678e1e5688bd7d62e485cd82e9ebc0422f854924c35c106dd45daa198f8ef7adf95e9329dbef3d882ffddbc6caccf1b7a1030de63bfb6ef073de8215d871fa61c2e197477867d3cc8eff73be75ab15a3f76578aec3f190c40da594b925916c1696a6a11d5e82410", {0x5, 0x80, 0x31735743, 0x0, 0x3ff, 0x20, 0xf, 0x4}}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000000c0)=[0xfffffffffffffffc, 0x401]) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x9) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000002c0)=[@window={0x3, 0x76, 0x3}, @sack_perm, @window={0x3, 0x50, 0x83b1}], 0x2000000000000058) 14:30:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:30:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x107a) [ 1316.490249] FAULT_INJECTION: forcing a failure. [ 1316.490249] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.501498] CPU: 0 PID: 15755 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1316.501510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.501516] Call Trace: [ 1316.501542] dump_stack+0x172/0x1f0 [ 1316.501570] should_fail.cold+0xa/0x15 [ 1316.501594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1316.517894] ? __sigqueue_alloc+0x173/0x4d0 [ 1316.517913] ? find_held_lock+0x35/0x130 [ 1316.517936] __should_failslab+0x121/0x190 [ 1316.517958] should_failslab+0x9/0x14 [ 1316.528047] kmem_cache_alloc+0x47/0x6f0 [ 1316.528085] ? kasan_check_read+0x11/0x20 [ 1316.528106] __sigqueue_alloc+0x268/0x4d0 [ 1316.528124] __send_signal+0xda3/0x1590 [ 1316.537571] send_signal+0x49/0xd0 [ 1316.537589] force_sig_info+0x251/0x310 [ 1316.537612] force_sig_fault+0xbb/0xf0 [ 1316.537628] ? force_sigsegv+0x120/0x120 [ 1316.537655] ? trace_hardirqs_on+0x67/0x230 [ 1316.537677] __bad_area_nosemaphore+0x332/0x420 [ 1316.549763] bad_area+0x69/0x80 [ 1316.549782] __do_page_fault+0x971/0xd60 [ 1316.566130] do_page_fault+0x71/0x581 [ 1316.566150] ? page_fault+0x8/0x30 [ 1316.566168] page_fault+0x1e/0x30 [ 1316.566180] RIP: 0033:0x451bdf [ 1316.566197] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1316.630706] RSP: 002b:00007fa366e39a88 EFLAGS: 00010283 [ 1316.636077] RAX: 00007fa366e39b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 1316.643351] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fa366e39b30 [ 1316.650623] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 1316.657905] R10: 0000000000000075 R11: 00000000004e1160 R12: 0000000000000004 [ 1316.665172] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1316.747319] XFS (loop2): Invalid superblock magic number [ 1316.924300] hfsplus: unable to find HFS+ superblock 14:30:32 executing program 0 (fault-call:0 fault-nth:37): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xff02, [{0xc0010015}]}) [ 1317.065832] FAULT_INJECTION: forcing a failure. [ 1317.065832] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.081557] CPU: 1 PID: 15861 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1317.088541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.088549] Call Trace: [ 1317.088574] dump_stack+0x172/0x1f0 [ 1317.088615] should_fail.cold+0xa/0x15 [ 1317.088638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1317.088664] ? ___might_sleep+0x163/0x280 [ 1317.117372] __should_failslab+0x121/0x190 [ 1317.121623] should_failslab+0x9/0x14 [ 1317.125444] kmem_cache_alloc+0x2b2/0x6f0 [ 1317.129611] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1317.134565] ? find_held_lock+0x35/0x130 [ 1317.138644] getname_flags+0xd6/0x5b0 [ 1317.142460] user_path_at_empty+0x2f/0x50 [ 1317.146622] do_mount+0x15e/0x2d30 [ 1317.150197] ? copy_mount_string+0x40/0x40 [ 1317.154461] ? kmem_cache_alloc_trace+0x354/0x760 [ 1317.159318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1317.164868] ? _copy_from_user+0xdd/0x150 [ 1317.169033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1317.174591] ? copy_mount_options+0x280/0x3a0 [ 1317.179126] ksys_mount+0xdb/0x150 [ 1317.182692] __x64_sys_mount+0xbe/0x150 [ 1317.186683] do_syscall_64+0x103/0x610 [ 1317.190596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.195792] RIP: 0033:0x45a99a [ 1317.199005] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1317.217909] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1317.225628] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1317.232902] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1317.240180] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1317.247467] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1317.254738] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:32 executing program 0 (fault-call:0 fault-nth:38): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xff0b, [{0xc0010015}]}) 14:30:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xb, 0x80a, 0x83, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100)=0x101, 0x4) [ 1317.462506] FAULT_INJECTION: forcing a failure. [ 1317.462506] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.483840] CPU: 0 PID: 15867 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1317.490786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.490794] Call Trace: [ 1317.490818] dump_stack+0x172/0x1f0 [ 1317.490844] should_fail.cold+0xa/0x15 [ 1317.510359] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1317.515477] ? ___might_sleep+0x163/0x280 [ 1317.519637] __should_failslab+0x121/0x190 [ 1317.523881] should_failslab+0x9/0x14 [ 1317.527694] __kmalloc_track_caller+0x2d8/0x740 [ 1317.532375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1317.537944] ? strndup_user+0x77/0xd0 [ 1317.537965] memdup_user+0x26/0xb0 [ 1317.537982] strndup_user+0x77/0xd0 [ 1317.548967] ksys_mount+0x7b/0x150 [ 1317.552530] __x64_sys_mount+0xbe/0x150 [ 1317.556531] do_syscall_64+0x103/0x610 [ 1317.560433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.565624] RIP: 0033:0x45a99a [ 1317.568833] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1317.587737] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1317.595456] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1317.602742] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1317.610013] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1317.617285] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1317.624569] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:33 executing program 0 (fault-call:0 fault-nth:39): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1317.716281] XFS (loop2): Invalid superblock magic number [ 1317.771500] FAULT_INJECTION: forcing a failure. [ 1317.771500] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.828348] CPU: 0 PID: 15883 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1317.835306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.844689] Call Trace: [ 1317.847293] dump_stack+0x172/0x1f0 [ 1317.850939] should_fail.cold+0xa/0x15 [ 1317.854846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1317.859983] ? ___might_sleep+0x163/0x280 [ 1317.864157] __should_failslab+0x121/0x190 [ 1317.868406] should_failslab+0x9/0x14 [ 1317.872217] __kmalloc_track_caller+0x2d8/0x740 [ 1317.876900] ? lock_downgrade+0x880/0x880 [ 1317.881061] ? strndup_user+0x77/0xd0 [ 1317.884884] memdup_user+0x26/0xb0 [ 1317.888436] strndup_user+0x77/0xd0 [ 1317.892122] ksys_mount+0x3c/0x150 [ 1317.895677] __x64_sys_mount+0xbe/0x150 [ 1317.899671] do_syscall_64+0x103/0x610 [ 1317.903575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.908798] RIP: 0033:0x45a99a [ 1317.911996] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1317.930902] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1317.938617] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1317.945890] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1317.953162] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1317.960441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1317.967727] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:30:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x10040, [{0xc0010015}]}) 14:30:42 executing program 0 (fault-call:0 fault-nth:40): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x98, r1, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1c}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x80) syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x3, 0x2) 14:30:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:30:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1100) [ 1327.374512] FAULT_INJECTION: forcing a failure. [ 1327.374512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1327.386378] CPU: 0 PID: 15899 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1327.393308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.402661] Call Trace: [ 1327.402689] dump_stack+0x172/0x1f0 [ 1327.402716] should_fail.cold+0xa/0x15 [ 1327.402737] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1327.402757] ? __lock_acquire+0x548/0x3fb0 [ 1327.402779] ? unwind_get_return_address+0x61/0xa0 [ 1327.418216] should_fail_alloc_page+0x50/0x60 [ 1327.418234] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1327.418256] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1327.418270] ? find_held_lock+0x35/0x130 [ 1327.418294] ? kmem_cache_alloc_trace+0x151/0x760 [ 1327.418310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1327.432140] cache_grow_begin+0x9c/0x860 [ 1327.432157] ? getname_flags+0xd6/0x5b0 [ 1327.432175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.432195] kmem_cache_alloc+0x62d/0x6f0 [ 1327.432217] getname_flags+0xd6/0x5b0 [ 1327.432234] user_path_at_empty+0x2f/0x50 [ 1327.445966] do_mount+0x15e/0x2d30 [ 1327.445991] ? copy_mount_string+0x40/0x40 [ 1327.446008] ? kmem_cache_alloc_trace+0x354/0x760 [ 1327.446025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.446044] ? _copy_from_user+0xdd/0x150 [ 1327.460040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1327.460058] ? copy_mount_options+0x280/0x3a0 [ 1327.460096] ksys_mount+0xdb/0x150 [ 1327.473761] __x64_sys_mount+0xbe/0x150 [ 1327.473796] do_syscall_64+0x103/0x610 [ 1327.473820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.473831] RIP: 0033:0x45a99a [ 1327.473847] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1327.481785] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1327.481800] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1327.481810] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1327.481819] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1327.481828] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1327.481837] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1327.598708] hfsplus: unable to find HFS+ superblock 14:30:43 executing program 0 (fault-call:0 fault-nth:41): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1327.661709] XFS (loop2): Invalid superblock magic number 14:30:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x100c0, [{0xc0010015}]}) [ 1327.785734] FAULT_INJECTION: forcing a failure. [ 1327.785734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1327.797608] CPU: 1 PID: 15925 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1327.804549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.813917] Call Trace: [ 1327.816536] dump_stack+0x172/0x1f0 [ 1327.820195] should_fail.cold+0xa/0x15 [ 1327.824129] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1327.829289] ? __lock_acquire+0x548/0x3fb0 [ 1327.833556] ? unwind_get_return_address+0x61/0xa0 [ 1327.838526] should_fail_alloc_page+0x50/0x60 [ 1327.843045] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1327.847755] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1327.852814] ? find_held_lock+0x35/0x130 [ 1327.856900] ? kmem_cache_alloc_trace+0x151/0x760 [ 1327.861764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1327.866889] cache_grow_begin+0x9c/0x860 [ 1327.870970] ? getname_flags+0xd6/0x5b0 [ 1327.874968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.880524] kmem_cache_alloc+0x62d/0x6f0 [ 1327.880549] getname_flags+0xd6/0x5b0 [ 1327.880568] user_path_at_empty+0x2f/0x50 [ 1327.880600] do_mount+0x15e/0x2d30 [ 1327.896232] ? copy_mount_string+0x40/0x40 [ 1327.900483] ? kmem_cache_alloc_trace+0x354/0x760 [ 1327.905339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.910886] ? _copy_from_user+0xdd/0x150 [ 1327.915048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1327.920612] ? copy_mount_options+0x280/0x3a0 [ 1327.925123] ksys_mount+0xdb/0x150 [ 1327.928683] __x64_sys_mount+0xbe/0x150 [ 1327.932672] do_syscall_64+0x103/0x610 [ 1327.936575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.941781] RIP: 0033:0x45a99a [ 1327.944981] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1327.963927] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1327.971644] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1327.978922] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1327.986197] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1327.993471] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1328.000760] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1328.012755] hfsplus: unable to find HFS+ superblock 14:30:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x20000, [{0xc0010015}]}) 14:30:43 executing program 0 (fault-call:0 fault-nth:42): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1328.180524] FAULT_INJECTION: forcing a failure. [ 1328.180524] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.208910] CPU: 1 PID: 15933 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1328.215882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.225248] Call Trace: [ 1328.227895] dump_stack+0x172/0x1f0 [ 1328.231562] should_fail.cold+0xa/0x15 [ 1328.235482] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1328.240642] ? ___might_sleep+0x163/0x280 [ 1328.244838] __should_failslab+0x121/0x190 [ 1328.249128] should_failslab+0x9/0x14 [ 1328.252953] kmem_cache_alloc+0x2b2/0x6f0 [ 1328.257133] ? lock_downgrade+0x880/0x880 [ 1328.261311] alloc_vfsmnt+0x28/0x780 [ 1328.265090] vfs_kern_mount.part.0+0x2a/0x410 [ 1328.269627] do_mount+0x581/0x2d30 [ 1328.273194] ? copy_mount_string+0x40/0x40 [ 1328.277454] ? kmem_cache_alloc_trace+0x354/0x760 [ 1328.282323] ? _copy_from_user+0xdd/0x150 [ 1328.286496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1328.292102] ? copy_mount_options+0x280/0x3a0 [ 1328.296641] ksys_mount+0xdb/0x150 [ 1328.300216] __x64_sys_mount+0xbe/0x150 [ 1328.304210] do_syscall_64+0x103/0x610 [ 1328.308147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1328.313357] RIP: 0033:0x45a99a [ 1328.316577] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1328.335515] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1328.343253] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1328.350535] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1328.357821] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1328.365126] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1328.372405] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x40000, [{0xc0010015}]}) 14:30:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffe1d, 0x0, 0x4000, 0x0) 14:30:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:30:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 14:30:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x80000, [{0xc0010015}]}) 14:30:52 executing program 0 (fault-call:0 fault-nth:43): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1200) 14:30:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1337.605722] FAULT_INJECTION: forcing a failure. [ 1337.605722] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.625165] CPU: 0 PID: 15944 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1337.632116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1337.641465] Call Trace: [ 1337.644074] dump_stack+0x172/0x1f0 [ 1337.647724] should_fail.cold+0xa/0x15 [ 1337.651619] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1337.656733] ? ___might_sleep+0x163/0x280 [ 1337.660889] __should_failslab+0x121/0x190 [ 1337.665132] should_failslab+0x9/0x14 [ 1337.668941] kmem_cache_alloc+0x2b2/0x6f0 [ 1337.673109] ? lock_downgrade+0x880/0x880 [ 1337.677266] alloc_vfsmnt+0x28/0x780 [ 1337.680986] vfs_kern_mount.part.0+0x2a/0x410 [ 1337.685488] do_mount+0x581/0x2d30 [ 1337.689038] ? copy_mount_string+0x40/0x40 [ 1337.693274] ? kmem_cache_alloc_trace+0x354/0x760 [ 1337.698128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1337.703668] ? copy_mount_options+0x280/0x3a0 [ 1337.708184] ksys_mount+0xdb/0x150 [ 1337.711746] __x64_sys_mount+0xbe/0x150 [ 1337.715728] do_syscall_64+0x103/0x610 [ 1337.719625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1337.724827] RIP: 0033:0x45a99a [ 1337.728029] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1337.746950] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1337.754679] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1337.761950] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1337.769216] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1337.776480] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1337.783749] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1337.850530] XFS (loop2): Invalid superblock magic number 14:30:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4d564b, [{0xc0010015}]}) 14:30:53 executing program 0 (fault-call:0 fault-nth:44): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:30:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x80ffff, [{0xc0010015}]}) [ 1338.116403] FAULT_INJECTION: forcing a failure. [ 1338.116403] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1338.128276] CPU: 0 PID: 16077 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1338.135217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.144607] Call Trace: [ 1338.147227] dump_stack+0x172/0x1f0 [ 1338.150872] should_fail.cold+0xa/0x15 [ 1338.154801] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1338.159924] ? __lock_acquire+0x548/0x3fb0 [ 1338.164178] should_fail_alloc_page+0x50/0x60 [ 1338.168682] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1338.173370] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1338.178397] ? find_held_lock+0x35/0x130 [ 1338.182482] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1338.187638] cache_grow_begin+0x9c/0x860 [ 1338.191726] ? getname_kernel+0x53/0x370 [ 1338.195839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1338.201394] kmem_cache_alloc+0x62d/0x6f0 [ 1338.205555] ? find_held_lock+0x35/0x130 [ 1338.209632] getname_kernel+0x53/0x370 [ 1338.213534] kern_path+0x20/0x40 [ 1338.216927] lookup_bdev.part.0+0x7b/0x1b0 [ 1338.221170] ? blkdev_open+0x290/0x290 [ 1338.225068] ? rcu_read_lock_sched_held+0x110/0x130 [ 1338.230118] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1338.235670] blkdev_get_by_path+0x81/0x130 [ 1338.239916] mount_bdev+0x5d/0x3c0 [ 1338.243466] ? hfsplus_iget+0x7b0/0x7b0 [ 1338.247458] hfsplus_mount+0x35/0x40 [ 1338.251189] mount_fs+0x106/0x3ff [ 1338.254748] ? emergency_thaw_all+0x1a0/0x1a0 [ 1338.259258] ? __init_waitqueue_head+0x36/0x90 [ 1338.263877] vfs_kern_mount.part.0+0x6f/0x410 [ 1338.268395] do_mount+0x581/0x2d30 [ 1338.271950] ? copy_mount_string+0x40/0x40 [ 1338.276200] ? copy_mount_options+0x1ea/0x3a0 [ 1338.280705] ? copy_mount_options+0x1f0/0x3a0 [ 1338.285225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1338.290770] ? copy_mount_options+0x280/0x3a0 [ 1338.295280] ksys_mount+0xdb/0x150 [ 1338.298841] __x64_sys_mount+0xbe/0x150 [ 1338.302831] do_syscall_64+0x103/0x610 [ 1338.306734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.311930] RIP: 0033:0x45a99a [ 1338.315134] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1338.334043] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1338.341808] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1338.349144] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1338.356442] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1338.363715] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1338.370999] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:30:54 executing program 2: r0 = request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0xfffffffffffffffb) r1 = request_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='L-', 0xfffffffffffffffa) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="bc7bec04210ade5a6771899977ceb20a50434cf20691b4dc094c4369bb1f2c996ee30d681ac9", 0x26, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/63, 0x3f, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='\x00', 0x0, 0x3dd, 0x0, 0xfffffffffffffffc, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x101}, 0x28, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) 14:30:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1000000, [{0xc0010015}]}) [ 1338.720149] hfsplus: unable to find HFS+ superblock 14:30:54 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x111203, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x10001}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x0, 0x6, [0x2, 0x8, 0x9, 0x80000001, 0x9, 0x8]}, 0x14) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0x1ff, 0x8, 0x1ff, 0x9, 0x9, 0xf6, 0x100000001}, 0x10) [ 1338.944186] XFS (loop2): Invalid superblock magic number 14:31:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, 0x0, 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:03 executing program 0 (fault-call:0 fault-nth:45): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x10100c0, [{0xc0010015}]}) 14:31:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='personality\x00') getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000300), &(0x7f0000000140)=0xfffffffffffffd7d) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x3f, "b53fc07ccfb44a49e6daf716ff02033900aafca90700bc354f8a018c9b4afe3876080000932c08d67e68a8cad32c044133b348ae89c4756f6a68b0ab88b0ff"}, &(0x7f0000000180)=0x63) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000001c0)={0x0, {0x77359400}, 0x8, 0x9}) 14:31:03 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1b00) 14:31:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1348.498034] FAULT_INJECTION: forcing a failure. [ 1348.498034] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.522700] CPU: 1 PID: 16113 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1348.529669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1348.539033] Call Trace: [ 1348.541651] dump_stack+0x172/0x1f0 [ 1348.545326] should_fail.cold+0xa/0x15 [ 1348.549231] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1348.554356] ? ___might_sleep+0x163/0x280 [ 1348.558521] __should_failslab+0x121/0x190 [ 1348.562798] should_failslab+0x9/0x14 [ 1348.566623] __kmalloc_track_caller+0x2d8/0x740 [ 1348.571312] ? alloc_vfsmnt+0x28/0x780 [ 1348.575222] ? kstrdup_const+0x66/0x80 [ 1348.579129] kstrdup+0x3a/0x70 [ 1348.582333] kstrdup_const+0x66/0x80 [ 1348.586062] alloc_vfsmnt+0xba/0x780 [ 1348.589801] vfs_kern_mount.part.0+0x2a/0x410 [ 1348.594316] do_mount+0x581/0x2d30 [ 1348.597871] ? copy_mount_string+0x40/0x40 [ 1348.602124] ? kmem_cache_alloc_trace+0x354/0x760 [ 1348.606988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1348.612538] ? copy_mount_options+0x280/0x3a0 [ 1348.617059] ksys_mount+0xdb/0x150 [ 1348.620620] __x64_sys_mount+0xbe/0x150 [ 1348.624619] do_syscall_64+0x103/0x610 [ 1348.628528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1348.633738] RIP: 0033:0x45a99a [ 1348.636941] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1348.655857] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1348.663593] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1348.670903] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1348.678179] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1348.685454] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1348.692728] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, 0x0, 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1348.732414] XFS (loop2): Invalid superblock magic number 14:31:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, 0x0, 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:04 executing program 0 (fault-call:0 fault-nth:46): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1348.990015] FAULT_INJECTION: forcing a failure. [ 1348.990015] name failslab, interval 1, probability 0, space 0, times 0 [ 1349.014903] CPU: 0 PID: 16239 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1349.021872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1349.031230] Call Trace: [ 1349.033830] dump_stack+0x172/0x1f0 [ 1349.037479] should_fail.cold+0xa/0x15 [ 1349.041404] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1349.046559] ? ___might_sleep+0x163/0x280 [ 1349.050734] __should_failslab+0x121/0x190 [ 1349.054987] should_failslab+0x9/0x14 [ 1349.058801] kmem_cache_alloc_trace+0x2d1/0x760 [ 1349.063483] ? kasan_check_read+0x11/0x20 [ 1349.067652] ? do_raw_spin_unlock+0x57/0x270 [ 1349.072112] ? kill_litter_super+0x60/0x60 [ 1349.076362] sget_userns+0x11b/0xd30 [ 1349.080111] ? kill_litter_super+0x60/0x60 [ 1349.084361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.089908] ? ns_test_super+0x50/0x50 [ 1349.093804] ? ns_test_super+0x50/0x50 [ 1349.097695] ? kill_litter_super+0x60/0x60 [ 1349.101934] sget+0x10c/0x150 [ 1349.105077] mount_bdev+0xff/0x3c0 [ 1349.108678] ? hfsplus_iget+0x7b0/0x7b0 [ 1349.112665] hfsplus_mount+0x35/0x40 [ 1349.116414] mount_fs+0x106/0x3ff [ 1349.119878] ? emergency_thaw_all+0x1a0/0x1a0 [ 1349.124394] ? __init_waitqueue_head+0x36/0x90 [ 1349.128994] vfs_kern_mount.part.0+0x6f/0x410 [ 1349.133519] do_mount+0x581/0x2d30 [ 1349.137086] ? proc_pid_readdir+0x281/0x750 [ 1349.141433] ? copy_mount_string+0x40/0x40 [ 1349.145674] ? kmem_cache_alloc_trace+0x354/0x760 [ 1349.150534] ? _copy_from_user+0xdd/0x150 [ 1349.154696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.160244] ? copy_mount_options+0x280/0x3a0 [ 1349.164750] ksys_mount+0xdb/0x150 [ 1349.168299] __x64_sys_mount+0xbe/0x150 [ 1349.172299] do_syscall_64+0x103/0x610 [ 1349.176209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1349.181401] RIP: 0033:0x45a99a [ 1349.184599] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1349.203503] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1349.203547] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1349.203557] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1349.203581] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1349.233178] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:31:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x14d564b, [{0xc0010015}]}) 14:31:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1349.240449] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x2000000, [{0xc0010015}]}) 14:31:04 executing program 0 (fault-call:0 fault-nth:47): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x13c, 0x0) r1 = dup2(r0, r0) ioctl$UI_DEV_DESTROY(r1, 0x5502) sync_file_range(r0, 0x1, 0x0, 0x1) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x220000) [ 1349.477361] FAULT_INJECTION: forcing a failure. [ 1349.477361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1349.489230] CPU: 0 PID: 16256 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1349.496166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1349.505531] Call Trace: [ 1349.508133] dump_stack+0x172/0x1f0 [ 1349.511777] should_fail.cold+0xa/0x15 [ 1349.515684] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1349.520813] ? __lock_acquire+0x548/0x3fb0 [ 1349.525100] should_fail_alloc_page+0x50/0x60 [ 1349.529617] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1349.534302] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1349.539327] ? find_held_lock+0x35/0x130 [ 1349.543409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1349.548531] cache_grow_begin+0x9c/0x860 [ 1349.552607] ? sget_userns+0x11b/0xd30 [ 1349.556510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1349.562062] kmem_cache_alloc_trace+0x67f/0x760 [ 1349.566756] ? kill_litter_super+0x60/0x60 [ 1349.571000] sget_userns+0x11b/0xd30 [ 1349.574723] ? kill_litter_super+0x60/0x60 [ 1349.578972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.578998] ? ns_test_super+0x50/0x50 [ 1349.579020] ? ns_test_super+0x50/0x50 [ 1349.579032] ? kill_litter_super+0x60/0x60 [ 1349.579045] sget+0x10c/0x150 [ 1349.579062] mount_bdev+0xff/0x3c0 [ 1349.579085] ? hfsplus_iget+0x7b0/0x7b0 [ 1349.579104] hfsplus_mount+0x35/0x40 [ 1349.588539] mount_fs+0x106/0x3ff [ 1349.588556] ? emergency_thaw_all+0x1a0/0x1a0 [ 1349.588576] ? __init_waitqueue_head+0x36/0x90 [ 1349.588604] vfs_kern_mount.part.0+0x6f/0x410 [ 1349.588641] do_mount+0x581/0x2d30 [ 1349.588669] ? copy_mount_string+0x40/0x40 [ 1349.588688] ? kmem_cache_alloc_trace+0x354/0x760 [ 1349.623609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.623628] ? copy_mount_options+0x280/0x3a0 [ 1349.623651] ksys_mount+0xdb/0x150 [ 1349.623674] __x64_sys_mount+0xbe/0x150 [ 1349.635966] do_syscall_64+0x103/0x610 [ 1349.635992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1349.636005] RIP: 0033:0x45a99a [ 1349.636020] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1349.636032] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1349.658403] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1349.658413] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1349.658423] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1349.658433] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1349.658442] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1349.659939] hfsplus: unable to find HFS+ superblock [ 1349.770789] XFS (loop2): Invalid superblock magic number 14:31:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:08 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x20100c0, [{0xc0010015}]}) 14:31:08 executing program 0 (fault-call:0 fault-nth:48): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:08 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x2000) 14:31:08 executing program 2: r0 = syz_open_pts(0xffffffffffffff9c, 0x800) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x200, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="473e2f72bcfb58f8b7a66cbc3c493e12f6fe8eae2376008a514c7c9858d77cf1e5ba943b16fd440f9502ec1c52113bf77f27f640397d45bf65c8b18adac1e1876f625a5f29a8a08ab5b1f28518813aa21776ebc3f76515d76a82fdf780652590ff9d27938b8195f8793a19800df55eaf566ff5df3c83f94a7a242d41d69df50bcdeb4135d15e3aa858e5252f87e037660df181380eb3bc5bea5ce14fe53e54184853f41aaa5ce4ea935b4bc46646ed0fa1364f5a7ed57c75081ea5601319e0200dd36282afbddaaded273c00604328e690c9f1a6ce8ba6569a155aa3f48f8df8748d01a2afbc", 0xe6}, {&(0x7f0000000200)="5ac2767dfe0bf4b578c314bae0534cfa59cec486a1e0dcbb286f98d6637bb72e3dba66e23f12b4399944a75c7b37e41960c3d075e311ff6328c67c4f82fb0a982146e65a330e30900c6787e146ad75cd52608e5205646f282dcaf56ef4cbaf785225124ec6552387279b24b668bf9e6ddb90fb2121e2f4da44f7316132df6616773464c98130549c61fffda1440d033b8bc6fb7dcc0782b0782cbccc29d5c8e2d2b6ba57b0947eab7e72d0a5f2db26a6443d6ecb63bf092273cf92cbc7cacd492e0acf0d271bfc7b53ba9284ad", 0xcd, 0x8001}, {&(0x7f0000000300)="62015c4527c096baeaff1961fe732201b7ad68dc31c8aa748b4fc2ffd72db15b94284aa3c2f33a7090afe7186ecc16066ff6154915da94136c7eb845c9055bad2be7935c1870d10d9263b830b5", 0x4d, 0x5b}], 0x10090, &(0x7f0000000540)=ANY=[@ANYBLOB="756e695f786c6174653d312c73686f72746e616d653d6d697865642c757466383d302c757466383d312c696f636861727356743d69736f383835392d332c73686f72746e616d653d77696e39352c73686f72746e616d653d77696e39352c646f733178666c6f7070792c7569643d2d9f92339deb2b63e886", @ANYRESDEC=r1, @ANYBLOB=',smackfsroot=,\x00']) 14:31:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1352.817201] FAT-fs (loop2): Unrecognized mount option "iocharsVt=iso8859-3" or missing value [ 1352.828802] FAULT_INJECTION: forcing a failure. [ 1352.828802] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.863168] CPU: 1 PID: 16283 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1352.870136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.879497] Call Trace: [ 1352.882139] dump_stack+0x172/0x1f0 [ 1352.885801] should_fail.cold+0xa/0x15 [ 1352.889713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1352.894842] ? ___might_sleep+0x163/0x280 [ 1352.899016] __should_failslab+0x121/0x190 [ 1352.903279] should_failslab+0x9/0x14 [ 1352.907099] __kmalloc+0x2dc/0x740 14:31:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1352.910689] ? lockdep_init_map+0x1be/0x6d0 [ 1352.910706] ? prealloc_shrinker+0xa6/0x350 [ 1352.910724] prealloc_shrinker+0xa6/0x350 [ 1352.910740] sget_userns+0x7ef/0xd30 [ 1352.919401] ? kill_litter_super+0x60/0x60 [ 1352.919422] ? ns_test_super+0x50/0x50 [ 1352.919439] ? ns_test_super+0x50/0x50 [ 1352.919454] ? kill_litter_super+0x60/0x60 [ 1352.931560] sget+0x10c/0x150 [ 1352.946688] mount_bdev+0xff/0x3c0 [ 1352.950246] ? hfsplus_iget+0x7b0/0x7b0 [ 1352.954235] hfsplus_mount+0x35/0x40 [ 1352.957962] mount_fs+0x106/0x3ff [ 1352.961433] ? emergency_thaw_all+0x1a0/0x1a0 [ 1352.965941] ? __init_waitqueue_head+0x36/0x90 [ 1352.970561] vfs_kern_mount.part.0+0x6f/0x410 [ 1352.975076] do_mount+0x581/0x2d30 [ 1352.978642] ? copy_mount_string+0x40/0x40 [ 1352.982889] ? kmem_cache_alloc_trace+0x354/0x760 [ 1352.987748] ? _copy_from_user+0xdd/0x150 [ 1352.991913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1352.997473] ? copy_mount_options+0x280/0x3a0 [ 1353.001982] ksys_mount+0xdb/0x150 [ 1353.005540] __x64_sys_mount+0xbe/0x150 [ 1353.009529] do_syscall_64+0x103/0x610 [ 1353.013436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.018633] RIP: 0033:0x45a99a [ 1353.021835] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1353.040745] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1353.048464] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1353.055737] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1353.063011] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1353.070288] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1353.077561] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x8001, 0x0, 0x0, 0x2001b, 0x0) 14:31:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, 0x0, 0x0) 14:31:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x24d564b, [{0xc0010015}]}) 14:31:08 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x10600) ioctl$NBD_DISCONNECT(r0, 0xab08) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) 14:31:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, 0x0, 0x0) [ 1353.454756] XFS (loop2): Invalid superblock magic number 14:31:11 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:11 executing program 0 (fault-call:0 fault-nth:49): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, 0x0, 0x0) 14:31:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x30001c0, [{0xc0010015}]}) 14:31:11 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0xffffffffffffff3e) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x6, {0x7ff}}, 0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x2, 0x1, 0x6883, 0x47f3, 0x2}, 0x14) write$FUSE_GETXATTR(r0, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x1}}, 0x18) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000001c0)) getpeername$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000200)=0x10000, 0x4) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x0) bind$bt_hci(r0, &(0x7f0000000340)={0x1f, r2, 0x3}, 0xc) 14:31:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x2f00) [ 1356.305306] FAULT_INJECTION: forcing a failure. [ 1356.305306] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1356.317171] CPU: 1 PID: 16340 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1356.324116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.333489] Call Trace: [ 1356.336105] dump_stack+0x172/0x1f0 [ 1356.339867] should_fail.cold+0xa/0x15 [ 1356.343796] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1356.348946] ? __lock_acquire+0x548/0x3fb0 [ 1356.353233] should_fail_alloc_page+0x50/0x60 [ 1356.357777] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1356.362839] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1356.367869] ? find_held_lock+0x35/0x130 [ 1356.371959] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1356.377082] cache_grow_begin+0x9c/0x860 [ 1356.381166] ? sget_userns+0x11b/0xd30 [ 1356.385091] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1356.390665] kmem_cache_alloc_trace+0x67f/0x760 [ 1356.395396] ? kill_litter_super+0x60/0x60 [ 1356.399651] sget_userns+0x11b/0xd30 [ 1356.403390] ? kill_litter_super+0x60/0x60 [ 1356.407654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1356.413249] ? ns_test_super+0x50/0x50 [ 1356.417162] ? ns_test_super+0x50/0x50 [ 1356.421067] ? kill_litter_super+0x60/0x60 [ 1356.425328] sget+0x10c/0x150 [ 1356.428462] mount_bdev+0xff/0x3c0 [ 1356.432023] ? hfsplus_iget+0x7b0/0x7b0 [ 1356.436023] hfsplus_mount+0x35/0x40 [ 1356.439764] mount_fs+0x106/0x3ff [ 1356.443241] ? emergency_thaw_all+0x1a0/0x1a0 [ 1356.447762] ? __init_waitqueue_head+0x36/0x90 [ 1356.452375] vfs_kern_mount.part.0+0x6f/0x410 [ 1356.456901] do_mount+0x581/0x2d30 [ 1356.460469] ? copy_mount_string+0x40/0x40 [ 1356.464729] ? kmem_cache_alloc_trace+0x354/0x760 [ 1356.469618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1356.475184] ? copy_mount_options+0x280/0x3a0 [ 1356.479709] ksys_mount+0xdb/0x150 [ 1356.483280] __x64_sys_mount+0xbe/0x150 [ 1356.487281] do_syscall_64+0x103/0x610 [ 1356.491202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1356.496401] RIP: 0033:0x45a99a [ 1356.499619] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1356.518538] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1356.526277] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1356.533561] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1356.540853] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1356.548171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:31:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[], 0x0) [ 1356.555455] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1356.590943] hfsplus: unable to find HFS+ superblock 14:31:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[], 0x0) [ 1356.638436] XFS (loop2): Invalid superblock magic number 14:31:12 executing program 0 (fault-call:0 fault-nth:50): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x30100c0, [{0xc0010015}]}) 14:31:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[], 0x0) 14:31:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) [ 1356.912045] FAULT_INJECTION: forcing a failure. [ 1356.912045] name failslab, interval 1, probability 0, space 0, times 0 [ 1356.935520] CPU: 0 PID: 16467 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1356.942511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.951867] Call Trace: [ 1356.954470] dump_stack+0x172/0x1f0 [ 1356.958119] should_fail.cold+0xa/0x15 [ 1356.962039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1356.967176] ? ___might_sleep+0x163/0x280 [ 1356.971344] __should_failslab+0x121/0x190 [ 1356.975644] should_failslab+0x9/0x14 [ 1356.979469] kmem_cache_alloc_node_trace+0x270/0x720 [ 1356.984626] __kmalloc_node+0x3d/0x70 [ 1356.988440] kvmalloc_node+0x68/0x100 [ 1356.992250] __list_lru_init+0x4a6/0x6e0 [ 1356.996328] sget_userns+0x81e/0xd30 [ 1357.000093] ? kill_litter_super+0x60/0x60 [ 1357.004350] ? ns_test_super+0x50/0x50 [ 1357.008252] ? ns_test_super+0x50/0x50 [ 1357.012144] ? kill_litter_super+0x60/0x60 [ 1357.016387] sget+0x10c/0x150 [ 1357.019509] mount_bdev+0xff/0x3c0 [ 1357.023073] ? hfsplus_iget+0x7b0/0x7b0 [ 1357.027088] hfsplus_mount+0x35/0x40 [ 1357.030812] mount_fs+0x106/0x3ff [ 1357.034275] ? emergency_thaw_all+0x1a0/0x1a0 [ 1357.038787] ? __init_waitqueue_head+0x36/0x90 [ 1357.043392] vfs_kern_mount.part.0+0x6f/0x410 [ 1357.047907] do_mount+0x581/0x2d30 [ 1357.051481] ? copy_mount_string+0x40/0x40 [ 1357.055725] ? kmem_cache_alloc_trace+0x354/0x760 [ 1357.060581] ? _copy_from_user+0xdd/0x150 [ 1357.064750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1357.070309] ? copy_mount_options+0x280/0x3a0 [ 1357.074823] ksys_mount+0xdb/0x150 [ 1357.078379] __x64_sys_mount+0xbe/0x150 [ 1357.082368] do_syscall_64+0x103/0x610 [ 1357.086276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1357.091469] RIP: 0033:0x45a99a [ 1357.094671] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1357.113586] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1357.121323] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1357.128595] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1357.135874] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1357.143149] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1357.150431] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x34d564b, [{0xc0010015}]}) 14:31:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) 14:31:15 executing program 0 (fault-call:0 fault-nth:51): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = geteuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000180)=[{&(0x7f0000000100)="7bd939b5e09f7ba1668d17bc1c", 0xd, 0x9}, {&(0x7f0000000140)="7ebe63cd2df03d5b4e59b03a4ea1e7bc6227ffdaab9640284529508c3a1334d64244e33f4143843cbd4fbc3922b8840dffb7c49b4af5d79db32f06d7b7d383", 0x3f, 0x1}], 0x2d420, &(0x7f00000001c0)={[{@inode32='inode32'}, {@biosize={'biosize', 0x3d, 0x800}}, {@quota='quota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@barrier='barrier'}, {@biosize={'biosize', 0x3d, 0x6}}, {@qnoenforce='qnoenforce'}, {@pqnoenforce='pqnoenforce'}], [{@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0xe}}]}) 14:31:15 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x3800) [ 1359.844239] FAULT_INJECTION: forcing a failure. [ 1359.844239] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.883214] CPU: 0 PID: 16482 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1359.890192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.899548] Call Trace: [ 1359.902145] dump_stack+0x172/0x1f0 [ 1359.905787] should_fail.cold+0xa/0x15 [ 1359.909688] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1359.914799] ? ___might_sleep+0x163/0x280 [ 1359.918964] __should_failslab+0x121/0x190 [ 1359.923203] should_failslab+0x9/0x14 [ 1359.927007] kmem_cache_alloc_trace+0x2d1/0x760 [ 1359.931690] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1359.936848] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1359.941793] __list_lru_init+0x3cf/0x6e0 [ 1359.945864] sget_userns+0x81e/0xd30 [ 1359.949582] ? kill_litter_super+0x60/0x60 [ 1359.953825] ? ns_test_super+0x50/0x50 [ 1359.957714] ? ns_test_super+0x50/0x50 [ 1359.961598] ? kill_litter_super+0x60/0x60 [ 1359.965839] sget+0x10c/0x150 [ 1359.968949] mount_bdev+0xff/0x3c0 [ 1359.972504] ? hfsplus_iget+0x7b0/0x7b0 [ 1359.976523] hfsplus_mount+0x35/0x40 [ 1359.980237] mount_fs+0x106/0x3ff [ 1359.983715] ? emergency_thaw_all+0x1a0/0x1a0 [ 1359.988225] ? __init_waitqueue_head+0x36/0x90 [ 1359.992825] vfs_kern_mount.part.0+0x6f/0x410 [ 1359.997329] do_mount+0x581/0x2d30 [ 1360.000879] ? copy_mount_string+0x40/0x40 [ 1360.005118] ? kmem_cache_alloc_trace+0x354/0x760 [ 1360.009980] ? _copy_from_user+0xdd/0x150 [ 1360.014136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1360.019691] ? copy_mount_options+0x280/0x3a0 [ 1360.024192] ksys_mount+0xdb/0x150 [ 1360.027742] __x64_sys_mount+0xbe/0x150 [ 1360.031725] do_syscall_64+0x103/0x610 [ 1360.035625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.040813] RIP: 0033:0x45a99a [ 1360.044006] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1360.062920] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1360.070624] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1360.077911] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1360.085180] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 14:31:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) [ 1360.092446] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1360.099714] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff"], 0x1) [ 1360.159579] XFS (loop2): Invalid superblock magic number 14:31:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x40001c0, [{0xc0010015}]}) 14:31:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff"], 0x1) 14:31:15 executing program 0 (fault-call:0 fault-nth:52): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x44d564b, [{0xc0010015}]}) [ 1360.810518] FAULT_INJECTION: forcing a failure. [ 1360.810518] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.844632] CPU: 1 PID: 16527 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1360.851606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.860972] Call Trace: [ 1360.863593] dump_stack+0x172/0x1f0 [ 1360.867252] should_fail.cold+0xa/0x15 [ 1360.871191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1360.876329] ? ___might_sleep+0x163/0x280 [ 1360.880514] __should_failslab+0x121/0x190 [ 1360.884788] should_failslab+0x9/0x14 [ 1360.888621] kmem_cache_alloc_trace+0x2d1/0x760 [ 1360.893369] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1360.898500] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1360.903481] __list_lru_init+0x3cf/0x6e0 [ 1360.907564] sget_userns+0x81e/0xd30 [ 1360.911305] ? kill_litter_super+0x60/0x60 [ 1360.915566] ? ns_test_super+0x50/0x50 [ 1360.919484] ? ns_test_super+0x50/0x50 [ 1360.923421] ? kill_litter_super+0x60/0x60 [ 1360.927669] sget+0x10c/0x150 [ 1360.930792] mount_bdev+0xff/0x3c0 [ 1360.934348] ? hfsplus_iget+0x7b0/0x7b0 [ 1360.938349] hfsplus_mount+0x35/0x40 [ 1360.942095] mount_fs+0x106/0x3ff [ 1360.945573] ? emergency_thaw_all+0x1a0/0x1a0 [ 1360.950109] ? __init_waitqueue_head+0x36/0x90 [ 1360.954724] vfs_kern_mount.part.0+0x6f/0x410 [ 1360.959247] do_mount+0x581/0x2d30 [ 1360.962814] ? copy_mount_string+0x40/0x40 [ 1360.967084] ? kmem_cache_alloc_trace+0x354/0x760 [ 1360.971956] ? _copy_from_user+0xdd/0x150 [ 1360.976131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1360.981692] ? copy_mount_options+0x280/0x3a0 [ 1360.986218] ksys_mount+0xdb/0x150 [ 1360.990729] __x64_sys_mount+0xbe/0x150 [ 1360.994732] do_syscall_64+0x103/0x610 [ 1360.998647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.003856] RIP: 0033:0x45a99a [ 1361.007083] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1361.026265] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1361.033989] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1361.041280] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1361.048560] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1361.055850] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1361.063132] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff"], 0x1) 14:31:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x70001c0, [{0xc0010015}]}) 14:31:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffc1, 0x0, 0xfffffffffffffffa, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x800) 14:31:19 executing program 0 (fault-call:0 fault-nth:53): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:19 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x4000) 14:31:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1363.674162] FAULT_INJECTION: forcing a failure. [ 1363.674162] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.743737] CPU: 0 PID: 16534 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1363.750718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.760085] Call Trace: [ 1363.762741] dump_stack+0x172/0x1f0 [ 1363.766430] should_fail.cold+0xa/0x15 [ 1363.770335] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1363.775450] ? ___might_sleep+0x163/0x280 [ 1363.779615] __should_failslab+0x121/0x190 [ 1363.783867] should_failslab+0x9/0x14 [ 1363.787682] kmem_cache_alloc_trace+0x2d1/0x760 [ 1363.792368] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1363.797486] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1363.802442] __list_lru_init+0x3cf/0x6e0 [ 1363.806521] sget_userns+0x81e/0xd30 [ 1363.810254] ? kill_litter_super+0x60/0x60 [ 1363.814502] ? ns_test_super+0x50/0x50 [ 1363.818408] ? ns_test_super+0x50/0x50 [ 1363.822307] ? kill_litter_super+0x60/0x60 [ 1363.826545] sget+0x10c/0x150 [ 1363.829660] mount_bdev+0xff/0x3c0 [ 1363.833214] ? hfsplus_iget+0x7b0/0x7b0 [ 1363.837203] hfsplus_mount+0x35/0x40 [ 1363.840937] mount_fs+0x106/0x3ff [ 1363.844429] ? emergency_thaw_all+0x1a0/0x1a0 [ 1363.848953] ? __init_waitqueue_head+0x36/0x90 [ 1363.853556] vfs_kern_mount.part.0+0x6f/0x410 [ 1363.858122] do_mount+0x581/0x2d30 [ 1363.861691] ? copy_mount_string+0x40/0x40 [ 1363.865933] ? kmem_cache_alloc_trace+0x354/0x760 [ 1363.870794] ? _copy_from_user+0xdd/0x150 [ 1363.874957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1363.880532] ? copy_mount_options+0x280/0x3a0 [ 1363.885076] ksys_mount+0xdb/0x150 [ 1363.888655] __x64_sys_mount+0xbe/0x150 [ 1363.892664] do_syscall_64+0x103/0x610 [ 1363.896601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.901793] RIP: 0033:0x45a99a [ 1363.904992] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1363.923905] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1363.931619] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a 14:31:19 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xd, 0x42) close(r0) [ 1363.938893] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1363.946166] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1363.953436] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1363.960742] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8010040, [{0xc0010015}]}) 14:31:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0ad61f0604003f3188b070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, 0x0, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lstat(&(0x7f0000003700)='./file0\x00', 0x0) 14:31:19 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000000000000400000000000000000000000200000000900010000003800020000821123cc00030000000000850000000000000000000000000000000000006b000000008004f800000000000000000000000000ffb65b9001b993ba729781e45535f475e163374745756d2cc0aef9a8b22f03f44868d88ca0a76ab44dcfca32dd76fd09fc4e0620d09155ba8cc1ca55f28f1147a18bc7d72f7267ae514d07c0b91b64b01c09aa4e63038865e030e02752f0a70f321af1"], 0x68) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x1000) 14:31:19 executing program 0 (fault-call:0 fault-nth:54): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1364.133225] XFS (loop2): Invalid superblock magic number [ 1364.190457] FAULT_INJECTION: forcing a failure. [ 1364.190457] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.220346] CPU: 0 PID: 16668 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1364.227308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.236671] Call Trace: [ 1364.239276] dump_stack+0x172/0x1f0 [ 1364.242921] should_fail.cold+0xa/0x15 [ 1364.246856] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1364.252000] ? ___might_sleep+0x163/0x280 [ 1364.256177] __should_failslab+0x121/0x190 [ 1364.260437] should_failslab+0x9/0x14 [ 1364.264262] kmem_cache_alloc_node_trace+0x270/0x720 [ 1364.269385] __kmalloc_node+0x3d/0x70 [ 1364.273221] kvmalloc_node+0x68/0x100 [ 1364.277035] __list_lru_init+0x4a6/0x6e0 [ 1364.281126] sget_userns+0x81e/0xd30 [ 1364.284845] ? kill_litter_super+0x60/0x60 [ 1364.289108] ? ns_test_super+0x50/0x50 [ 1364.293042] ? ns_test_super+0x50/0x50 [ 1364.296953] ? kill_litter_super+0x60/0x60 [ 1364.301194] sget+0x10c/0x150 [ 1364.304334] mount_bdev+0xff/0x3c0 [ 1364.307885] ? hfsplus_iget+0x7b0/0x7b0 [ 1364.311871] hfsplus_mount+0x35/0x40 [ 1364.315595] mount_fs+0x106/0x3ff [ 1364.319096] ? emergency_thaw_all+0x1a0/0x1a0 [ 1364.323604] ? __init_waitqueue_head+0x36/0x90 [ 1364.328203] vfs_kern_mount.part.0+0x6f/0x410 [ 1364.332740] do_mount+0x581/0x2d30 [ 1364.336312] ? copy_mount_string+0x40/0x40 [ 1364.340590] ? copy_mount_options+0x1fb/0x3a0 [ 1364.345130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.350682] ? copy_mount_options+0x280/0x3a0 [ 1364.355185] ksys_mount+0xdb/0x150 [ 1364.358734] __x64_sys_mount+0xbe/0x150 [ 1364.362722] do_syscall_64+0x103/0x610 [ 1364.366656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.371848] RIP: 0033:0x45a99a [ 1364.375046] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1364.393966] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1364.401691] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1364.408969] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1364.416414] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1364.423686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1364.430952] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8030000, [{0xc0010015}]}) 14:31:22 executing program 0 (fault-call:0 fault-nth:55): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:22 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0xc4c85513, &(0x7f0000000000)={0x9}) 14:31:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) 14:31:22 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x48, 0x6, 0x800, "bf858ab80209cac8184cf01258e1043f", "13634baf8d077ac84de8b1d2abca2df831721172a37f15e8d8b789b54c2446c0f33b579d85a056060fa80c21dbd62102ccb44a"}, 0x48, 0x3) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x98002, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000350b0010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:22 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x404) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x480400) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) io_setup(0x3, &(0x7f0000000040)) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000340)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0xb813, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000240)="0dc2d66cd1a360caca1a400c1f74dfd13ec821bb2dd0af2cf412f03d21d3a0b812af2a6714a3b9b7abed2f83a62975f7e805bd47bb1083e12dabbdcef965d756a5821f26fa2c8bc3a4aae700cec8b10db168e3be6a7c0f95ab03fe472c8f90c190fb3d1c24d83f8de43aab89373f0ac3fba739c57e75efb8ccb6c807bcb4c8ce00a711dfe61961498f8debcdeb6d91fa74a084bea1baa4d70a7fa14d0eb21caf8ce31c21cc785fad4c797fd7761dde8ac91ab8f29e2729bbe4406f96f76537a243746319", 0xc4, 0xffffffffffffff7f}, {&(0x7f0000000440)="25cae3f38379266f62eaa612db86bc44633800fbae835a6b73c429d08760960735dc37c00746561ebb4cbc2f65824860a0a2629a5fcbce0b695876a61bbf175147097e7f59585127d8b5f0c30fb6ee82ab2717b3364d7cdcc957df2416e58689ab2c59ba1adfd4e36eeb950cea387ff53096c7795a77d47cdbd8d3bcbd0470852dae8517e9ce7838374b7dc00e971dd8720070b5f0499e9b5d36e89bab0e7a47815a1087a9676e9009084ed6f7e1fba534dc58dbd90ad79d5c74f7bdc3fe12a25a90", 0xc2}, {&(0x7f0000000540)="1a44a48b354162ee2812d8c68951f8d137b8613f26d7c6b5267955fb6812dfd140b28c72b3ead9698e18d095814087d9fc66af6e68c86a77a945c28a4cf12db8a234605544825619c24f834a8988ce7b83c67d34de5270", 0x57, 0x6}], 0x2100005, &(0x7f0000000740)={[{@expose_privroot='expose_privroot'}, {@barrier_none='barrier=none'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\'}}, {@euid_gt={'euid>', r2}}]}) [ 1367.428161] FAULT_INJECTION: forcing a failure. [ 1367.428161] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.460041] CPU: 1 PID: 16790 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1367.467031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.476413] Call Trace: [ 1367.476440] dump_stack+0x172/0x1f0 [ 1367.476467] should_fail.cold+0xa/0x15 [ 1367.486595] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1367.491725] ? ___might_sleep+0x163/0x280 [ 1367.491747] __should_failslab+0x121/0x190 [ 1367.491767] should_failslab+0x9/0x14 [ 1367.491785] kmem_cache_alloc_trace+0x2d1/0x760 [ 1367.508675] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1367.508710] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1367.508729] __list_lru_init+0x3cf/0x6e0 [ 1367.508747] sget_userns+0x81e/0xd30 [ 1367.508770] ? kill_litter_super+0x60/0x60 [ 1367.508814] ? ns_test_super+0x50/0x50 [ 1367.508830] ? ns_test_super+0x50/0x50 [ 1367.538629] ? kill_litter_super+0x60/0x60 [ 1367.542871] sget+0x10c/0x150 [ 1367.545999] mount_bdev+0xff/0x3c0 [ 1367.549568] ? hfsplus_iget+0x7b0/0x7b0 [ 1367.553555] hfsplus_mount+0x35/0x40 [ 1367.557291] mount_fs+0x106/0x3ff [ 1367.560758] ? emergency_thaw_all+0x1a0/0x1a0 [ 1367.565292] ? __init_waitqueue_head+0x36/0x90 [ 1367.569925] vfs_kern_mount.part.0+0x6f/0x410 [ 1367.574441] do_mount+0x581/0x2d30 [ 1367.578001] ? copy_mount_string+0x40/0x40 [ 1367.582251] ? kmem_cache_alloc_trace+0x354/0x760 [ 1367.587118] ? _copy_from_user+0xdd/0x150 [ 1367.591284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1367.596834] ? copy_mount_options+0x280/0x3a0 [ 1367.601356] ksys_mount+0xdb/0x150 [ 1367.604911] __x64_sys_mount+0xbe/0x150 [ 1367.608914] do_syscall_64+0x103/0x610 [ 1367.612818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.618013] RIP: 0033:0x45a99a [ 1367.621219] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1367.640142] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1367.647869] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1367.655143] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1367.662420] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1367.669696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:31:23 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xd, 0x42) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) [ 1367.676968] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1367.711547] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.3' sets config #2 14:31:23 executing program 3: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) [ 1367.762209] XFS (loop2): Invalid superblock magic number 14:31:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xa010000, [{0xc0010015}]}) 14:31:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x20000000007b, 0x0, [0x6e0]}) 14:31:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x10000000, [{0xc0010015}]}) 14:31:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000002000000009000100"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:26 executing program 0 (fault-call:0 fault-nth:56): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:26 executing program 3: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) sendto$unix(r0, &(0x7f00000000c0)="d909ce7f13948d6ea0e8", 0xa, 0x4000, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) socket$tipc(0x1e, 0x5, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x4) 14:31:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x11000000, [{0xc0010015}]}) 14:31:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'caif0\x00', {0x2, 0x4e21, @loopback}}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x5, 0x80006, 0x8001, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000100)=0x7fff, 0x4) 14:31:26 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x183282) fsetxattr$security_ima(r0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v2={0x5, 0x2, 0x5, 0x2, 0xfd, "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"}, 0x107, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1371.004878] FAULT_INJECTION: forcing a failure. [ 1371.004878] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.067964] CPU: 1 PID: 16939 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1371.074947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.084315] Call Trace: [ 1371.086933] dump_stack+0x172/0x1f0 [ 1371.090610] should_fail.cold+0xa/0x15 [ 1371.094552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1371.099692] ? ___might_sleep+0x163/0x280 [ 1371.103870] __should_failslab+0x121/0x190 [ 1371.108134] should_failslab+0x9/0x14 [ 1371.111981] kmem_cache_alloc_trace+0x2d1/0x760 [ 1371.116704] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1371.121856] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1371.126832] __list_lru_init+0x3cf/0x6e0 [ 1371.130923] sget_userns+0x81e/0xd30 [ 1371.134656] ? kill_litter_super+0x60/0x60 [ 1371.138924] ? ns_test_super+0x50/0x50 [ 1371.142841] ? ns_test_super+0x50/0x50 [ 1371.146754] ? kill_litter_super+0x60/0x60 [ 1371.151187] sget+0x10c/0x150 [ 1371.154317] mount_bdev+0xff/0x3c0 [ 1371.157882] ? hfsplus_iget+0x7b0/0x7b0 [ 1371.161879] hfsplus_mount+0x35/0x40 [ 1371.165619] mount_fs+0x106/0x3ff [ 1371.169109] ? emergency_thaw_all+0x1a0/0x1a0 [ 1371.173633] ? __init_waitqueue_head+0x36/0x90 [ 1371.178245] vfs_kern_mount.part.0+0x6f/0x410 [ 1371.182774] do_mount+0x581/0x2d30 [ 1371.186345] ? copy_mount_string+0x40/0x40 [ 1371.190608] ? kmem_cache_alloc_trace+0x354/0x760 [ 1371.195519] ? _copy_from_user+0xdd/0x150 [ 1371.199722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1371.205287] ? copy_mount_options+0x280/0x3a0 [ 1371.209816] ksys_mount+0xdb/0x150 [ 1371.213381] __x64_sys_mount+0xbe/0x150 [ 1371.217380] do_syscall_64+0x103/0x610 [ 1371.221302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.226522] RIP: 0033:0x45a99a [ 1371.229761] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1371.248677] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1371.256397] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a 14:31:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x12000000, [{0xc0010015}]}) [ 1371.263677] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1371.270961] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1371.278249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1371.285541] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1371.301146] XFS (loop3): Invalid superblock magic number [ 1371.312572] XFS (loop2): Invalid superblock magic number 14:31:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x150001c0, [{0xc0010015}]}) 14:31:26 executing program 0 (fault-call:0 fault-nth:57): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1371.481959] FAULT_INJECTION: forcing a failure. [ 1371.481959] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.516785] CPU: 0 PID: 16994 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1371.523734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.523742] Call Trace: [ 1371.523768] dump_stack+0x172/0x1f0 [ 1371.523801] should_fail.cold+0xa/0x15 [ 1371.543256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1371.548376] ? ___might_sleep+0x163/0x280 [ 1371.552558] __should_failslab+0x121/0x190 [ 1371.556804] should_failslab+0x9/0x14 [ 1371.560605] kmem_cache_alloc_trace+0x2d1/0x760 [ 1371.565279] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1371.570390] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1371.575331] __list_lru_init+0x3cf/0x6e0 [ 1371.579420] sget_userns+0x81e/0xd30 [ 1371.583138] ? kill_litter_super+0x60/0x60 [ 1371.587379] ? ns_test_super+0x50/0x50 [ 1371.591271] ? ns_test_super+0x50/0x50 [ 1371.595161] ? kill_litter_super+0x60/0x60 [ 1371.599395] sget+0x10c/0x150 [ 1371.602508] mount_bdev+0xff/0x3c0 [ 1371.606050] ? hfsplus_iget+0x7b0/0x7b0 [ 1371.610041] hfsplus_mount+0x35/0x40 [ 1371.613786] mount_fs+0x106/0x3ff [ 1371.617240] ? emergency_thaw_all+0x1a0/0x1a0 [ 1371.621739] ? __init_waitqueue_head+0x36/0x90 [ 1371.626333] vfs_kern_mount.part.0+0x6f/0x410 [ 1371.630836] do_mount+0x581/0x2d30 [ 1371.634385] ? copy_mount_string+0x40/0x40 [ 1371.638622] ? kmem_cache_alloc_trace+0x354/0x760 [ 1371.643470] ? _copy_from_user+0xdd/0x150 [ 1371.647628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1371.653173] ? copy_mount_options+0x280/0x3a0 [ 1371.657673] ksys_mount+0xdb/0x150 [ 1371.661231] __x64_sys_mount+0xbe/0x150 [ 1371.665213] do_syscall_64+0x103/0x610 [ 1371.669127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.674315] RIP: 0033:0x45a99a [ 1371.677514] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1371.696413] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1371.704140] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1371.711411] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1371.718679] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1371.725949] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1371.733216] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:27 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0xffffffffffffff06, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000040)) r1 = getpid() chdir(&(0x7f0000000040)='./file0\x00') sched_getscheduler(r1) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000100)={0x0, 0x5, 0x4, 0x7f, 0x100}) 14:31:27 executing program 3: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:27 executing program 0 (fault-call:0 fault-nth:58): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1372.098043] gfs2: not a GFS2 filesystem [ 1372.182244] FAULT_INJECTION: forcing a failure. [ 1372.182244] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.208566] CPU: 1 PID: 17003 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1372.215549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.224933] Call Trace: [ 1372.227546] dump_stack+0x172/0x1f0 [ 1372.231211] should_fail.cold+0xa/0x15 [ 1372.235128] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1372.240267] ? ___might_sleep+0x163/0x280 [ 1372.244446] __should_failslab+0x121/0x190 [ 1372.248712] should_failslab+0x9/0x14 [ 1372.252549] kmem_cache_alloc_trace+0x2d1/0x760 [ 1372.257259] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1372.262412] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1372.267371] __list_lru_init+0x3cf/0x6e0 [ 1372.271457] sget_userns+0x81e/0xd30 [ 1372.275378] ? kill_litter_super+0x60/0x60 [ 1372.279636] ? ns_test_super+0x50/0x50 [ 1372.283632] ? ns_test_super+0x50/0x50 [ 1372.287557] ? kill_litter_super+0x60/0x60 [ 1372.291819] sget+0x10c/0x150 [ 1372.294944] mount_bdev+0xff/0x3c0 [ 1372.298502] ? hfsplus_iget+0x7b0/0x7b0 [ 1372.302494] hfsplus_mount+0x35/0x40 [ 1372.306269] mount_fs+0x106/0x3ff [ 1372.309728] ? emergency_thaw_all+0x1a0/0x1a0 [ 1372.314232] ? __init_waitqueue_head+0x36/0x90 [ 1372.318838] vfs_kern_mount.part.0+0x6f/0x410 [ 1372.323355] do_mount+0x581/0x2d30 [ 1372.326918] ? copy_mount_string+0x40/0x40 [ 1372.331170] ? kmem_cache_alloc_trace+0x354/0x760 [ 1372.336035] ? _copy_from_user+0xdd/0x150 [ 1372.340206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1372.345761] ? copy_mount_options+0x280/0x3a0 [ 1372.350286] ksys_mount+0xdb/0x150 [ 1372.353851] __x64_sys_mount+0xbe/0x150 [ 1372.357857] do_syscall_64+0x103/0x610 [ 1372.361768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1372.366970] RIP: 0033:0x45a99a [ 1372.370175] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1372.389086] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1372.396808] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1372.404090] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1372.411409] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1372.418873] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1372.426150] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000002000000009000100"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:30 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x88242, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000000c0)=0x1, 0x4) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0x14) accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10, 0x800) 14:31:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x170101c0, [{0xc0010015}]}) 14:31:30 executing program 3 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:30 executing program 0 (fault-call:0 fault-nth:59): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='}/nodev+!\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000440)={0xa0, 0x19, 0x2, {0x440, {0x4, 0x2, 0x6}, 0x0, r2, r3, 0x8, 0x9, 0x2, 0xfffffffffffffffb, 0xffffffffffffff7d, 0x1000, 0x800, 0x4, 0x20, 0x7fff, 0x800000, 0x4, 0x5, 0x0, 0x8}}, 0xa0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x8002, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x181200, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rtc0\x00', 0x30000, 0x0) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000540)={0x3, r5}) [ 1374.617534] FAULT_INJECTION: forcing a failure. [ 1374.617534] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.625325] FAULT_INJECTION: forcing a failure. [ 1374.625325] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.658382] CPU: 0 PID: 17013 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1374.665342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.674730] Call Trace: [ 1374.674757] dump_stack+0x172/0x1f0 [ 1374.674809] should_fail.cold+0xa/0x15 [ 1374.684901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1374.690011] ? ___might_sleep+0x163/0x280 [ 1374.694165] __should_failslab+0x121/0x190 [ 1374.698424] should_failslab+0x9/0x14 [ 1374.702236] kmem_cache_alloc_trace+0x2d1/0x760 [ 1374.706932] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1374.712040] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1374.716977] __list_lru_init+0x3cf/0x6e0 [ 1374.721049] sget_userns+0x81e/0xd30 [ 1374.724765] ? kill_litter_super+0x60/0x60 [ 1374.729046] ? ns_test_super+0x50/0x50 [ 1374.732966] ? ns_test_super+0x50/0x50 [ 1374.736850] ? kill_litter_super+0x60/0x60 [ 1374.741103] sget+0x10c/0x150 [ 1374.744214] mount_bdev+0xff/0x3c0 [ 1374.747758] ? hfsplus_iget+0x7b0/0x7b0 [ 1374.751760] hfsplus_mount+0x35/0x40 [ 1374.755485] mount_fs+0x106/0x3ff [ 1374.758948] ? emergency_thaw_all+0x1a0/0x1a0 [ 1374.763444] ? __init_waitqueue_head+0x36/0x90 [ 1374.768036] vfs_kern_mount.part.0+0x6f/0x410 [ 1374.772540] do_mount+0x581/0x2d30 [ 1374.776120] ? copy_mount_string+0x40/0x40 [ 1374.780364] ? kmem_cache_alloc_trace+0x354/0x760 [ 1374.785217] ? _copy_from_user+0xdd/0x150 [ 1374.789370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.794908] ? copy_mount_options+0x280/0x3a0 [ 1374.799410] ksys_mount+0xdb/0x150 [ 1374.802965] __x64_sys_mount+0xbe/0x150 [ 1374.806946] do_syscall_64+0x103/0x610 [ 1374.810843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.816029] RIP: 0033:0x45a99a [ 1374.819228] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1374.838135] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1374.845841] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1374.853123] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1374.860389] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1374.867656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1374.874938] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1374.882531] protocol 88fb is buggy, dev hsr_slave_0 [ 1374.887601] protocol 88fb is buggy, dev hsr_slave_1 [ 1374.902888] CPU: 1 PID: 17016 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1374.909873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.919241] Call Trace: [ 1374.921855] dump_stack+0x172/0x1f0 [ 1374.925512] should_fail.cold+0xa/0x15 [ 1374.929425] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1374.934571] ? ___might_sleep+0x163/0x280 [ 1374.938760] __should_failslab+0x121/0x190 [ 1374.943058] should_failslab+0x9/0x14 [ 1374.946906] kmem_cache_alloc_node+0x264/0x710 [ 1374.951518] ? __lock_acquire+0x548/0x3fb0 [ 1374.955778] __alloc_skb+0xd5/0x5e0 [ 1374.959429] ? skb_trim+0x190/0x190 [ 1374.963111] ? __fget+0x340/0x540 [ 1374.966597] ? find_held_lock+0x35/0x130 [ 1374.970676] vhci_write+0xc4/0x470 [ 1374.974250] __vfs_write+0x613/0x8e0 [ 1374.978009] ? kernel_read+0x120/0x120 [ 1374.981922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1374.987507] ? rw_verify_area+0x118/0x360 [ 1374.991684] vfs_write+0x20c/0x580 [ 1374.995269] ksys_write+0xea/0x1f0 [ 1374.998880] ? __ia32_sys_read+0xb0/0xb0 [ 1375.002981] ? do_syscall_64+0x26/0x610 [ 1375.006977] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.012356] ? do_syscall_64+0x26/0x610 [ 1375.016347] __x64_sys_write+0x73/0xb0 [ 1375.020252] do_syscall_64+0x103/0x610 [ 1375.024160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.029354] RIP: 0033:0x457f29 [ 1375.032558] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1375.051484] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1375.059201] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1375.066492] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1375.073764] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1375.081044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1375.088336] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1375.095957] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.101096] protocol 88fb is buggy, dev hsr_slave_1 [ 1375.106235] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.111347] protocol 88fb is buggy, dev hsr_slave_1 [ 1375.149022] XFS (loop2): Invalid superblock magic number 14:31:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1b000000, [{0xc0010015}]}) 14:31:30 executing program 3 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1b0001c0, [{0xc0010015}]}) 14:31:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xee, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x2, 0x200000) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000300)={0x0, 0x102, "52668f38042acf62dc66bf38f916f950f907e1f0c521451ce1116e17ac8b94c2", 0x800, 0x5, 0x1ff, 0x200, 0x80000001, 0xfea, 0x0, 0x1, [0x4, 0x1, 0xfffffffffffff777, 0x8]}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x8001, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800880}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="08d3a4de", @ANYRES16=r1, @ANYBLOB="290429bd7000fedbdf25010000000000000002410000001400136574683a6970366772657461703000004ffed35a28916dc68d9932017f2ada70e4af9b79e247a00d98ee3a821993277d2ea62a0c2fa0b2045ae45ae9385e727c59"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x200000c0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@empty, @loopback}, &(0x7f0000000540)=0xc) chdir(&(0x7f00000004c0)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000580)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x67, 0xffffffff7fffffff, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @null, @bcast]}) recvmmsg(r0, &(0x7f0000000480)=[{{&(0x7f0000000400)=@nfc, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/42, 0x2a}], 0x1}, 0xa9}], 0x1, 0x40000000, &(0x7f0000000740)={0x77359400}) r2 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000000680)='cifs.idmap\x00', &(0x7f00000006c0)={'syz', 0x3}, &(0x7f0000000700)='!\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r2, r3) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = getpid() fcntl$setown(r0, 0x8, r4) [ 1375.575926] FAULT_INJECTION: forcing a failure. [ 1375.575926] name failslab, interval 1, probability 0, space 0, times 0 14:31:31 executing program 0 (fault-call:0 fault-nth:60): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1e010000, [{0xc0010015}]}) [ 1375.711945] FAULT_INJECTION: forcing a failure. [ 1375.711945] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.749453] CPU: 1 PID: 17154 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1375.756425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1375.765792] Call Trace: [ 1375.765819] dump_stack+0x172/0x1f0 [ 1375.765846] should_fail.cold+0xa/0x15 [ 1375.765869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1375.765889] ? ___might_sleep+0x163/0x280 [ 1375.785259] __should_failslab+0x121/0x190 [ 1375.789515] should_failslab+0x9/0x14 [ 1375.793342] kmem_cache_alloc_node_trace+0x270/0x720 [ 1375.798474] ? kmem_cache_alloc_trace+0x354/0x760 [ 1375.803342] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1375.808460] __kmalloc_node+0x3d/0x70 [ 1375.812289] kvmalloc_node+0x68/0x100 [ 1375.816099] __list_lru_init+0x4a6/0x6e0 [ 1375.820191] sget_userns+0x81e/0xd30 [ 1375.823913] ? kill_litter_super+0x60/0x60 [ 1375.828167] ? ns_test_super+0x50/0x50 [ 1375.832071] ? ns_test_super+0x50/0x50 [ 1375.835966] ? kill_litter_super+0x60/0x60 [ 1375.840252] sget+0x10c/0x150 [ 1375.843377] mount_bdev+0xff/0x3c0 [ 1375.846928] ? hfsplus_iget+0x7b0/0x7b0 [ 1375.850917] hfsplus_mount+0x35/0x40 [ 1375.854643] mount_fs+0x106/0x3ff [ 1375.858111] ? emergency_thaw_all+0x1a0/0x1a0 [ 1375.862628] ? __init_waitqueue_head+0x36/0x90 [ 1375.867230] vfs_kern_mount.part.0+0x6f/0x410 [ 1375.871793] do_mount+0x581/0x2d30 [ 1375.875356] ? copy_mount_string+0x40/0x40 [ 1375.879610] ? kmem_cache_alloc_trace+0x354/0x760 [ 1375.884471] ? _copy_from_user+0xdd/0x150 [ 1375.888638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1375.894196] ? copy_mount_options+0x280/0x3a0 [ 1375.898735] ksys_mount+0xdb/0x150 [ 1375.902290] __x64_sys_mount+0xbe/0x150 [ 1375.906284] do_syscall_64+0x103/0x610 [ 1375.910208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.915418] RIP: 0033:0x45a99a [ 1375.918620] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1375.937591] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1375.945306] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1375.952592] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1375.959875] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1375.967155] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1375.974430] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1376.078368] CPU: 0 PID: 17146 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1376.085353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.094712] Call Trace: [ 1376.097326] dump_stack+0x172/0x1f0 [ 1376.100986] should_fail.cold+0xa/0x15 [ 1376.104887] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1376.110031] ? ___might_sleep+0x163/0x280 [ 1376.114219] __should_failslab+0x121/0x190 [ 1376.118472] should_failslab+0x9/0x14 [ 1376.122282] kmem_cache_alloc_node_trace+0x270/0x720 [ 1376.127405] __kmalloc_node_track_caller+0x3d/0x70 [ 1376.132377] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1376.137061] __alloc_skb+0x10b/0x5e0 [ 1376.140842] ? skb_trim+0x190/0x190 [ 1376.144477] ? __fget+0x340/0x540 [ 1376.147943] ? find_held_lock+0x35/0x130 [ 1376.152021] vhci_write+0xc4/0x470 [ 1376.155577] __vfs_write+0x613/0x8e0 [ 1376.159290] ? kernel_read+0x120/0x120 [ 1376.163174] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1376.168744] ? rw_verify_area+0x118/0x360 [ 1376.172918] vfs_write+0x20c/0x580 [ 1376.176480] ksys_write+0xea/0x1f0 [ 1376.180048] ? __ia32_sys_read+0xb0/0xb0 [ 1376.184126] ? do_syscall_64+0x26/0x610 [ 1376.188118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.193489] ? do_syscall_64+0x26/0x610 [ 1376.197480] __x64_sys_write+0x73/0xb0 [ 1376.201378] do_syscall_64+0x103/0x610 [ 1376.205288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.210481] RIP: 0033:0x457f29 [ 1376.213681] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1376.232585] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1376.240300] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1376.247572] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1376.254849] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1376.262192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1376.269466] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:31:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000002000000009000100"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0xfffffffffffffe7a, 0x0, 0xfffffffffffffffe, 0x0) 14:31:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1f0001c0, [{0xc0010015}]}) 14:31:34 executing program 0 (fault-call:0 fault-nth:61): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:34 executing program 3 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:34 executing program 4: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00000000c0)=0x2, 0x4) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfffffffffffffff9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000240)={r2, 0x80000000, 0x7, 0x3ff}, &(0x7f0000000280)=0x10) [ 1378.911164] FAULT_INJECTION: forcing a failure. [ 1378.911164] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.939522] FAULT_INJECTION: forcing a failure. [ 1378.939522] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.943599] CPU: 0 PID: 17161 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1378.957727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.957735] Call Trace: [ 1378.957757] dump_stack+0x172/0x1f0 [ 1378.957780] should_fail.cold+0xa/0x15 [ 1378.957798] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1378.982354] ? ___might_sleep+0x163/0x280 [ 1378.986519] __should_failslab+0x121/0x190 [ 1378.990771] should_failslab+0x9/0x14 [ 1378.994588] kmem_cache_alloc_trace+0x2d1/0x760 [ 1378.999263] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1379.004376] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1379.009312] __list_lru_init+0x3cf/0x6e0 [ 1379.013381] sget_userns+0x81e/0xd30 [ 1379.017101] ? kill_litter_super+0x60/0x60 [ 1379.021342] ? ns_test_super+0x50/0x50 [ 1379.025242] ? ns_test_super+0x50/0x50 [ 1379.029125] ? kill_litter_super+0x60/0x60 [ 1379.033360] sget+0x10c/0x150 [ 1379.036471] mount_bdev+0xff/0x3c0 [ 1379.040014] ? hfsplus_iget+0x7b0/0x7b0 [ 1379.043992] hfsplus_mount+0x35/0x40 [ 1379.047705] mount_fs+0x106/0x3ff [ 1379.051161] ? emergency_thaw_all+0x1a0/0x1a0 [ 1379.055675] ? __init_waitqueue_head+0x36/0x90 [ 1379.060266] vfs_kern_mount.part.0+0x6f/0x410 [ 1379.064770] do_mount+0x581/0x2d30 [ 1379.068320] ? copy_mount_string+0x40/0x40 [ 1379.072568] ? kmem_cache_alloc_trace+0x354/0x760 [ 1379.077434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.082970] ? copy_mount_options+0x280/0x3a0 [ 1379.087468] ksys_mount+0xdb/0x150 [ 1379.091031] __x64_sys_mount+0xbe/0x150 [ 1379.095019] do_syscall_64+0x103/0x610 [ 1379.098914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.104106] RIP: 0033:0x45a99a [ 1379.107299] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1379.126195] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1379.133900] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1379.141170] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1379.148437] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 14:31:34 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0xfb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x5, &(0x7f00000000c0)=""/49, 0x31) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)}, 0xc000) accept(r2, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x80000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000500), 0xffffffffffffffff) request_key(0x0, &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0xf48a}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x3}, 0x10) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x2) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1379.155703] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1379.162970] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 [ 1379.178439] CPU: 0 PID: 17169 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1379.185397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.194753] Call Trace: [ 1379.197351] dump_stack+0x172/0x1f0 [ 1379.200995] should_fail.cold+0xa/0x15 [ 1379.204894] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1379.210015] ? ___might_sleep+0x163/0x280 [ 1379.214188] __should_failslab+0x121/0x190 [ 1379.218446] should_failslab+0x9/0x14 [ 1379.222258] kmem_cache_alloc_node+0x264/0x710 [ 1379.226862] __alloc_skb+0xd5/0x5e0 [ 1379.230495] ? skb_trim+0x190/0x190 [ 1379.230511] ? vhci_write+0x2b3/0x470 [ 1379.230529] ? rcu_read_lock_sched_held+0x110/0x130 [ 1379.230558] ? kmem_cache_free+0x225/0x260 [ 1379.230577] __vhci_create_device+0x88/0x5a0 [ 1379.230593] vhci_write+0x2d0/0x470 [ 1379.230612] __vfs_write+0x613/0x8e0 [ 1379.238042] ? kernel_read+0x120/0x120 [ 1379.238059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1379.238109] ? rw_verify_area+0x118/0x360 [ 1379.238127] vfs_write+0x20c/0x580 [ 1379.276276] ksys_write+0xea/0x1f0 [ 1379.279844] ? __ia32_sys_read+0xb0/0xb0 [ 1379.283921] ? do_syscall_64+0x26/0x610 [ 1379.287901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.293268] ? do_syscall_64+0x26/0x610 [ 1379.297249] __x64_sys_write+0x73/0xb0 [ 1379.301141] do_syscall_64+0x103/0x610 [ 1379.305032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.310650] RIP: 0033:0x457f29 [ 1379.313865] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1379.332775] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1379.340493] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1379.347756] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1379.355053] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1379.362329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1379.369623] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:31:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x200001c0, [{0xc0010015}]}) 14:31:35 executing program 0 (fault-call:0 fault-nth:62): syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1379.685775] XFS (loop2): Invalid superblock magic number 14:31:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x221001c0, [{0xc0010015}]}) 14:31:35 executing program 3 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x2a1001c0, [{0xc0010015}]}) [ 1379.907360] FAULT_INJECTION: forcing a failure. [ 1379.907360] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.947834] CPU: 1 PID: 17303 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1379.954795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.964158] Call Trace: [ 1379.966773] dump_stack+0x172/0x1f0 [ 1379.970430] should_fail.cold+0xa/0x15 [ 1379.974344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1379.979478] ? ___might_sleep+0x163/0x280 [ 1379.983656] __should_failslab+0x121/0x190 [ 1379.987923] should_failslab+0x9/0x14 [ 1379.991757] kmem_cache_alloc_node_trace+0x270/0x720 [ 1379.996898] __kmalloc_node_track_caller+0x3d/0x70 [ 1380.001852] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1380.006557] __alloc_skb+0x10b/0x5e0 [ 1380.010344] ? skb_trim+0x190/0x190 [ 1380.014012] ? vhci_write+0x2b3/0x470 [ 1380.017851] ? rcu_read_lock_sched_held+0x110/0x130 [ 1380.022891] ? kmem_cache_free+0x225/0x260 [ 1380.027187] __vhci_create_device+0x88/0x5a0 [ 1380.031669] vhci_write+0x2d0/0x470 [ 1380.035344] __vfs_write+0x613/0x8e0 [ 1380.039092] ? kernel_read+0x120/0x120 [ 1380.043002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1380.048573] ? rw_verify_area+0x118/0x360 [ 1380.052768] vfs_write+0x20c/0x580 [ 1380.056338] ksys_write+0xea/0x1f0 [ 1380.059908] ? __ia32_sys_read+0xb0/0xb0 [ 1380.064016] ? do_syscall_64+0x26/0x610 [ 1380.068009] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.073387] ? do_syscall_64+0x26/0x610 [ 1380.077388] __x64_sys_write+0x73/0xb0 [ 1380.081306] do_syscall_64+0x103/0x610 [ 1380.085228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.090438] RIP: 0033:0x457f29 [ 1380.093651] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1380.112568] RSP: 002b:00007fab7f235c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1380.120319] RAX: ffffffffffffffda RBX: 00007fab7f235c90 RCX: 0000000000457f29 [ 1380.127607] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000003 [ 1380.134893] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1380.142174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2366d4 [ 1380.149457] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000004 [ 1380.175035] FAULT_INJECTION: forcing a failure. [ 1380.175035] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.210114] CPU: 0 PID: 17298 Comm: syz-executor.0 Not tainted 5.0.0+ #10 [ 1380.217103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1380.217122] Call Trace: [ 1380.217146] dump_stack+0x172/0x1f0 [ 1380.217173] should_fail.cold+0xa/0x15 [ 1380.217195] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1380.241777] ? ___might_sleep+0x163/0x280 [ 1380.241799] __should_failslab+0x121/0x190 [ 1380.241822] should_failslab+0x9/0x14 [ 1380.241839] kmem_cache_alloc_node_trace+0x270/0x720 [ 1380.241860] ? kmem_cache_alloc_trace+0x354/0x760 [ 1380.263967] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1380.269095] __kmalloc_node+0x3d/0x70 [ 1380.272903] kvmalloc_node+0x68/0x100 [ 1380.276729] __list_lru_init+0x4a6/0x6e0 [ 1380.280807] sget_userns+0x81e/0xd30 [ 1380.284532] ? kill_litter_super+0x60/0x60 [ 1380.288777] ? ns_test_super+0x50/0x50 [ 1380.292691] ? ns_test_super+0x50/0x50 [ 1380.296607] ? kill_litter_super+0x60/0x60 [ 1380.300839] sget+0x10c/0x150 [ 1380.303966] mount_bdev+0xff/0x3c0 [ 1380.307520] ? hfsplus_iget+0x7b0/0x7b0 [ 1380.311977] hfsplus_mount+0x35/0x40 [ 1380.315742] mount_fs+0x106/0x3ff [ 1380.319206] ? emergency_thaw_all+0x1a0/0x1a0 [ 1380.323705] ? __init_waitqueue_head+0x36/0x90 [ 1380.328297] vfs_kern_mount.part.0+0x6f/0x410 [ 1380.332816] do_mount+0x581/0x2d30 [ 1380.336369] ? copy_mount_string+0x40/0x40 [ 1380.340626] ? kmem_cache_alloc_trace+0x354/0x760 [ 1380.345479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1380.351021] ? copy_mount_options+0x280/0x3a0 [ 1380.355518] ksys_mount+0xdb/0x150 [ 1380.359082] __x64_sys_mount+0xbe/0x150 [ 1380.363100] do_syscall_64+0x103/0x610 [ 1380.366995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.372180] RIP: 0033:0x45a99a [ 1380.375373] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1380.394268] RSP: 002b:00007fa366e39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1380.401977] RAX: ffffffffffffffda RBX: 00007fa366e39b30 RCX: 000000000045a99a [ 1380.409257] RDX: 00007fa366e39ad0 RSI: 00000000200001c0 RDI: 00007fa366e39af0 [ 1380.416546] RBP: 00000000200001c0 R08: 00007fa366e39b30 R09: 00007fa366e39ad0 [ 1380.423813] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1380.431092] R13: 0000000000000000 R14: 00000000004dbdd8 R15: 0000000000000003 14:31:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000"], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:38 executing program 3 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x2c1001c0, [{0xc0010015}]}) 14:31:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x101002, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x40) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x100) recvfrom$inet(r1, &(0x7f00000000c0)=""/130, 0x82, 0x0, &(0x7f0000000180)={0x2, 0x4e22, @local}, 0x10) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000240)={0x6ecf77147b1016d7, 0x3}) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f00000001c0)={@default, @null, 0x2, 0x76}) 14:31:38 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:38 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xa000, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team_slave_0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'bond_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000300)={'teql0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000006c0)={@loopback, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000a80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000440)=ANY=[@ANYBLOB="58010000", @ANYRES16=r3, @ANYBLOB="20002abd7000ffdbdf250000000008000100", @ANYRES32=r4, @ANYBLOB="f80002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="40000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004007808000008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="08c556f597c1ed8ae9ab85db54757dbd", @ANYRES32=r8, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040001000000"], 0x158}, 0x1, 0x0, 0x0, 0x4000}, 0x44000) [ 1383.459972] hfsplus: unable to find HFS+ superblock [ 1383.478798] FAULT_INJECTION: forcing a failure. [ 1383.478798] name failslab, interval 1, probability 0, space 0, times 0 14:31:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x34000000, [{0xc0010015}]}) [ 1383.507787] CPU: 0 PID: 17321 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1383.514732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.524117] Call Trace: [ 1383.526720] dump_stack+0x172/0x1f0 [ 1383.530366] should_fail.cold+0xa/0x15 [ 1383.534276] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1383.539398] ? ___might_sleep+0x163/0x280 [ 1383.543571] __should_failslab+0x121/0x190 [ 1383.547842] should_failslab+0x9/0x14 [ 1383.551680] kmem_cache_alloc_trace+0x2d1/0x760 [ 1383.556361] ? skb_trim+0x190/0x190 [ 1383.559994] ? vhci_write+0x2b3/0x470 [ 1383.563806] ? rcu_read_lock_sched_held+0x110/0x130 [ 1383.568836] hci_alloc_dev+0x43/0x1d00 [ 1383.572734] __vhci_create_device+0x101/0x5a0 [ 1383.577253] vhci_write+0x2d0/0x470 [ 1383.580895] __vfs_write+0x613/0x8e0 [ 1383.584623] ? kernel_read+0x120/0x120 [ 1383.588517] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1383.594103] ? rw_verify_area+0x118/0x360 [ 1383.598267] vfs_write+0x20c/0x580 [ 1383.601823] ksys_write+0xea/0x1f0 [ 1383.605376] ? __ia32_sys_read+0xb0/0xb0 [ 1383.609465] ? do_syscall_64+0x26/0x610 [ 1383.613461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1383.618899] ? do_syscall_64+0x26/0x610 [ 1383.622890] __x64_sys_write+0x73/0xb0 [ 1383.626798] do_syscall_64+0x103/0x610 [ 1383.630708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1383.635900] RIP: 0033:0x457f29 [ 1383.639128] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:31:39 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f00000000c0)=0x101) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:39 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xfffffffffffffffe, 0x5) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f456146000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc0003000000000085000000b3d48e65641c6cf18c4a4700000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000440)=""/209, 0x100000, 0x800, 0x96b}, 0x18) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000540)={r2, 0x8000, 0x500000000000000, "fd160998cbc40887d6a76633cc3c5798f5ddae2b9dbd4229085a251efe0e57e07a8f605d04ddafa43df96b7c9f7cc10bcedec917750d5ffa66e07bfd0a1e50256e74d3e76d548a8f2abf657a0cbcabb3621f3cd539961aec4c537a9e7ad3c7cb97face84f07663860b5f268952aa9f34cd65676895d47162cc581231e2de4502eca932583744cf3c28cf509ebf6b980a8428a6921a81754971ed"}) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e24, 0x7f, @rand_addr="c870b80bb95fc27ab11172eed20033ef", 0x5}}, 0x0, 0x10000, 0x0, "61aa519a25ef7777b1b19de009d9a3fb8fb50858243d43a43b81f50e6a2a92f7df04cc65ae75de3d9ae570c26b978bf7b030833c88bfd962dcbc2fb148e996cf15326faaec8d2ae59993e356ef2aa0c6"}, 0xd8) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20000, 0x0) [ 1383.658067] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1383.665789] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1383.673100] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1383.680389] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1383.687667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1383.694962] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:31:39 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='\nfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, &(0x7f0000000100), 0x800, &(0x7f0000000300)={[{@noload='noload'}], [{@dont_hash='dont_hash'}, {@appraise='appraise'}, {@obj_role={'obj_role', 0x3d, '}'}}, {@hash='hash'}, {@obj_user={'obj_user', 0x3d, 'xfs\x00'}}, {@euid_lt={'euid<', r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'resgid'}}, {@hash='hash'}]}) 14:31:39 executing program 3 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1383.939121] FAULT_INJECTION: forcing a failure. [ 1383.939121] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1383.950979] CPU: 1 PID: 17351 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1383.957925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.967296] Call Trace: [ 1383.969917] dump_stack+0x172/0x1f0 [ 1383.973571] should_fail.cold+0xa/0x15 [ 1383.977503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1383.982640] ? __lock_acquire+0x548/0x3fb0 [ 1383.986932] should_fail_alloc_page+0x50/0x60 [ 1383.991469] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1383.996177] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1384.001214] ? find_held_lock+0x35/0x130 [ 1384.005311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1384.010449] cache_grow_begin+0x9c/0x860 [ 1384.014570] ? hci_alloc_dev+0x43/0x1d00 [ 1384.018660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1384.024220] kmem_cache_alloc_trace+0x67f/0x760 [ 1384.028928] hci_alloc_dev+0x43/0x1d00 [ 1384.032849] __vhci_create_device+0x101/0x5a0 [ 1384.037394] vhci_write+0x2d0/0x470 [ 1384.041043] __vfs_write+0x613/0x8e0 [ 1384.044786] ? kernel_read+0x120/0x120 [ 1384.048697] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1384.054274] ? rw_verify_area+0x118/0x360 [ 1384.058441] vfs_write+0x20c/0x580 [ 1384.062007] ksys_write+0xea/0x1f0 [ 1384.065572] ? __ia32_sys_read+0xb0/0xb0 [ 1384.069692] ? do_syscall_64+0x26/0x610 [ 1384.073693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.079071] ? do_syscall_64+0x26/0x610 [ 1384.083079] __x64_sys_write+0x73/0xb0 [ 1384.086991] do_syscall_64+0x103/0x610 [ 1384.090899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.096113] RIP: 0033:0x457f29 [ 1384.099345] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1384.118259] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1384.125984] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1384.133271] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1384.140556] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1384.147842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1384.155124] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:31:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000"], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffff9, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000100)="9c98a25f710c43eacaaff7f7573786ba89cc599075f61c8a4de93741a377f5e5987b10b84961fb9e1bc219846ee5bfaae49ad2ea111d88a6b1c2285c59d33e7d2eff21d9ef73b048cdca5e3107ce4e88950ae38f3a891d2062ae3fb620e5f36197efb50d6dc636324ccdf371bb4360212b7a6f14ad6c3aaeb5bd7566d8ee80de83ce4d6eb58ae283c7869d61c160d46b03eef814787cc40c9adea1e5ab99c9addaed8b276eb022a9eaddf8cbb38720ee75a041ddc8bd9fc5e6d037765085d393b7343fb852", 0xc5, 0x2}, {&(0x7f0000000200)="9fd59ee00adf40d82890be64f0f19fb6e56857b9670ae024241b3f2b63826ffb291829ec88ce11c3cfc3917292f018bbf4f5430be501bf11a73fc6d73728b5aa0f54b21e6ecafd70882c9f859d2e3eb4f7703ae2e8e155d44099b3d934036da5a3311bde5ca980e1ea624e9c0d803f43450ac541f20e39d2fac12daf619aa6b814ad605e864223e059b9666dcf0272f8b344b9ab49111e55ded1068552fffd1cb4019662c6fcec115bc9e56da217407d54a1442eba6644cc91a895b8b09b639fe172281bb69f4634f0af272f17d92de712c274e3d7958a0cab570745b56e00e6d9be77479b5c0a6d82340e28d11da01bc2fe3863", 0xf4, 0x7fff}, {&(0x7f0000000300)="4a37231ee357fd0389fc219941596747940d8a26c9ddd0bed8b09dd1324a31b9b9188c", 0x23, 0x100000000}, {&(0x7f0000000340)="16a417946e017e7c94cfca36acf655ee773b79f312046e0079e8274ccaf98df4f9779a26f9c70c1e15efaeafab79aae74c10f83619918d778a5a161ce1fa4173b9f8da63d5434d711d3d909da6b52420ead6dcc467f25ec969d41d466d754f758fef19bbb1bca3de4673fdf628a194ed9da3311cc6f9ca2f", 0x78, 0x80000001}, {&(0x7f00000003c0)="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", 0xfa, 0x1ff}], 0x80000, &(0x7f0000000540)={[{@acl='acl'}, {@noinode_cache='noinode_cache'}, {@discard='discard'}], [{@audit='audit'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000780)=0x4) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000005c0)) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f00000006c0)=0x2) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000005c0)=ANY=[]) 14:31:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x3a000000, [{0xc0010015}]}) 14:31:41 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) r2 = dup(r0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:41 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='%fsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:42 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) getpeername$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x10) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0xffffffffffffff3a, 0x0, 0x0, 0x0) 14:31:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x3b000000, [{0xc0010015}]}) 14:31:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x10, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$describe(0x6, r0, &(0x7f0000000280)=""/4096, 0x1000) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000001300)={0x3, 0x4}) bind$unix(r1, &(0x7f0000001280)=@file={0x1, './file0/file0\x00'}, 0x6e) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000000c0)={@local}, &(0x7f0000000100)=0x14) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) 14:31:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='h\nsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x40000000, [{0xc0010015}]}) 14:31:42 executing program 2: remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000005, 0x3f, 0x10000) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:49 executing program 3 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10002, 0x0) r1 = getuid() r2 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) setresuid(r1, r2, r3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r4 = syz_open_dev$swradio(&(0x7f00000054c0)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000005500)=0xfffffffffffffff7, 0x4) 14:31:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4000009f, [{0xc0010015}]}) 14:31:49 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='h%splus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:49 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x400) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000000c0)={0x20, 0x32377f5f, 0x3ff, 0x0, 0x2, @stepwise={{0x7fffffff, 0x7}, {0x8, 0x8001}, {0x1, 0x80}}}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x20000001008fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000"], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) r0 = semget(0x1, 0x1, 0x80) geteuid() semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f00000000c0)=""/103) [ 1394.605883] FAULT_INJECTION: forcing a failure. [ 1394.605883] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.656057] CPU: 0 PID: 17421 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1394.663050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.672426] Call Trace: [ 1394.675030] dump_stack+0x172/0x1f0 [ 1394.678679] should_fail.cold+0xa/0x15 [ 1394.682593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1394.687746] ? ___might_sleep+0x163/0x280 [ 1394.691910] __should_failslab+0x121/0x190 [ 1394.696170] should_failslab+0x9/0x14 [ 1394.699984] kmem_cache_alloc_trace+0x2d1/0x760 [ 1394.704678] ? rcu_read_lock_sched_held+0x110/0x130 [ 1394.709703] ? __kmalloc+0x5d5/0x740 [ 1394.713436] alloc_workqueue_attrs+0x82/0x120 [ 1394.717946] alloc_workqueue+0x166/0xe70 [ 1394.722024] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1394.727047] ? scnprintf+0x140/0x140 [ 1394.730809] ? __init_waitqueue_head+0x36/0x90 [ 1394.735411] hci_register_dev+0x1b8/0x860 [ 1394.739565] ? hci_init_sysfs+0x7c/0xa0 [ 1394.743557] __vhci_create_device+0x2d0/0x5a0 [ 1394.748064] vhci_write+0x2d0/0x470 [ 1394.751711] __vfs_write+0x613/0x8e0 [ 1394.755438] ? kernel_read+0x120/0x120 [ 1394.759338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1394.764903] ? rw_verify_area+0x118/0x360 [ 1394.769064] vfs_write+0x20c/0x580 [ 1394.772629] ksys_write+0xea/0x1f0 [ 1394.776183] ? __ia32_sys_read+0xb0/0xb0 [ 1394.780257] ? do_syscall_64+0x26/0x610 [ 1394.784241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1394.789616] ? do_syscall_64+0x26/0x610 [ 1394.793606] __x64_sys_write+0x73/0xb0 [ 1394.797519] do_syscall_64+0x103/0x610 [ 1394.801420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1394.806617] RIP: 0033:0x457f29 [ 1394.809820] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1394.828726] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1394.836438] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1394.843712] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 14:31:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x400000b0, [{0xc0010015}]}) [ 1394.850982] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1394.858273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1394.865565] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1394.888384] Bluetooth: Can't register HCI device 14:31:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x141001, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 14:31:50 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='h.splus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:50 executing program 3 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:31:50 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@initdev, 0x0}, &(0x7f0000000100)=0x14) socket$pppoe(0x18, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', r1}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x14, 0x0) r2 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) mount$9p_virtio(&(0x7f0000000180)='(', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='9p\x00', 0x20, &(0x7f0000000400)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r2}}, {@afid={'afid', 0x3d, 0x2}}, {@cache_loose='cache=loose'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, 'xfs\x00'}}, {@euid_gt={'euid>'}}, {@hash='hash'}, {@pcr={'pcr', 0x3d, 0xc}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'vcan0\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'xfs\x00'}}]}}) 14:31:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x400000b7, [{0xc0010015}]}) 14:31:50 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x29, 0x200400) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000200)=@buf={0x18, &(0x7f00000001c0)="e9d1235fef022f78343795df7644b71d9738c708d6ba9c25"}) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80000) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast1, @loopback, @remote, 0x8, 0x81, 0x400, 0x500, 0x80, 0x100, r1}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:50 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='h/splus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) epoll_wait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x3) [ 1395.395765] FAULT_INJECTION: forcing a failure. [ 1395.395765] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.418372] CPU: 1 PID: 17460 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1395.425607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.434981] Call Trace: [ 1395.437612] dump_stack+0x172/0x1f0 [ 1395.441273] should_fail.cold+0xa/0x15 [ 1395.445189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1395.450325] ? ___might_sleep+0x163/0x280 [ 1395.454511] __should_failslab+0x121/0x190 [ 1395.458785] should_failslab+0x9/0x14 [ 1395.462623] __kmalloc_track_caller+0x2d8/0x740 [ 1395.467311] ? pointer+0x910/0x910 [ 1395.470863] ? set_precision+0x180/0x180 [ 1395.474946] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1395.479901] ? kasprintf+0xbb/0xf0 [ 1395.483461] kvasprintf+0xc8/0x170 [ 1395.487019] ? bust_spinlocks+0xe0/0xe0 [ 1395.491042] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1395.496101] ? find_next_bit+0x107/0x130 [ 1395.500189] kasprintf+0xbb/0xf0 [ 1395.503590] ? kvasprintf_const+0x190/0x190 [ 1395.507946] ? kasan_check_read+0x11/0x20 [ 1395.512127] alloc_workqueue+0x442/0xe70 [ 1395.516224] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1395.521273] ? __init_waitqueue_head+0x36/0x90 [ 1395.525883] hci_register_dev+0x1b8/0x860 [ 1395.530052] ? hci_init_sysfs+0x7c/0xa0 [ 1395.534061] __vhci_create_device+0x2d0/0x5a0 [ 1395.538598] vhci_write+0x2d0/0x470 [ 1395.542253] __vfs_write+0x613/0x8e0 [ 1395.546000] ? kernel_read+0x120/0x120 [ 1395.549904] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1395.555492] ? rw_verify_area+0x118/0x360 [ 1395.559669] vfs_write+0x20c/0x580 [ 1395.563239] ksys_write+0xea/0x1f0 [ 1395.566809] ? __ia32_sys_read+0xb0/0xb0 [ 1395.570900] ? do_syscall_64+0x26/0x610 [ 1395.574895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1395.580275] ? do_syscall_64+0x26/0x610 [ 1395.584272] __x64_sys_write+0x73/0xb0 [ 1395.588192] do_syscall_64+0x103/0x610 [ 1395.592114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1395.597317] RIP: 0033:0x457f29 [ 1395.600530] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1395.619476] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1395.627218] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1395.634507] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1395.641797] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1395.649097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1395.656392] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:31:53 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000002000000009392f0c0f003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000a73000/0x3000)=nil, &(0x7f0000f5b000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000eb9000/0x1000)=nil, &(0x7f0000cb3000/0x4000)=nil, &(0x7f0000fa0000/0x4000)=nil, &(0x7f0000ba2000/0x2000)=nil, &(0x7f00000002c0)="01db6cf925eaac290184633f6b1469c4ae18da269033ba1e76614357d660d282064714579e139e2fa0740dfd20902e49a5ef26ad6461db2a0ad9b84c5ac6ab5c6b30a8b8c486f8c57346c2af750261f92bc9f34b46d7f1e68a9d036c4191887dc7bae102f69ccfd807f18d", 0x6b, r0}, 0x68) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000340)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x7a, "d848aca6dd369df0a4f34be5130ab58ef2a726bd15f4ca3a9eb286ddd89dc1802677fdb31801217a62cdcbda339c8e08901e80a281e70134f025c12e85589ff451fcd7bd1439a1aee2c556a2b7c6180e7876516947a257a48c6f4749a4dc0e92ea4dada5a38c6f57a370ce27bd848c916d182f261b550dc312dc"}, &(0x7f00000000c0)=0x82) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x4, 0x7}, 0xc) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc00030000000000850000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:31:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x40000100, [{0xc0010015}]}) 14:31:53 executing program 2: r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x800) getsockname(r0, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000180)=0x80) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:53 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf\nplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:53 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000200)={r1, &(0x7f0000000100)=""/236}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000380)={0x3, @null, r2}) 14:32:01 executing program 3 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x40000108, [{0xc0010015}]}) 14:32:01 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf#plus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x800, &(0x7f0000000000)=0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = eventfd2(0xffff, 0x1) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x3ff, r1, &(0x7f00000000c0)="94b667d5a77d4c55e3458f6e193104962fb4f0e2ac6befbad97e42642f89089db6720e60c27ca2dbf00659df16e272c018715d916d59eccb5932542ae5b5f544c3f526ecb7d48f1051498066a04c53eb8480828e708a5833286a036247ef857b9434638c44a6c64695920ab600b269c37f9dc8f4cb5418c7345f7cfc73e74265941aa11b75d4a926c9580218d683dc5fba813d09769850f1db775842f03976ad4f6a495befe7cab6bfdb6565e084277f03c1abe4a74484", 0xb7, 0x8, 0x0, 0x3, r2}, &(0x7f00000001c0)) 14:32:01 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 14:32:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc00030000000000850000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1406.102885] FAULT_INJECTION: forcing a failure. [ 1406.102885] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.168519] CPU: 0 PID: 17511 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1406.175901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.185259] Call Trace: [ 1406.187859] dump_stack+0x172/0x1f0 [ 1406.191497] should_fail.cold+0xa/0x15 [ 1406.195397] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1406.200507] ? ___might_sleep+0x163/0x280 [ 1406.204660] __should_failslab+0x121/0x190 [ 1406.208901] should_failslab+0x9/0x14 [ 1406.212704] __kmalloc+0x2dc/0x740 [ 1406.216255] ? apply_wqattrs_prepare+0xae/0x970 [ 1406.220929] apply_wqattrs_prepare+0xae/0x970 [ 1406.225436] apply_workqueue_attrs_locked+0xcb/0x140 [ 1406.230545] apply_workqueue_attrs+0x31/0x50 [ 1406.234955] alloc_workqueue+0x84c/0xe70 [ 1406.239027] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1406.244051] ? __init_waitqueue_head+0x36/0x90 [ 1406.248653] hci_register_dev+0x1b8/0x860 [ 1406.252802] ? hci_init_sysfs+0x7c/0xa0 [ 1406.256782] __vhci_create_device+0x2d0/0x5a0 [ 1406.261282] vhci_write+0x2d0/0x470 [ 1406.264920] __vfs_write+0x613/0x8e0 [ 1406.268647] ? kernel_read+0x120/0x120 [ 1406.272537] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1406.278107] ? rw_verify_area+0x118/0x360 [ 1406.282267] vfs_write+0x20c/0x580 [ 1406.285814] ksys_write+0xea/0x1f0 [ 1406.289379] ? __ia32_sys_read+0xb0/0xb0 [ 1406.293451] ? do_syscall_64+0x26/0x610 [ 1406.297428] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.302794] ? do_syscall_64+0x26/0x610 [ 1406.306774] __x64_sys_write+0x73/0xb0 [ 1406.310665] do_syscall_64+0x103/0x610 [ 1406.314556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.319744] RIP: 0033:0x457f29 [ 1406.322941] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1406.341839] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1406.349545] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1406.356811] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1406.364092] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1406.371364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1406.378632] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffe88, 0x0, 0x8000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100), 0x0, 0x7}], 0x1000, 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x5, &(0x7f0000000440)=[{&(0x7f0000000240)="782c2b999f2af29d2148f62c0e78349c24d9ef2ab8f609f8ae37f4c0d4798dfed3eb93673ba4823bcce860170645efdf68d1b5eda4895ae08312b403e7de7d7bf1a420b55abca86edc14582f3c05ff3041a7fa2d32a1e123f6cb8ee812ddc82470e1f6e66c9a0960f0d2ad864daf813758adc8b60772d36a0f2cd687532053ac90d7d0b0bb646c028123f7be8553e4162c447254b1abf51b5e4c876e7815ad132c9231794662ab91ad46a3ae87a2154707beecb0d2c2183a117c2d00354cae1034bbb311a31e19885568e6d92ed7c862b6c5bde1405d3c4e5508490ad308", 0xde, 0xf000000000000000}, {&(0x7f0000000180)="8051f186f955a71ec0ca23ae0472101b19aacba8761fdcae2d88240418145773b41f6e7134e794151a892803588dee", 0x2f, 0x401}, {&(0x7f0000000340)="63c985dcba2cb53f9a46b38a525a529df2334afbf10b58e34a35b5fb4bd45df99ad54c1d58793c8dee016edc6620e2aa7bacbd6ccdca083059b63320435fde47231abb46a4fe729050b85a424531f30926d63baa62c1f618c562bdd89730e7d8", 0x60, 0x4d}, {&(0x7f00000001c0), 0x0, 0x20}, {&(0x7f00000003c0)="4b44efc8f84628e93e53175d9a16deae36d44e73eae6b3644ea3d891a98614d5960d6103c60681efca78e0a42d1e8b9b4c6a53ff22b1a9cc1edbada5f1006d3261600e6775783d339d98093c2d433aed3ce5020921f5998c0ffda445a4", 0x5d, 0xda}], 0x300030, 0x0) 14:32:01 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf%plus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:01 executing program 2: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+'}, 0x28, 0x1) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000001c0)='syz0\x00') syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x40010000, [{0xc0010015}]}) 14:32:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000200)={0x2, 0x0, 0x3, 0x80, 0xac1a, 0x5}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x80, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000140)=0x7) r2 = socket$inet(0x2, 0x1, 0x7fff) memfd_create(&(0x7f00000000c0)='xfs\x00', 0x2) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000300)={r3, 0x2}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$int_out(r2, 0x5460, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x10000, 0xb8, 0x6, 0x81, 0x66, 0xb963}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) [ 1406.674473] Bluetooth: Can't register HCI device 14:32:02 executing program 3 (fault-call:3 fault-nth:9): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:02 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf*plus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1406.792151] FAULT_INJECTION: forcing a failure. [ 1406.792151] name failslab, interval 1, probability 0, space 0, times 0 14:32:02 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{0x1, 0x4, 0x81, 0xb80}, 'syz1\x00', 0x46}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1406.858372] CPU: 1 PID: 17646 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1406.865350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.874728] Call Trace: [ 1406.877337] dump_stack+0x172/0x1f0 [ 1406.880993] should_fail.cold+0xa/0x15 [ 1406.884913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1406.890050] ? ___might_sleep+0x163/0x280 [ 1406.894274] __should_failslab+0x121/0x190 [ 1406.898554] should_failslab+0x9/0x14 [ 1406.902395] kmem_cache_alloc_trace+0x2d1/0x760 14:32:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x35, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="3fe880bb2a8dde05dd47f0389b", 0xd, 0x3575}], 0x41002, &(0x7f0000000240)={[{@inode32='inode32'}, {@noikeep='noikeep'}, {@attr2='attr2'}, {@quota='quota'}, {@attr2='attr2'}, {@logdev={'logdev', 0x3d, './file0'}}, {@uquota='uquota'}, {@grpid='grpid'}, {@discard='discard'}], [{@obj_user={'obj_user', 0x3d, 'xfs\x00'}}, {@uid_eq={'uid', 0x3d, r0}}, {@dont_appraise='dont_appraise'}, {@subj_role={'subj_role', 0x3d, 'xfs\x00'}}, {@obj_role={'obj_role', 0x3d, 'xfs\x00'}}]}) [ 1406.907112] ? rcu_read_lock_sched_held+0x110/0x130 [ 1406.912149] ? __kmalloc+0x5d5/0x740 [ 1406.915889] alloc_workqueue_attrs+0x82/0x120 [ 1406.915909] apply_wqattrs_prepare+0xbb/0x970 [ 1406.915936] apply_workqueue_attrs_locked+0xcb/0x140 [ 1406.915953] apply_workqueue_attrs+0x31/0x50 [ 1406.924976] alloc_workqueue+0x84c/0xe70 [ 1406.925003] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1406.943629] ? __init_waitqueue_head+0x36/0x90 [ 1406.948242] hci_register_dev+0x1b8/0x860 [ 1406.952409] ? hci_init_sysfs+0x7c/0xa0 [ 1406.956412] __vhci_create_device+0x2d0/0x5a0 [ 1406.960933] vhci_write+0x2d0/0x470 [ 1406.964631] __vfs_write+0x613/0x8e0 [ 1406.968372] ? kernel_read+0x120/0x120 [ 1406.972294] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1406.977886] ? rw_verify_area+0x118/0x360 [ 1406.982078] vfs_write+0x20c/0x580 [ 1406.985652] ksys_write+0xea/0x1f0 [ 1406.989212] ? __ia32_sys_read+0xb0/0xb0 [ 1406.993296] ? do_syscall_64+0x26/0x610 [ 1406.997300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.002710] ? do_syscall_64+0x26/0x610 14:32:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x400101c0, [{0xc0010015}]}) [ 1407.002744] __x64_sys_write+0x73/0xb0 [ 1407.002775] do_syscall_64+0x103/0x610 [ 1407.002810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.002822] RIP: 0033:0x457f29 [ 1407.002838] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1407.002846] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1407.002873] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1407.002882] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1407.002895] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1407.014686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1407.014711] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1407.148586] Bluetooth: Can't register HCI device 14:32:05 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000020000000090001000000380002004690d577e100821123cc0003000000000085000000000000000000000000000000000000005c0000008004f800000000000000160832d271a61cdcedbf79bc9bc34257e259b5e5a773287de6ba297c2e4d46d73630a1e6948d84ebe23575a8ab1b514fffcc1440fa227f3409abe768cc579d80df5773326f17787426eeb5f590eaf96a15bf313f5ec2790d0f26075024"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400000, 0x0) execveat(r1, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x1400) 14:32:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffda, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x10000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000680)={0x2, 0x6}, 0x2) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="1b61dc8ec5571182ae4fd04e18364621ec63ec5bc5041ad2cbacddb6543e860c4b128dce5acc", 0x26, 0x5}, {&(0x7f0000000140)="67cd8a750280367d4cb5c20bd1e682b4604fa6a6e1de7b5cffc1abbd7810169b32093098673a2ca76e608ec34f04de7687b9f13ac7fa83ffbafdba3b79e892af133c0c41d0b4e8eabdbf18b793b7067988a3f252edb4e2286dfb897585502bdfd2f9ab5e4741156fb8c012b2d52ab28e1cb107ac0e02f08037b0a84e63cb1621254a9cfbe677b1e6013696f6d1f43970fa6be42adf8b7fb32467ba54781917a21eb8a653b801f0bf46b484887ecc4827e8c511307fa22383d287ccfba4ad00623ea3b67497d24380ed54966474a84b43997f3381d812942c15284541790f157a3f61e9de234e3a33d2f569a9f2a218ee5b485302c4195ec6", 0xf8, 0x6}], 0x0, &(0x7f0000000540)={[{@usrquota='usrquota'}, {@nouuid='nouuid'}, {@barrier='barrier'}, {@swalloc='swalloc'}], [{@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x2e}}, {@euid_lt={'euid<', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp0-}cpuset\x97]selfvboxnet0md5sum/'}}, {@fowner_lt={'fowner<', r4}}]}) 14:32:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x410101c0, [{0xc0010015}]}) 14:32:05 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf+plus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:05 executing program 3 (fault-call:3 fault-nth:10): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc00030000000000850000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:05 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xe501, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000100)) [ 1409.784779] FAULT_INJECTION: forcing a failure. [ 1409.784779] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.825843] CPU: 1 PID: 17674 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1409.832846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.842206] Call Trace: [ 1409.844815] dump_stack+0x172/0x1f0 [ 1409.848463] should_fail.cold+0xa/0x15 [ 1409.852381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1409.857509] ? ___might_sleep+0x163/0x280 [ 1409.861685] __should_failslab+0x121/0x190 [ 1409.865954] should_failslab+0x9/0x14 [ 1409.869766] kmem_cache_alloc_trace+0x2d1/0x760 [ 1409.874447] ? rcu_read_lock_sched_held+0x110/0x130 [ 1409.879474] ? __kmalloc+0x5d5/0x740 [ 1409.883210] alloc_workqueue_attrs+0x82/0x120 [ 1409.887717] apply_wqattrs_prepare+0xbb/0x970 [ 1409.892241] apply_workqueue_attrs_locked+0xcb/0x140 [ 1409.897362] apply_workqueue_attrs+0x31/0x50 [ 1409.901790] alloc_workqueue+0x84c/0xe70 [ 1409.905889] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1409.910926] ? __init_waitqueue_head+0x36/0x90 [ 1409.915549] hci_register_dev+0x1b8/0x860 [ 1409.919739] ? hci_init_sysfs+0x7c/0xa0 [ 1409.923744] __vhci_create_device+0x2d0/0x5a0 [ 1409.928257] vhci_write+0x2d0/0x470 [ 1409.931905] __vfs_write+0x613/0x8e0 [ 1409.935630] ? kernel_read+0x120/0x120 [ 1409.939531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1409.945127] ? rw_verify_area+0x118/0x360 [ 1409.949294] vfs_write+0x20c/0x580 [ 1409.952858] ksys_write+0xea/0x1f0 [ 1409.956411] ? __ia32_sys_read+0xb0/0xb0 [ 1409.960488] ? do_syscall_64+0x26/0x610 [ 1409.964478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.969852] ? do_syscall_64+0x26/0x610 [ 1409.973868] __x64_sys_write+0x73/0xb0 [ 1409.977769] do_syscall_64+0x103/0x610 [ 1409.981671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.986885] RIP: 0033:0x457f29 [ 1409.990097] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1410.009019] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1410.016747] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1410.024020] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1410.031300] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1410.038583] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1410.045859] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:05 executing program 3 (fault-call:3 fault-nth:11): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1410.086868] Bluetooth: Can't register HCI device [ 1410.174533] FAULT_INJECTION: forcing a failure. [ 1410.174533] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.187055] CPU: 1 PID: 17691 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1410.194017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.203384] Call Trace: [ 1410.206027] dump_stack+0x172/0x1f0 [ 1410.209735] should_fail.cold+0xa/0x15 [ 1410.213648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1410.218807] ? ___might_sleep+0x163/0x280 [ 1410.222985] __should_failslab+0x121/0x190 [ 1410.227253] should_failslab+0x9/0x14 [ 1410.231087] kmem_cache_alloc_node+0x264/0x710 [ 1410.235733] alloc_unbound_pwq+0x4c5/0xcf0 [ 1410.240012] apply_wqattrs_prepare+0x35e/0x970 [ 1410.244652] apply_workqueue_attrs_locked+0xcb/0x140 [ 1410.249789] apply_workqueue_attrs+0x31/0x50 [ 1410.254215] alloc_workqueue+0x84c/0xe70 [ 1410.258305] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1410.263351] ? __init_waitqueue_head+0x36/0x90 [ 1410.267961] hci_register_dev+0x1b8/0x860 [ 1410.272133] ? hci_init_sysfs+0x7c/0xa0 [ 1410.276142] __vhci_create_device+0x2d0/0x5a0 [ 1410.280659] vhci_write+0x2d0/0x470 [ 1410.284315] __vfs_write+0x613/0x8e0 [ 1410.288069] ? kernel_read+0x120/0x120 [ 1410.291974] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1410.297549] ? rw_verify_area+0x118/0x360 [ 1410.301729] vfs_write+0x20c/0x580 [ 1410.305298] ksys_write+0xea/0x1f0 [ 1410.308861] ? __ia32_sys_read+0xb0/0xb0 [ 1410.312955] ? do_syscall_64+0x26/0x610 [ 1410.316965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1410.322703] ? do_syscall_64+0x26/0x610 [ 1410.326704] __x64_sys_write+0x73/0xb0 [ 1410.330619] do_syscall_64+0x103/0x610 [ 1410.334539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1410.339752] RIP: 0033:0x457f29 [ 1410.342968] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1410.361884] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:32:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x4, &(0x7f0000000440)=[{&(0x7f0000000100)="e48a948a27bf13821ef80c47328b64f543c83195c8e11296d3a7b0b815a5889a416182e94a94065378e1e2427327f46e382c7ceff13ab95c6b099eafea8b58e8e1d8eda066c9bfafe58e6ca44dcf70fb744577771e0c34fd0e67c62ed5fbbbdc075caee8b615729f4ffad6ba86d1abd3b68ca65d5da9d9973d98a128b1d7baaea99daaa2b68638170a7838947406a0", 0x8f, 0x2fb0cfe9}, {&(0x7f00000001c0)="0352c6e21fae75283c00306177291eb6998d2857c8909daf805df6ee783892b5a8e034a7a4d142333a14e04ab4550c741029ab7a4ec1212d6fed0cccce93b8206b0214fd000d9c0628571c08da5bdff73a1716903eafdedfb173112433f1f3f52cf64b72b6296959fbedf8546352bcc8265b", 0x72, 0x4}, {&(0x7f0000000240)="4edf9fd92b253cb0b29aeb8d54b5897db51e47ad5bbebc6dc2e99547ac1e13e94fe5ee4207b6b68599b60af937ee2681125466e304a00588d231c39eec14f60132e1e0d8d42a25ef5683701dab2e463be02011af4ceb69af193199151aa383d66531ad2e4d5830b5580902fbfc95aa0c00420e34f29410e7b055e418f9f375719184018778cf88a9a528e1b58f4726aae5b0fa4ad2e69a5b9b21462577428a13a694185c3379ccf158aa2db388e454d697378d33aa0d30f17d1aadd3f4c623ddef6675a0cb3efa4235eb114f8928c2bb4b7e5dbe0e8dda4ee6e696cabbea0d733bca67b0093c7ae5cae4232e3332819926", 0xf1, 0x5}, {&(0x7f0000000340)="03e634cb2ca36583b1ea47e74fbff321b3f532322e74a6a039cc4678279c7bf367719219dbbdfaf2b066c79887e4ce25eefea8f3efade9d6a9b7c1c112e9100611d92e8d51fc462804816cb2b1c0172de2b6b2528277a88128f1f562f7cd366c22e2e76660735fdc04c133a782f49c22c5beba33567b256c21fa3801a62f3b72287ffd713429119afd3bfb6aa0fb33c0d13caecdfad2e016d75b44b16c063b2df67498dd29d5bf9ec8f2e5f8583aacc93097dc232cd4f172c9bb06b8ac2e50877829560069148ab2334010247043af59a254d45c7c9270c693759f8dab43768fb73c8cf380c4500f07", 0xe9, 0x3a}], 0x4400, &(0x7f0000000700)={[{@hash_r5='hash=r5'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@barrier_flush='barrier=flush'}, {@user_xattr='user_xattr'}, {@usrjquota='usrjquota'}, {@tails_off='tails=off'}, {@hash_tea='hash=tea'}, {@acl='acl'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@uid_lt={'uid<', r1}}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}, {@subj_user={'subj_user', 0x3d, 'mime_type\x00'}}, {@uid_lt={'uid<', r2}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) [ 1410.369609] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1410.376904] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1410.384184] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1410.391470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1410.398751] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1410.429111] Bluetooth: Can't register HCI device 14:32:05 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf-plus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x48000000, [{0xc0010015}]}) 14:32:05 executing program 3 (fault-call:3 fault-nth:12): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1410.577762] FAULT_INJECTION: forcing a failure. [ 1410.577762] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.608383] CPU: 1 PID: 17701 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1410.615365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.624735] Call Trace: [ 1410.624763] dump_stack+0x172/0x1f0 [ 1410.624789] should_fail.cold+0xa/0x15 [ 1410.631011] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1410.631034] ? ___might_sleep+0x163/0x280 [ 1410.631054] __should_failslab+0x121/0x190 [ 1410.648454] should_failslab+0x9/0x14 [ 1410.648472] __kmalloc+0x2dc/0x740 [ 1410.648490] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1410.648513] ? pwq_adjust_max_active+0x3b6/0x5c0 [ 1410.655868] ? alloc_workqueue+0x13c/0xe70 [ 1410.655887] alloc_workqueue+0x13c/0xe70 [ 1410.655920] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1410.679025] ? __init_waitqueue_head+0x36/0x90 [ 1410.683628] hci_register_dev+0x209/0x860 [ 1410.687805] __vhci_create_device+0x2d0/0x5a0 [ 1410.692313] vhci_write+0x2d0/0x470 [ 1410.695960] __vfs_write+0x613/0x8e0 [ 1410.699685] ? kernel_read+0x120/0x120 [ 1410.703592] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1410.709156] ? rw_verify_area+0x118/0x360 [ 1410.713315] vfs_write+0x20c/0x580 [ 1410.716880] ksys_write+0xea/0x1f0 [ 1410.720438] ? __ia32_sys_read+0xb0/0xb0 [ 1410.724518] ? do_syscall_64+0x26/0x610 [ 1410.728509] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1410.733881] ? do_syscall_64+0x26/0x610 [ 1410.737871] __x64_sys_write+0x73/0xb0 [ 1410.741782] do_syscall_64+0x103/0x610 [ 1410.745686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1410.750915] RIP: 0033:0x457f29 [ 1410.754125] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1410.773033] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1410.780753] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1410.788029] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1410.795303] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1410.802593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1410.809871] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:06 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d20000000000e6ffff02003e00000010000000000000000400400000000000000048e5bb46200000000900010000003800020000821123cc0003000000000085000000000000000000000000000000000000000000000000"], 0x68) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f00000000c0)={0x5, 0x0, 0x3001, 0xfffffffffffffffe, 0x9, 0x4, 0x80}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:06 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x88000, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffde, 0x0, 0x800000, 0x0) 14:32:06 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf.plus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8, 0x20, 0x7, {"0e6f3b1be9f015"}}, {0x0, "6f8e653f615e0c5b0566526a6474520f3d3fb75cb4d5293379355f5baa24ee631e000aa5846c40335cce20963d13f8b73318db92f692b06792430600000000000000e4c2eac6facaacf6c6b799f21b3ba66f36bf02e9f3abe7dd2d4e5bee7d87caf7cca2bdf9750a9cb12eb23bd5359821b94a161d4826fdca7b82c1cb7e80cc313ccde0d99c6adbef060509dd7dce1c16162f120ac5aa670b96ee649e2f2e8ac356211b766a4a5ff264e8ca5fad708a536885619fd5bf0f7cf219ed86"}}, &(0x7f0000000380)=""/87, 0xdf, 0x1a, 0x1}, 0x20) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x200000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:32:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x49000000, [{0xc0010015}]}) [ 1411.150124] Bluetooth: Can't register HCI device 14:32:09 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400000, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) 14:32:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4b564d00, [{0xc0010015}]}) 14:32:09 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hf0plus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:09 executing program 3 (fault-call:3 fault-nth:13): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1413.802584] FAULT_INJECTION: forcing a failure. [ 1413.802584] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.843049] CPU: 0 PID: 17833 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1413.850024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1413.859389] Call Trace: [ 1413.861999] dump_stack+0x172/0x1f0 [ 1413.865652] should_fail.cold+0xa/0x15 [ 1413.869587] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1413.874727] ? ___might_sleep+0x163/0x280 [ 1413.874753] __should_failslab+0x121/0x190 [ 1413.874780] should_failslab+0x9/0x14 [ 1413.886981] kmem_cache_alloc_trace+0x2d1/0x760 [ 1413.891661] ? rcu_read_lock_sched_held+0x110/0x130 [ 1413.891678] ? __kmalloc+0x5d5/0x740 [ 1413.891704] alloc_workqueue_attrs+0x82/0x120 [ 1413.891723] alloc_workqueue+0x166/0xe70 [ 1413.891774] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1413.914037] ? __init_waitqueue_head+0x36/0x90 [ 1413.918651] hci_register_dev+0x209/0x860 [ 1413.922814] __vhci_create_device+0x2d0/0x5a0 [ 1413.927329] vhci_write+0x2d0/0x470 [ 1413.930977] __vfs_write+0x613/0x8e0 [ 1413.934716] ? kernel_read+0x120/0x120 14:32:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x7ff, 0x8000}, {0xfffffffffffeffff, 0x100000000}, 0xfff, 0x0, 0x4}) [ 1413.938622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1413.944191] ? rw_verify_area+0x118/0x360 [ 1413.948348] vfs_write+0x20c/0x580 [ 1413.951901] ksys_write+0xea/0x1f0 [ 1413.955466] ? __ia32_sys_read+0xb0/0xb0 [ 1413.959543] ? do_syscall_64+0x26/0x610 [ 1413.963529] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1413.968899] ? do_syscall_64+0x26/0x610 [ 1413.972891] __x64_sys_write+0x73/0xb0 [ 1413.976786] do_syscall_64+0x103/0x610 [ 1413.980686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1413.985877] RIP: 0033:0x457f29 [ 1413.989084] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1414.007983] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1414.015692] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1414.022958] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1414.030223] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1414.037489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1414.044754] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1414.083626] Bluetooth: Can't register HCI device 14:32:09 executing program 3 (fault-call:3 fault-nth:14): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) bind$packet(r0, &(0x7f0000000240)={0x11, 0xf8, r1, 0x1, 0x7, 0x6, @remote}, 0x14) 14:32:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4b564d01, [{0xc0010015}]}) [ 1414.219907] FAULT_INJECTION: forcing a failure. [ 1414.219907] name failslab, interval 1, probability 0, space 0, times 0 14:32:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x1, 0xc, 0x1, "27fa123cf8d0427f6747ae527ebe4295d1fd926d251ece33cf112cf838abb769", 0x56555959}) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000000c0)={0xffff, 0x0, [], {0x0, @reserved}}) [ 1414.268359] CPU: 0 PID: 17955 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1414.275376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.284733] Call Trace: [ 1414.287335] dump_stack+0x172/0x1f0 [ 1414.290979] should_fail.cold+0xa/0x15 [ 1414.294905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1414.300033] ? ___might_sleep+0x163/0x280 [ 1414.304213] __should_failslab+0x121/0x190 [ 1414.308472] should_failslab+0x9/0x14 [ 1414.312298] __kmalloc_track_caller+0x2d8/0x740 [ 1414.316974] ? pointer+0x910/0x910 [ 1414.320521] ? set_precision+0x180/0x180 [ 1414.324590] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1414.329530] ? kasprintf+0xbb/0xf0 [ 1414.333091] kvasprintf+0xc8/0x170 [ 1414.336644] ? bust_spinlocks+0xe0/0xe0 [ 1414.340639] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1414.345664] ? find_next_bit+0x107/0x130 [ 1414.349735] kasprintf+0xbb/0xf0 [ 1414.353112] ? kvasprintf_const+0x190/0x190 [ 1414.357455] ? kasan_check_read+0x11/0x20 [ 1414.361619] alloc_workqueue+0x442/0xe70 14:32:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff7fffffff, 0x1e5, 0x0, 0x4, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000180), 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8001, 0x400) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000100)={0x1000, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) [ 1414.365701] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1414.370735] ? __init_waitqueue_head+0x36/0x90 [ 1414.375336] hci_register_dev+0x209/0x860 [ 1414.379499] __vhci_create_device+0x2d0/0x5a0 [ 1414.384003] vhci_write+0x2d0/0x470 [ 1414.384026] __vfs_write+0x613/0x8e0 [ 1414.384045] ? kernel_read+0x120/0x120 [ 1414.384070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1414.384107] ? rw_verify_area+0x118/0x360 [ 1414.400837] vfs_write+0x20c/0x580 [ 1414.400858] ksys_write+0xea/0x1f0 [ 1414.400890] ? __ia32_sys_read+0xb0/0xb0 [ 1414.400909] ? do_syscall_64+0x26/0x610 [ 1414.400928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1414.400942] ? do_syscall_64+0x26/0x610 [ 1414.400963] __x64_sys_write+0x73/0xb0 [ 1414.400980] do_syscall_64+0x103/0x610 [ 1414.425571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1414.425583] RIP: 0033:0x457f29 [ 1414.425599] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1414.425611] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1414.445730] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1414.479593] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1414.486870] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1414.494151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1414.501427] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:13 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfXplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:13 executing program 2: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) r6 = syz_open_dev$swradio(&(0x7f0000000880)='/dev/swradio#\x00', 0x0, 0x2) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000900)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x2001000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="a800e386fe8d00676f5f95104d0000", @ANYRES16=r7, @ANYBLOB="08032bbd7000fddbdf25030000003800050034000200080004000600000008000400490a00000800010004000000080002000100000008000200000000800800030006000000180007000c0003008000000000000000080001000600000014000700080001000700000008000100000000800c0005000800010065746800100004000c00010073797a31000000000c00070008000200ff0f00000800060004000200"], 0xa8}, 0x1, 0x0, 0x0, 0x4000}, 0x41) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getuid() fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="02000000010001000000000002000700", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r2, @ANYBLOB="02008053", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=r5, @ANYBLOB="02000600", @ANYRES32=r8, @ANYBLOB="36ef1fa6c8ab4ab15932f430193d636ac96b66d2ad366486727f1c411e94972ffbf594960a5fdffbb604de1db0b6be6e7efea078917034a7169aafa73937c3692d1ab4d55b1c55cfac82d110f8664ede26145dd3f1c886075237a7f04fd96811c02388c9a39a4301d39e90181f9ea2b1b8a7c011b9dc44fe19ba92b0b83575224adf8405fb31a550a619e32b58aed1306b5a58d6e699c50a", @ANYRES32=r9, @ANYBLOB="040002000000000008000200", @ANYRES32=r10, @ANYBLOB="10000100000000002000000000000000"], 0x64, 0x3) r11 = syz_open_dev$amidi(&(0x7f0000000700)='/dev/amidi#\x00', 0x7f, 0x101000) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000000740)={{{@in=@empty, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000840)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000500)='reiserfs\x00', &(0x7f0000000540)='./file0\x00', 0x20, 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000b00)="e920f6ce6efb126f589b6e395ee26f7d033e0b948728e935d389d733a2bd961f17430d31dde20a16b37f35e2b67d6b4eb0e70e777180bee067fe117a474c855a13f65fd4a62692d956201eea285b1d35c6f91584e93779b7137cb9e6694d0aaaaf72e28988efc6a4fd77fc9226b49325dc2b5eac65a3a2baeda03e85336aa8d7b37a43a326d7c1a249343884c5034a0e80b8e120cddddcff111e005a6ee36b9030f6bd8543a13617fc501bf22f0356827f01f2f26f1d", 0xb6, 0x101}, {&(0x7f0000000bc0)="2c7c26e26a9157a7b1dadfefb8f44cd6cb08de8bff469e0a5aab94d1a9d9b0221e2830077aeaf4852d7bcea6cb85efc9231a51dca1a2ed4b9661faff6ef054f05cd3cb8b37b457027919b3e1016faf893812bb73607d372a139953d503453187b4e17a2b21d3cb8e29cc970473a2d815cbd024e70fd5c203c23d2d773e083d8410361a2017f5e43876b479d5cbdef4fa6607be916c5cef3c75dee35be3820e37612e1e886d2ba0a4bbe0f4a0b83af3934f25732aa7c46ad434ade6f5cd460b810c22a2cce3ace80367c132ee1800176b25e24a", 0xd3, 0x7}], 0x80850, &(0x7f0000000d00)={[{@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@commit={'commit', 0x3d, 0x3}}], [{@subj_role={'subj_role', 0x3d, 'selfbdev'}}, {@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x37, 0x63, 0x77, 0x0, 0x34, 0x7f, 0x65], 0x2d, [0x63, 0x36, 0x3b, 0x34], 0x2d, [0x37, 0x0, 0x66, 0x36], 0x2d, [0x72, 0x36, 0x77, 0x63], 0x2d, [0x32, 0x0, 0x30, 0x33, 0x64, 0x32, 0x32, 0x65]}}}, {@dont_measure='dont_measure'}]}) fchmod(r0, 0x40) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r6, 0xc0044306, &(0x7f0000000dc0)=0x4) 14:32:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4b564d02, [{0xc0010015}]}) 14:32:13 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x3a8) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x0, 0x0, 0x2200008, 0x0) 14:32:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4b564d03, [{0xc0010015}]}) 14:32:20 executing program 3 (fault-call:3 fault-nth:15): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:20 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfcplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4b564d04, [{0xc0010015}]}) 14:32:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = msgget$private(0x0, 0x140) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000480)={{0x20, r2, r3, r4, r5, 0x4, 0xfffffffffffff946}, 0xf4, 0x8, 0x101, 0x10001, 0x101, 0x28a2, r6, r7}) r8 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r8, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r8, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r8, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x1, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r9, 0x4008af13, &(0x7f0000000540)={0x1, 0x3}) 14:32:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:20 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0xffffffffffffff35, 0xfa00, {{0xa, 0x4e21, 0x0, @mcast1, 0xfffffffffffffff6}, {0xa, 0x4e22, 0x1, @ipv4={[], [], @empty}, 0x4}, r1, 0xfb7b}}, 0x48) [ 1425.336284] FAULT_INJECTION: forcing a failure. [ 1425.336284] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.394409] CPU: 1 PID: 18107 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1425.401408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.410782] Call Trace: [ 1425.413415] dump_stack+0x172/0x1f0 [ 1425.417077] should_fail.cold+0xa/0x15 [ 1425.421790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.426930] ? ___might_sleep+0x163/0x280 [ 1425.431124] __should_failslab+0x121/0x190 [ 1425.435395] should_failslab+0x9/0x14 [ 1425.439228] __kmalloc+0x2dc/0x740 [ 1425.442795] ? apply_wqattrs_prepare+0xae/0x970 [ 1425.447515] apply_wqattrs_prepare+0xae/0x970 [ 1425.452039] apply_workqueue_attrs_locked+0xcb/0x140 [ 1425.457186] apply_workqueue_attrs+0x31/0x50 [ 1425.461624] alloc_workqueue+0x84c/0xe70 [ 1425.465712] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1425.470774] ? __init_waitqueue_head+0x36/0x90 [ 1425.475383] hci_register_dev+0x209/0x860 [ 1425.475409] __vhci_create_device+0x2d0/0x5a0 [ 1425.484076] vhci_write+0x2d0/0x470 [ 1425.487735] __vfs_write+0x613/0x8e0 14:32:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x580001c0, [{0xc0010015}]}) [ 1425.491466] ? kernel_read+0x120/0x120 [ 1425.491483] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1425.491516] ? rw_verify_area+0x118/0x360 [ 1425.505083] vfs_write+0x20c/0x580 [ 1425.508656] ksys_write+0xea/0x1f0 [ 1425.512220] ? __ia32_sys_read+0xb0/0xb0 [ 1425.516305] ? do_syscall_64+0x26/0x610 [ 1425.520318] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.525704] ? do_syscall_64+0x26/0x610 [ 1425.529699] __x64_sys_write+0x73/0xb0 [ 1425.529719] do_syscall_64+0x103/0x610 [ 1425.529740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.529752] RIP: 0033:0x457f29 [ 1425.529767] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1425.529775] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1425.529790] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1425.529799] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1425.529809] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1425.529818] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1425.529826] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1425.559122] Bluetooth: Can't register HCI device 14:32:21 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfdplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x280002, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:32:21 executing program 3 (fault-call:3 fault-nth:16): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x60050000, [{0xc0010015}]}) 14:32:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x20, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x8}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x800, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x811) [ 1425.803141] FAULT_INJECTION: forcing a failure. [ 1425.803141] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.847313] CPU: 1 PID: 18227 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1425.854289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.863662] Call Trace: [ 1425.863688] dump_stack+0x172/0x1f0 [ 1425.863727] should_fail.cold+0xa/0x15 [ 1425.863751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.863774] ? ___might_sleep+0x163/0x280 [ 1425.863798] __should_failslab+0x121/0x190 [ 1425.883169] should_failslab+0x9/0x14 [ 1425.891202] kmem_cache_alloc_trace+0x2d1/0x760 [ 1425.895894] ? rcu_read_lock_sched_held+0x110/0x130 [ 1425.900960] ? __kmalloc+0x5d5/0x740 [ 1425.904700] alloc_workqueue_attrs+0x82/0x120 [ 1425.909228] apply_wqattrs_prepare+0xbb/0x970 [ 1425.913765] apply_workqueue_attrs_locked+0xcb/0x140 [ 1425.918942] apply_workqueue_attrs+0x31/0x50 [ 1425.923374] alloc_workqueue+0x84c/0xe70 [ 1425.927464] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1425.932535] ? __init_waitqueue_head+0x36/0x90 [ 1425.932559] hci_register_dev+0x209/0x860 [ 1425.932593] __vhci_create_device+0x2d0/0x5a0 [ 1425.932621] vhci_write+0x2d0/0x470 [ 1425.945900] __vfs_write+0x613/0x8e0 [ 1425.945920] ? kernel_read+0x120/0x120 [ 1425.945939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1425.962796] ? rw_verify_area+0x118/0x360 [ 1425.966973] vfs_write+0x20c/0x580 [ 1425.970542] ksys_write+0xea/0x1f0 [ 1425.974128] ? __ia32_sys_read+0xb0/0xb0 [ 1425.978206] ? do_syscall_64+0x26/0x610 [ 1425.982209] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.987585] ? do_syscall_64+0x26/0x610 [ 1425.991586] __x64_sys_write+0x73/0xb0 [ 1425.995490] do_syscall_64+0x103/0x610 [ 1425.999397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.004609] RIP: 0033:0x457f29 [ 1426.007842] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1426.026784] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1426.034502] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1426.041776] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1426.049069] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1426.056371] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1426.063645] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x61050000, [{0xc0010015}]}) 14:32:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="822a0d222ad1ceaa890295f1b49d6bc4f07354e2a9d36f47fd2899abba2236e6514bcf0755d6ec6df7795e1025432b1d6d794e26d5427278caae15eafd6970b854fb4b8d") [ 1426.129317] Bluetooth: Can't register HCI device 14:32:21 executing program 3 (fault-call:3 fault-nth:17): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1426.256249] FAULT_INJECTION: forcing a failure. [ 1426.256249] name failslab, interval 1, probability 0, space 0, times 0 [ 1426.328539] CPU: 0 PID: 18241 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1426.335517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1426.344872] Call Trace: [ 1426.347475] dump_stack+0x172/0x1f0 [ 1426.351132] should_fail.cold+0xa/0x15 [ 1426.355047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1426.360188] ? ___might_sleep+0x163/0x280 [ 1426.364350] __should_failslab+0x121/0x190 [ 1426.368598] should_failslab+0x9/0x14 [ 1426.372432] kmem_cache_alloc_trace+0x2d1/0x760 [ 1426.377120] ? rcu_read_lock_sched_held+0x110/0x130 [ 1426.382151] ? __kmalloc+0x5d5/0x740 [ 1426.385877] alloc_workqueue_attrs+0x82/0x120 [ 1426.390399] apply_wqattrs_prepare+0xc8/0x970 [ 1426.394918] apply_workqueue_attrs_locked+0xcb/0x140 [ 1426.400032] apply_workqueue_attrs+0x31/0x50 [ 1426.404464] alloc_workqueue+0x84c/0xe70 [ 1426.408544] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1426.413577] ? __init_waitqueue_head+0x36/0x90 [ 1426.418174] hci_register_dev+0x209/0x860 [ 1426.422341] __vhci_create_device+0x2d0/0x5a0 [ 1426.426846] vhci_write+0x2d0/0x470 [ 1426.430505] __vfs_write+0x613/0x8e0 [ 1426.434243] ? kernel_read+0x120/0x120 [ 1426.438138] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1426.443705] ? rw_verify_area+0x118/0x360 [ 1426.447866] vfs_write+0x20c/0x580 [ 1426.451420] ksys_write+0xea/0x1f0 [ 1426.454972] ? __ia32_sys_read+0xb0/0xb0 [ 1426.459055] ? do_syscall_64+0x26/0x610 [ 1426.463043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.468419] ? do_syscall_64+0x26/0x610 [ 1426.472432] __x64_sys_write+0x73/0xb0 [ 1426.476332] do_syscall_64+0x103/0x610 [ 1426.480235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.485428] RIP: 0033:0x457f29 [ 1426.488651] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1426.507556] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1426.515289] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1426.522565] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1426.529849] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1426.537121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1426.544397] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1426.571586] Bluetooth: Can't register HCI device 14:32:24 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140)={0x100000001, 0x3, 0x0, 0x7, 0x0, 0x2, 0x8, 0x5, 0x2, 0x100000000, 0x8}, 0xb) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6, 0x2000) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000200)=""/87) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:24 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfiplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:24 executing program 2: sched_yield() syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) 14:32:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x70050000, [{0xc0010015}]}) 14:32:24 executing program 3 (fault-call:3 fault-nth:18): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1429.200843] FAULT_INJECTION: forcing a failure. [ 1429.200843] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.266498] CPU: 1 PID: 18248 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1429.273515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.282941] Call Trace: [ 1429.285569] dump_stack+0x172/0x1f0 [ 1429.289253] should_fail.cold+0xa/0x15 [ 1429.293168] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1429.298300] ? ___might_sleep+0x163/0x280 [ 1429.302652] __should_failslab+0x121/0x190 [ 1429.307199] should_failslab+0x9/0x14 [ 1429.311308] kmem_cache_alloc_node+0x264/0x710 [ 1429.315926] alloc_unbound_pwq+0x4c5/0xcf0 [ 1429.320190] apply_wqattrs_prepare+0x35e/0x970 [ 1429.324814] apply_workqueue_attrs_locked+0xcb/0x140 [ 1429.329945] apply_workqueue_attrs+0x31/0x50 [ 1429.334374] alloc_workqueue+0x84c/0xe70 [ 1429.338464] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1429.343522] ? __init_waitqueue_head+0x36/0x90 [ 1429.348130] hci_register_dev+0x209/0x860 [ 1429.352309] __vhci_create_device+0x2d0/0x5a0 [ 1429.356826] vhci_write+0x2d0/0x470 [ 1429.360482] __vfs_write+0x613/0x8e0 [ 1429.364218] ? kernel_read+0x120/0x120 [ 1429.368128] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1429.373701] ? rw_verify_area+0x118/0x360 [ 1429.377872] vfs_write+0x20c/0x580 [ 1429.381439] ksys_write+0xea/0x1f0 [ 1429.385007] ? __ia32_sys_read+0xb0/0xb0 [ 1429.389106] ? do_syscall_64+0x26/0x610 [ 1429.393100] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1429.398486] ? do_syscall_64+0x26/0x610 [ 1429.402483] __x64_sys_write+0x73/0xb0 [ 1429.406389] do_syscall_64+0x103/0x610 [ 1429.410311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1429.415513] RIP: 0033:0x457f29 [ 1429.419242] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1429.438158] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1429.445899] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1429.453198] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1429.460491] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:32:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) [ 1429.467772] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1429.475182] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x71050000, [{0xc0010015}]}) 14:32:25 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hflplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x72050000, [{0xc0010015}]}) 14:32:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x103002, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f00000000c0)={0xfd1, "f1e3372bfd5fcae985a27948c5ecad13f80496fb0664cdc6695e4a2472420b49", 0x3, 0x1}) [ 1429.902033] Bluetooth: Can't register HCI device 14:32:25 executing program 3 (fault-call:3 fault-nth:19): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1430.106631] FAULT_INJECTION: forcing a failure. [ 1430.106631] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.156251] CPU: 1 PID: 18284 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1430.163222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1430.172680] Call Trace: [ 1430.175296] dump_stack+0x172/0x1f0 [ 1430.178958] should_fail.cold+0xa/0x15 [ 1430.179065] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1430.188128] ? ___might_sleep+0x163/0x280 [ 1430.192316] __should_failslab+0x121/0x190 [ 1430.192337] should_failslab+0x9/0x14 [ 1430.192368] kmem_cache_alloc+0x2b2/0x6f0 [ 1430.204588] __d_alloc+0x2e/0x8c0 [ 1430.208066] d_alloc+0x4d/0x2b0 [ 1430.211373] d_alloc_parallel+0xf4/0x1bc0 [ 1430.215557] ? __d_lookup_rcu+0x6c0/0x6c0 [ 1430.219733] ? __d_lookup+0x40c/0x760 [ 1430.223565] ? lockdep_init_map+0x1be/0x6d0 [ 1430.227911] ? lockdep_init_map+0x1be/0x6d0 [ 1430.232269] __lookup_slow+0x1ab/0x500 [ 1430.236183] ? vfs_unlink+0x500/0x500 [ 1430.240012] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1430.244620] ? d_lookup+0x19e/0x260 [ 1430.248284] lookup_one_len+0x16d/0x1a0 [ 1430.252286] ? lookup_one_len_unlocked+0x100/0x100 [ 1430.257247] start_creating+0xbf/0x1e0 [ 1430.261162] debugfs_create_dir+0x23/0x3c0 [ 1430.265415] hci_register_dev+0x299/0x860 [ 1430.269610] __vhci_create_device+0x2d0/0x5a0 [ 1430.274133] vhci_write+0x2d0/0x470 [ 1430.277787] __vfs_write+0x613/0x8e0 [ 1430.281523] ? kernel_read+0x120/0x120 [ 1430.285425] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1430.290995] ? rw_verify_area+0x118/0x360 [ 1430.295180] vfs_write+0x20c/0x580 [ 1430.298754] ksys_write+0xea/0x1f0 [ 1430.302314] ? __ia32_sys_read+0xb0/0xb0 [ 1430.306398] ? do_syscall_64+0x26/0x610 [ 1430.310391] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.315774] ? do_syscall_64+0x26/0x610 [ 1430.319777] __x64_sys_write+0x73/0xb0 [ 1430.323683] do_syscall_64+0x103/0x610 [ 1430.327613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.332820] RIP: 0033:0x457f29 [ 1430.336027] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1430.354943] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1430.362665] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1430.369948] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1430.377229] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1430.384514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1430.391799] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1435.739261] device bridge_slave_1 left promiscuous mode [ 1435.745244] bridge0: port 2(bridge_slave_1) entered disabled state [ 1435.804073] device bridge_slave_0 left promiscuous mode [ 1435.823244] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.343020] device hsr_slave_1 left promiscuous mode [ 1439.383776] device hsr_slave_0 left promiscuous mode [ 1439.443137] team0 (unregistering): Port device team_slave_1 removed [ 1439.463277] team0 (unregistering): Port device team_slave_0 removed [ 1439.483543] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1439.545055] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1439.686542] bond0 (unregistering): Released all slaves [ 1439.860464] IPVS: ftp: loaded support on port[0] = 21 [ 1440.105164] chnl_net:caif_netlink_parms(): no params data found [ 1440.224381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.238328] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.245567] device bridge_slave_0 entered promiscuous mode [ 1440.270117] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.276622] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.283945] device bridge_slave_1 entered promiscuous mode [ 1440.305183] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1440.314712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1440.334093] team0: Port device team_slave_0 added [ 1440.340560] team0: Port device team_slave_1 added [ 1440.400869] device hsr_slave_0 entered promiscuous mode [ 1440.448547] device hsr_slave_1 entered promiscuous mode [ 1440.518676] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.525075] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.531768] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.538168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.663386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1440.710171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1440.717950] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.740401] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.764540] 8021q: adding VLAN 0 to HW filter on device team0 [ 1440.783490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1440.798712] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.805085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.839101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1440.846774] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.853196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.892244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1440.909145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1440.916867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1440.951997] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1440.974390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1440.989030] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1440.996247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1441.019603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1441.037716] 8021q: adding VLAN 0 to HW filter on device batadv0 14:32:36 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x110) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000140)) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x24000, 0x0) mq_timedsend(r0, &(0x7f00000000c0)="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", 0x1000, 0x200, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x4, 0x4) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000001200)={0xac00, 0xf, 0x2e, "3804029731d04793596f447152668a6301a1ef49b1a620668b9fac191e07775a8c39445ac9d621dde5d2335c7b62f38d84b3a3bd6e3a2f609a524c56", 0x1b, "aa6b6560d2809619ac4b87d9d7c7356140541a7cc8a1baf4095451ae92484a90ea6872f2573246796aeb1944124ce03e71ef85032b59085bec783b2c", 0x20}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000010c0)) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000011c0)={0x58248d72, 0x3}) 14:32:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x74010000, [{0xc0010015}]}) 14:32:36 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfoplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:36 executing program 3 (fault-call:3 fault-nth:20): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1441.367760] FAULT_INJECTION: forcing a failure. [ 1441.367760] name failslab, interval 1, probability 0, space 0, times 0 [ 1441.434118] CPU: 0 PID: 18300 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1441.441091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.450445] Call Trace: [ 1441.453116] dump_stack+0x172/0x1f0 [ 1441.456772] should_fail.cold+0xa/0x15 [ 1441.460672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1441.465813] ? mark_held_locks+0xa4/0xf0 [ 1441.469890] __should_failslab+0x121/0x190 [ 1441.474156] should_failslab+0x9/0x14 [ 1441.477967] kmem_cache_alloc+0x47/0x6f0 [ 1441.482047] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1441.487203] __debug_object_init+0x755/0xc30 [ 1441.491637] ? debug_object_fixup+0x30/0x30 [ 1441.495965] ? lockdep_init_map+0x1be/0x6d0 [ 1441.500299] debug_object_init+0x16/0x20 [ 1441.504388] __init_work+0x50/0x60 [ 1441.507936] hci_request_setup+0x654/0x9e0 [ 1441.512174] hci_alloc_dev+0x166a/0x1d00 [ 1441.516248] __vhci_create_device+0x101/0x5a0 [ 1441.520757] vhci_write+0x2d0/0x470 [ 1441.524396] __vfs_write+0x613/0x8e0 [ 1441.528164] ? kernel_read+0x120/0x120 [ 1441.532059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1441.537642] ? rw_verify_area+0x118/0x360 [ 1441.541801] vfs_write+0x20c/0x580 [ 1441.545357] ksys_write+0xea/0x1f0 [ 1441.548906] ? __ia32_sys_read+0xb0/0xb0 [ 1441.552982] ? do_syscall_64+0x26/0x610 [ 1441.556983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.562353] ? do_syscall_64+0x26/0x610 [ 1441.566344] __x64_sys_write+0x73/0xb0 [ 1441.570247] do_syscall_64+0x103/0x610 [ 1441.574147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.574160] RIP: 0033:0x457f29 14:32:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x75010000, [{0xc0010015}]}) [ 1441.574178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1441.601454] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1441.601470] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1441.601479] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1441.601487] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:32:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x20000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='9p\x00', 0x40800, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@appraise='appraise'}, {@subj_type={'subj_type', 0x3d, 'xfs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'xfs\x00'}}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'xfs\x00'}}]}}) [ 1441.601496] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1441.601517] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:37 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfpplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f00000000c0)="c86bb3cde5d6f8f31452a5a447fdcaec416bb2db8e81fe8d2b2e2b1a15d80a5d2e0d3eb49e629e4139f950478f472ab332cc47ea077a5f9d91fdbe674c1d5af29cdfbdcb4738ce4fbdbdcb0bb4720343d8d58b2ea08b54f36cc2b23dc7a861c12cd26ec6b64b96e60aee6ee67615a00bbc29ac85d6cfb371abe16dcd544df3f15e1a34b8bf07baa7854adc1ed35f8c805d7d52cdae33fff478bd81712a6905ddcf502bf158a6af", 0xa7) 14:32:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x76010000, [{0xc0010015}]}) 14:32:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:37 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d20000de000000000003003e0000001000000000040000000040010000000000000000000020007055adcc538800000900010000003800020000821123cc0028000000000085000021f1ffff000000000000090000008004f800"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x8}}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:37 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfuplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@vsock, &(0x7f0000000000)=0x80) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000c00)=0xe8) sendmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000000380)=[{0xf0, 0x11f, 0x42c, "9f87bc47ec6839591a3356d243c20b5072a7d77c3d0d903137bc243b001c228238fbc84c8fd40fb6fffc3c0771790e938f33a78317b5e6c931998a9388c73f01b1c955e5eb9ee85c7d76f5d6e5e42e6a29cdabd2f4ddcbe79b00a95fde1d54f1c182b228562902b88e07ef70760408fd16e6e47ccefc712fb9475a4f7bc08ab96700cdb6a1eb54a24cfd4e61c619760b886f9800944d2962a6ad537bb68528800d97906966fd6836508f0bba9d902310d68d963dcbf4336bbed5f4b13d57b10614cdc20bfc2507a1166b370692adc6b4158eb1a090fe654e74"}, {0xd0, 0x104, 0x5, "f1d89f8929bf12ba8a575b4409f7469ea9df584131cfcfd51c014952fc9b0a6e9c235f769451ef96f70cfb1186da50695028fab94e10520e47a978e809081b5fe8422f189b1130c4e752671b31fa8c962ad58b4472725441363657b80955be426674ca02bd6029ce2b8851f0135d5ba36635a2b7e6202acd34b2a2f099a16e6ca6805e227d563b8f6c6b111be4fc5383ae85961ddf4e4e7512dedf5d7a1d9d22a30e2953d341e22bf23cbd4914d8ad595fe8eb59ab5c5df482983ee4ecd598"}, {0x38, 0x113, 0xfffffffffffffffa, "10fc27b09186ea66e09557560ee56beb93f9faed15ecfe0ae41cb263ebdba5dec2e5c37738"}], 0x1f8}, 0x4}, {{&(0x7f0000000580)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x2, 0x1, 0x2}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000600)="46d2f36b335a5ad9aef939dc3b268d9d", 0x10}], 0x1, &(0x7f0000000680)=[{0x68, 0x13f, 0x2, "53a2c3ff6fafb191611cd6ea785af2685e988fba0a2cb1563e3445bfd6e9f3fb313580b39509d0f1d07462878c901ef394b207688fa41a9a6388725b448f8fc90cea9eef5bba022d2ec9b2e418ea529edb10005381a07874"}], 0x68}, 0x3}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000700)="b41260cb6c87349d1df81bd03e59a6d3df4b8b7c8358edf00a5145a5bbc40f1d04db6dbe7b04fd4ac5a2033e4b86d3b628d252cb687d6d4f16a344dbc1f41e48975d0bfa032d511972143912bd099710e515d5", 0x53}, {&(0x7f0000000780)="01f704fbd07bd8e18ee11d3236f55982707ddf383796f555a0f5dec4ccea7267c751b74af99e7b1f428863806a3cc76596d41edd625cd231c291293e04f47acc499e74be1183f60b58a14338362e94e231f13cf6141bc7a15ff4b82f3775415f571532659c18eaf1cdad0c5c0e214ffe90a61c04b1ae887c24f1483a3eec6415fbc7bb00306ce85f256482dd8490ed6d96ff92e1f867ef06", 0x98}, {&(0x7f0000000840)="34e767b613b4091a1b3440e50ceceb620f9b2a18607eb65c6b308818fc29008379fab33288b82e2ab422f15b83cb19272082c1d43b6143af4db7b970bd816f46d306f50f6c175aa5690839e0026cf4e0f607046d59170fbd834ac539e371758426c9760c1e124e6cf6c3bea9dbe9e65e5a28b3bcbf131f95269fdfa52cb5d0c4482572b2a296482b38971f824f00fc52d247642956549ceac01710f1dd1a9feafea57b39ef16285b084443f12a88d177952a98ed74b95f8a73c9f69fa96f437ce816f8135859695b1c4b7e671a33267241db84c6878e3376cf4c", 0xda}, {&(0x7f0000000940)="ada0c4ce6eee8fa20fd6790f70e508e3", 0x10}, {&(0x7f0000000980)="82167912f2b22b43012b48921ee588a6fe340f0fd995c051a3ac74c042a8225e49e398f817308bf4927627a843a47ca56d3b4c815695c376335424834a31aab31882caa402fc1bb5b74441e4f035d381b6c59d5c37c4d49ff3dd46837da81f5fa18e08233e36ca3ebe545ad7bc136d4762967f791a9b2457036c2e5327372688e4f136fe40bc304687c602174fafc932ead6ab0baab01d70dacc5aa3b449baab3106a176afec5cea2e76e3a6560529cfa49dafe297a66a402e9bd9041026b2fcf6f9a8a88a08893c941b024d893a6de74c728c31ef6bbe5a5aeea1d82e8b8c76b2dd6f7a83d639a193b3", 0xea}], 0x5}, 0x2}, {{&(0x7f0000000c40)=@xdp={0x2c, 0x3, r2, 0x18}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000cc0)="54842254eac028c0dc2cc8f240cbd2b765be73162036615195bf25f8502d62f190ab601876f1b0d9b48f8a4a11fdb1c827e1dda0a83b79e4f205e7e09fcab71ce6242da10a54b7b00647b30af33657b6975acc4ce2db83544609451cd84850e673fe3967c4a8767ce28cafe0f7d0f88f888c852a7d28bb9f829724bfb76fe6e569782285e369d7eab4acaae76ded606a28943c1725248f8eb127160d8e0a92c6f36857e5124ae61fd6a90b09faa663ee8af3d5bc7685aad8c66d05c7bbd8757fff53c4dd377099c80f002e4c440f01e4fa3a94cd8dfe50d49c25901111cc017139b33690d30562e431a3", 0xea}, {&(0x7f0000000dc0)="2ac20595805fa5a8128310c6ab44256b4dd336f81f5e6d9f9cec153b88640500bb1a9ab34b24cbc42e3c10d7d540204caa27ef02e3268d4a46a9a22d1a85ac86", 0x40}, {&(0x7f0000000e00)="3dfedc71c617b57e47a31e2d5ae876c1380deac1f77b26fbfb6b17d992cb0db8472eb64c8693fbb6e416578d9fb387fa620c", 0x32}, {&(0x7f0000000e40)="0539cd38df025c4c633ce35c9aa77d0b404ee4b82f0e0675bb462be4ac10d05c27dbd4214d3c27bbd3249d2aaa5d13bbb6eb8eaf5108e2ab428c53476f18b9bf4584301cba4a54445849501a4d3f14f9809248b5562225a51efe675ab947fdf49c0d8fcafd6b4584ec1ffd46026b148d00a2839fba0bd9fd6180dcb054dd481648aa82db3d9b3ffe6db630e81c598c96fcd40682e185ed4aab6af0a16f856fcb5a0f79096f54ce2ef48a6751fa6ce8a70d833887c8b95371be1675895524525750a4efee4650c3f6854bbaa243b62e9d5c30e7cf7b061285cc0214a0068b500ad738e5897df844a5879c522e7b24b636778d16718c", 0xf5}], 0x4, &(0x7f0000000f80)=[{0xe8, 0x84, 0x100000001, "e2ac089858716aedb8d6233a455656cf8c5ed8538aae54cd8fbdb21e6ebc190373437a1f0327846e0dc24db80bd50ccdd9092ddcf173ef0bc1574c68687267f1d5635bfb1802f824ae13bcfb954299ca3961d6229d943ebc4f54b404bc6ffd75d565361af69dae86f3e0e3c425af3b8f26eebd23b46bd1887669874f7d64ea572f4aa179c65dcba870ed6c036da6d65ba9f14b294a9033a99840026cd77c1babb08deb7f94ae99f5e4762bfbf47533d6e60e370fa7a4738abb15d8a35841d59238b614fe6372a210af1d23b251a72540147e58618ff8f785"}, {0x30, 0x118, 0x100000000, "463c47d19895ffab33638de7fe90cea3639278bd95728de8c352238cc99fd592"}, {0x58, 0x10b, 0x5, "ce48bf2bad23cd55427f616dd1df646d81eef983e9110a5fd72fe192cb6c2e7835243b61a79171d4087ae9bd7bf884443432d10839f1e3c0a8fe2c373a77a3d2fb63294b082cf0"}], 0x170}, 0x5}, {{&(0x7f0000001100)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-ce\x00'}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001180)="be2386d9789b57f6d2c0440b53b5a4e36bacd63dc9923204b040eb00835ddd631578f6d909fb32d37c420669f39aa8382c4dbb53b0121889a72b48f1", 0x3c}], 0x1, &(0x7f0000001200)=[{0x80, 0x10f, 0x8, "c4d102d3b3909d9216f4ae2b731f970204fdd45254bbfcc6a1ba8c272a66a4fbc5744d448f115fe34e53658d6639fafb2a017eb0be57cf4628e0a2c7666a860906c34310146af1a73873071b6f768e7307f06de49dd1581ce00f8fde7590d1d65c14915829037046fa"}], 0x80}, 0x2}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000001280)="fde6c4da8e3a03b0880e01c9b2d6c9fef0248f2bd944819857bc38506d0ac4de9fd6165ba4cc1739a0aebabbc2494394eb654d7a5e6169a1bd18af814f3b0bf811c4496d198eb63154046807569e9c30828f48d2dba607580a14407c5e0ec7f91e036ed35aabd65580bcbc16f8ce5c660a40", 0x72}], 0x1, &(0x7f0000001340)=[{0x48, 0x10e, 0x81, "4550b4785f26d4843c6ee2bb1054ec17e324c14f30a2acdc126be9df993638edaa2d4b180ad492ef98cfd2912bec91760927cd"}, {0xd0, 0x10d, 0xfff, "566e2b8cbf41d190d3e0d157d3f2c9da09e703f0c120a5333de6a2b4b6502e8fa8198a9c1ce9321664ecc14aeeffa4f44475cba79c246882ced2a66895caa6578c751357a9fbe2840635beb44c2dcb5f76bdd213a8dd851242010a1461ef1e3661d7fd71d981448b1fc6386b9b928103688f19393ea4216401de488be819269d95d2cec90fcbd704e7f8417be92fc66606c8ce875f9596c1855701da88ae3be16678b36d727387834a65b7c0b5586af20be8bd1727ced9c4f1eee700084e"}, {0x108, 0x10f, 0x4, "513848deb863f5ee00e2e54d10a9284886840b7eb4664d12109dbd9d5ca627746d211dbf9f837ca2e5c4e7f7de4b0e84d2db9952306e8f020a6ce230c881eba0567c11bd29fb2deb3c79a91f3ea448e8fcd9c4b7c36dc839595c9cc851e89a76a020a7ab73b68904bf2d3b307e4b475d52ad66f1bf1e405360f00b178634c34fce27c9971bb5d959b7b670c467bc36611c7f025fbf32fcec222fbde5b2b56f43ef984b07cd5871038928080f7078f5f0ba1993ce28d9802f535b856f28c91d1ab235d73a5c1d4143290ddcccac88e180659d5b31f0eee7168a409503d238e7a3978b382dcad978d2ca0d3fbc3406ca30c0d3b7707c9e"}, {0x40, 0x10f, 0xe330, "94f4b39745476782bfdc5ba6d28784eab174b9376dfc730341fd2cb08edbaa1ae5e8dc5be27864a4b5b13b"}, {0x20, 0x110, 0x5, "b91f93cd34cccb41e9d368af9679cf0a"}, {0x38, 0x116, 0x7fffffff, "0061308c2e217e6479cc246bbb80c7185adf1d7e1eecf9f49577880c0a8645aaef77aeed79533a"}], 0x2b8}, 0x4}], 0x6, 0x4000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r3, 0x7fff}, 0x8) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000140)={@multicast2, @multicast1, @loopback}, &(0x7f0000000180)=0xc) 14:32:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x77020000, [{0xc0010015}]}) 14:32:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:47 executing program 3 (fault-call:3 fault-nth:21): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:47 executing program 2: syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfff, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="a7dbddbc277e7574c9272c0c4d32a0e884dc3fcf27c398d09f203476a76b65879a5b0f7d1db9478d4712a8abafbdf9e599954d8eb9f8af34a20ab196b54a554f870b230b0e2058971068eaf479722b7e72c93f2044", 0x55, 0x101}, {&(0x7f0000000280)="e1429f14036d1977dac0003c83d398d8beb2078fb632c820ca42d395e6d7183d34861ba040e1df03958bf97637bb9c0d90bc30d0d371fde044b8100f70e53d12515fcdeaa3d07b16004316da3ecba6adff5130e970e7152b6a7dda1b7b9320690298a5cca90ac14cd43c96e4579f48d8b0139075b067acaeba233fb787db194a9eb70957e017bac5e111594520a0cb908aa0f9b313c7", 0x96}, {&(0x7f0000000340)="974149fbc42881aeb74822472ee7d332f174b8feb9bc989afcfd7bdf657fe0ad60cf9c01c8b21cf7f5a9817a4f406387f0ac0987e489fa1a427a09db764a2dc55e1bf3ac9231a062a6ffbc82d83cb17b2a8ba6056fe35534fd8c3e74b31c8090b41294256055ac265c6187e59f2637c19957cefb7e9dd004f1542f021b55030fbbba3c6f", 0x84, 0x4}], 0x1080040, &(0x7f0000000480)={[{@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0xba}}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat'}}, {@context={'context', 0x3d, 'root'}}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x225, 0x0, 0x0, 0x0) 14:32:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x79000000, [{0xc0010015}]}) 14:32:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfxplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:47 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc0003000000850000000000000000000000000000e5ffffc100000000008004f800000000000000ca8e61094010b3c7a0d5888bb99392835089a14ded1cb53a5eed4d15baaf4d8c2248b397af97266f60bebe8559255d25ba6a6ee0a317bbf1330c50bc719c3a20e0299369e2c0c1cc77b817e9ab1b393424000000000000ba9fedae7e0cb0706d8ca75a3fd2fa4a252dbf60451e260b21bfb8d3c250f8c4bd77589fbad7b133"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffff000, 0x10d040) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f8000000000000"], 0x67) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1452.205510] FAULT_INJECTION: forcing a failure. [ 1452.205510] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.338356] CPU: 0 PID: 18381 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1452.345345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.354700] Call Trace: [ 1452.357304] dump_stack+0x172/0x1f0 [ 1452.360949] should_fail.cold+0xa/0x15 [ 1452.364850] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1452.369975] ? ___might_sleep+0x163/0x280 [ 1452.374145] __should_failslab+0x121/0x190 [ 1452.378400] should_failslab+0x9/0x14 [ 1452.382215] kmem_cache_alloc+0x2b2/0x6f0 [ 1452.386377] ? lookup_one_len+0x10e/0x1a0 [ 1452.390539] alloc_inode+0xb8/0x190 [ 1452.394181] new_inode_pseudo+0x19/0xf0 [ 1452.398169] new_inode+0x1f/0x40 [ 1452.401551] debugfs_get_inode+0x1a/0x130 [ 1452.405712] debugfs_create_dir+0x77/0x3c0 [ 1452.409969] hci_register_dev+0x299/0x860 [ 1452.414136] __vhci_create_device+0x2d0/0x5a0 [ 1452.418643] vhci_write+0x2d0/0x470 [ 1452.423253] __vfs_write+0x613/0x8e0 [ 1452.427005] ? kernel_read+0x120/0x120 [ 1452.430903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1452.436469] ? rw_verify_area+0x118/0x360 [ 1452.440631] vfs_write+0x20c/0x580 [ 1452.444192] ksys_write+0xea/0x1f0 [ 1452.447742] ? __ia32_sys_read+0xb0/0xb0 [ 1452.451817] ? do_syscall_64+0x26/0x610 [ 1452.455801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.461180] ? do_syscall_64+0x26/0x610 [ 1452.465180] __x64_sys_write+0x73/0xb0 [ 1452.469101] do_syscall_64+0x103/0x610 [ 1452.473020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.478218] RIP: 0033:0x457f29 [ 1452.481427] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1452.500331] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1452.508043] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1452.515339] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1452.522628] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1452.529901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 14:32:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7a010000, [{0xc0010015}]}) 14:32:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs\nlus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1452.537177] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7b010000, [{0xc0010015}]}) 14:32:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs#lus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x7f040000, [{0xc0010015}]}) 14:32:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000001c0)={0x3, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 14:32:59 executing program 3 (fault-call:3 fault-nth:22): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:32:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x800000c0, [{0xc0010015}]}) 14:32:59 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffe67, 0x0, 0x1802000, 0x0) 14:32:59 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs%lus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:59 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200000, 0x0) bind$rxrpc(r1, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000140)) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:32:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f8000000000000"], 0x67) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1463.757943] FAULT_INJECTION: forcing a failure. [ 1463.757943] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.789104] CPU: 1 PID: 18433 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1463.796205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.805593] Call Trace: [ 1463.808223] dump_stack+0x172/0x1f0 [ 1463.811894] should_fail.cold+0xa/0x15 [ 1463.815827] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1463.820972] ? ___might_sleep+0x163/0x280 [ 1463.825170] __should_failslab+0x121/0x190 [ 1463.829449] should_failslab+0x9/0x14 [ 1463.833291] kmem_cache_alloc+0x2b2/0x6f0 [ 1463.837475] ? lookup_one_len+0x10e/0x1a0 [ 1463.841673] alloc_inode+0xb8/0x190 [ 1463.845338] new_inode_pseudo+0x19/0xf0 [ 1463.849349] new_inode+0x1f/0x40 [ 1463.852748] debugfs_get_inode+0x1a/0x130 [ 1463.856928] debugfs_create_dir+0x77/0x3c0 [ 1463.861196] hci_register_dev+0x299/0x860 [ 1463.865387] __vhci_create_device+0x2d0/0x5a0 [ 1463.869919] vhci_write+0x2d0/0x470 [ 1463.873595] __vfs_write+0x613/0x8e0 [ 1463.877355] ? kernel_read+0x120/0x120 [ 1463.881275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1463.886859] ? rw_verify_area+0x118/0x360 [ 1463.891042] vfs_write+0x20c/0x580 [ 1463.894765] ksys_write+0xea/0x1f0 [ 1463.898343] ? __ia32_sys_read+0xb0/0xb0 [ 1463.902444] ? do_syscall_64+0x26/0x610 [ 1463.906459] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.911854] ? do_syscall_64+0x26/0x610 [ 1463.915860] __x64_sys_write+0x73/0xb0 [ 1463.919786] do_syscall_64+0x103/0x610 [ 1463.923713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.928945] RIP: 0033:0x457f29 [ 1463.932174] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.951129] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:32:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x80040000, [{0xc0010015}]}) 14:32:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x44180, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r1, 0x4a10bf79, 0x0, 0x0, 0x0, @ib={0x1b, 0xbb, 0x7, {"d598b9bf7483cd315f802d0068268be2"}, 0x200000000000, 0x105e, 0x8001}, @in={0x2, 0x4e23, @empty}}}, 0x118) [ 1463.958863] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1463.966158] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1463.973451] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1463.980765] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1463.988059] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:32:59 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs*lus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:59 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) sched_yield() r0 = socket$inet6(0xa, 0x0, 0x9) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x4, 0x185, 0x4, 0x3, 0x480000000}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={r1, 0x8, 0x3, 0x3f, 0x39, 0x8, 0x3, 0x101, {r2, @in={{0x2, 0x4e21, @remote}}, 0x4, 0x7, 0x2, 0x9, 0xfffffffffffffffe}}, &(0x7f0000000240)=0xb0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:32:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x80050000, [{0xc0010015}]}) 14:32:59 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs+lus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:09 executing program 3 (fault-call:3 fault-nth:23): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x810000c0, [{0xc0010015}]}) 14:33:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffd67, 0x0, 0x0, 0x0) 14:33:09 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs-lus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x2) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000000c0)=0x2) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000d9a6bd3700000000000000000000200000000900010056003800020000821123cc000300000000008500c62d000000000000d57608989a6a710000000000000008000000008004f80000000000000000000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000180)) bind$isdn_base(r0, &(0x7f0000000140)={0x22, 0x3, 0x9, 0x80000001, 0x3c02}, 0x6) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:09 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f8000000000000"], 0x67) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1474.596948] FAULT_INJECTION: forcing a failure. [ 1474.596948] name failslab, interval 1, probability 0, space 0, times 0 [ 1474.628599] CPU: 1 PID: 18483 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1474.635554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1474.635562] Call Trace: [ 1474.635596] dump_stack+0x172/0x1f0 [ 1474.635623] should_fail.cold+0xa/0x15 [ 1474.655112] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1474.660241] ? ___might_sleep+0x163/0x280 [ 1474.660263] __should_failslab+0x121/0x190 [ 1474.660285] should_failslab+0x9/0x14 [ 1474.660301] kmem_cache_alloc+0x2b2/0x6f0 [ 1474.660319] ? map_id_range_down+0x1ee/0x370 [ 1474.681102] ? __put_user_ns+0x70/0x70 [ 1474.685028] selinux_inode_alloc_security+0xb6/0x2a0 [ 1474.690168] security_inode_alloc+0x90/0xe0 [ 1474.694512] inode_init_always+0x56e/0xb50 [ 1474.698796] alloc_inode+0x83/0x190 [ 1474.702448] new_inode_pseudo+0x19/0xf0 [ 1474.706448] new_inode+0x1f/0x40 [ 1474.709839] debugfs_get_inode+0x1a/0x130 [ 1474.714009] debugfs_create_dir+0x77/0x3c0 [ 1474.714030] hci_register_dev+0x299/0x860 [ 1474.714053] __vhci_create_device+0x2d0/0x5a0 [ 1474.714092] vhci_write+0x2d0/0x470 [ 1474.730629] __vfs_write+0x613/0x8e0 [ 1474.734360] ? kernel_read+0x120/0x120 [ 1474.734378] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1474.734412] ? rw_verify_area+0x118/0x360 [ 1474.734430] vfs_write+0x20c/0x580 [ 1474.751555] ksys_write+0xea/0x1f0 [ 1474.755124] ? __ia32_sys_read+0xb0/0xb0 [ 1474.759206] ? do_syscall_64+0x26/0x610 [ 1474.763196] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1474.768592] ? do_syscall_64+0x26/0x610 [ 1474.772591] __x64_sys_write+0x73/0xb0 [ 1474.776494] do_syscall_64+0x103/0x610 [ 1474.780411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1474.785610] RIP: 0033:0x457f29 [ 1474.788811] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1474.807721] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1474.815435] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1474.822707] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1474.830023] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1474.837334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 14:33:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x820000c0, [{0xc0010015}]}) 14:33:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000, 0x0) r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000000)=0x771d5ae7) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x1, 0x1) connect$rds(r1, &(0x7f0000000280)={0x2, 0x4e24, @loopback}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x100000000, 0x50ac4cb7115a2912}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r3}, 0x8) [ 1474.844612] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:33:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs.lus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x59e8, {0x1, 0x6, 0xde6, 0xfffffffffffffefa, 0x9}, 0x7f, 0xfff}, 0xe) 14:33:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x830000c0, [{0xc0010015}]}) 14:33:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs0lus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:20 executing program 3 (fault-call:3 fault-nth:24): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x4000) write$P9_RVERSION(r0, &(0x7f0000000100)={0x13, 0x65, 0xffff, 0x1f, 0x24d, '9P2000'}, 0x13) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/144, 0x90) 14:33:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x840000c0, [{0xc0010015}]}) 14:33:20 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsXlus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x21e34145954841b0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000200)={0x7, 0x1, 'client1\x00', 0x7, "b4124d00d73254f6", "51cc2f026ff622239b5564840d2f00ba79dc2a624c76efc2a99f953059020d4c", 0x1, 0x1}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1485.480040] FAULT_INJECTION: forcing a failure. [ 1485.480040] name failslab, interval 1, probability 0, space 0, times 0 [ 1485.518780] CPU: 0 PID: 18533 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1485.525781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1485.535137] Call Trace: [ 1485.537741] dump_stack+0x172/0x1f0 [ 1485.541395] should_fail.cold+0xa/0x15 [ 1485.545301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1485.550417] ? ___might_sleep+0x163/0x280 [ 1485.554584] __should_failslab+0x121/0x190 [ 1485.558881] should_failslab+0x9/0x14 [ 1485.562686] __kmalloc_track_caller+0x2d8/0x740 [ 1485.567355] ? __d_instantiate+0x383/0x470 [ 1485.571597] ? find_held_lock+0x35/0x130 [ 1485.576010] ? kstrdup_const+0x66/0x80 [ 1485.579903] kstrdup+0x3a/0x70 [ 1485.583107] kstrdup_const+0x66/0x80 [ 1485.586820] kvasprintf_const+0x10e/0x190 [ 1485.590972] kobject_set_name_vargs+0x5b/0x150 [ 1485.595570] dev_set_name+0xbd/0xf0 [ 1485.599213] ? device_initialize+0x440/0x440 [ 1485.603636] hci_register_dev+0x2e0/0x860 [ 1485.607791] __vhci_create_device+0x2d0/0x5a0 [ 1485.612290] vhci_write+0x2d0/0x470 [ 1485.616063] __vfs_write+0x613/0x8e0 [ 1485.619822] ? kernel_read+0x120/0x120 [ 1485.623711] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1485.629267] ? rw_verify_area+0x118/0x360 [ 1485.633443] vfs_write+0x20c/0x580 [ 1485.637000] ksys_write+0xea/0x1f0 [ 1485.640558] ? __ia32_sys_read+0xb0/0xb0 [ 1485.644647] ? do_syscall_64+0x26/0x610 [ 1485.648623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1485.653984] ? do_syscall_64+0x26/0x610 [ 1485.657962] __x64_sys_write+0x73/0xb0 [ 1485.661884] do_syscall_64+0x103/0x610 [ 1485.665781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1485.670976] RIP: 0033:0x457f29 [ 1485.674182] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1485.693086] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1485.700802] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1485.708064] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1485.715370] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1485.722641] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 14:33:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) close(r0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) [ 1485.729929] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:33:21 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsclus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:21 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) rename(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000003c0)) [ 1485.840596] Bluetooth: Can't register HCI device 14:33:21 executing program 3 (fault-call:3 fault-nth:25): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1485.950207] FAULT_INJECTION: forcing a failure. [ 1485.950207] name failslab, interval 1, probability 0, space 0, times 0 [ 1485.967333] CPU: 0 PID: 18554 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1485.974279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1485.983635] Call Trace: [ 1485.986262] dump_stack+0x172/0x1f0 [ 1485.989911] should_fail.cold+0xa/0x15 [ 1485.993816] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1485.998940] ? ___might_sleep+0x163/0x280 [ 1486.003116] __should_failslab+0x121/0x190 [ 1486.007365] should_failslab+0x9/0x14 [ 1486.011177] __kmalloc_track_caller+0x2d8/0x740 [ 1486.015855] ? find_held_lock+0x35/0x130 [ 1486.019952] ? console_unlock+0x714/0x10a0 [ 1486.024196] ? kstrdup_const+0x66/0x80 [ 1486.028102] kstrdup+0x3a/0x70 [ 1486.031307] kstrdup_const+0x66/0x80 [ 1486.035033] __kernfs_new_node+0xb0/0x690 [ 1486.039197] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1486.043965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1486.049513] ? irq_work_claim+0x98/0xc0 [ 1486.053501] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1486.059050] ? irq_work_queue+0x36/0x1d0 [ 1486.063132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1486.068679] ? wake_up_klogd+0x99/0xd0 [ 1486.072585] kernfs_new_node+0x99/0x130 [ 1486.076576] kernfs_create_dir_ns+0x52/0x160 [ 1486.080998] sysfs_create_dir_ns+0x131/0x2a0 [ 1486.085423] ? sysfs_create_mount_point+0xa0/0xa0 [ 1486.090283] ? class_dir_child_ns_type+0xd/0x60 [ 1486.094985] kobject_add_internal.cold+0xe5/0x5d4 [ 1486.099870] kobject_add+0x150/0x1c0 [ 1486.103600] ? kset_create_and_add+0x1a0/0x1a0 [ 1486.108202] ? mutex_unlock+0xd/0x10 [ 1486.111934] device_add+0x3d5/0x18a0 [ 1486.115656] ? device_initialize+0x440/0x440 [ 1486.120088] ? get_device_parent.isra.0+0x570/0x570 [ 1486.125123] ? start_creating+0x163/0x1e0 [ 1486.129283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1486.134836] hci_register_dev+0x2e8/0x860 [ 1486.139004] __vhci_create_device+0x2d0/0x5a0 [ 1486.143506] vhci_write+0x2d0/0x470 [ 1486.147149] __vfs_write+0x613/0x8e0 [ 1486.150879] ? kernel_read+0x120/0x120 [ 1486.154774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1486.160339] ? rw_verify_area+0x118/0x360 [ 1486.164494] vfs_write+0x20c/0x580 [ 1486.168047] ksys_write+0xea/0x1f0 [ 1486.171612] ? __ia32_sys_read+0xb0/0xb0 [ 1486.175683] ? do_syscall_64+0x26/0x610 [ 1486.179667] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1486.185042] ? do_syscall_64+0x26/0x610 [ 1486.189042] __x64_sys_write+0x73/0xb0 [ 1486.192957] do_syscall_64+0x103/0x610 [ 1486.196860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1486.202082] RIP: 0033:0x457f29 [ 1486.205285] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1486.224187] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1486.231901] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1486.239174] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 14:33:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x85010000, [{0xc0010015}]}) [ 1486.246448] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1486.253721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1486.260995] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1486.270751] kobject_add_internal failed for hci1 (error: -12 parent: bluetooth) [ 1486.294557] Bluetooth: Can't register HCI device 14:33:21 executing program 3 (fault-call:3 fault-nth:26): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:21 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsdlus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1486.391724] FAULT_INJECTION: forcing a failure. [ 1486.391724] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.438881] CPU: 0 PID: 18561 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1486.445854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.455233] Call Trace: [ 1486.457828] dump_stack+0x172/0x1f0 [ 1486.461507] should_fail.cold+0xa/0x15 [ 1486.465403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1486.470515] ? ___might_sleep+0x163/0x280 [ 1486.474671] __should_failslab+0x121/0x190 [ 1486.478926] should_failslab+0x9/0x14 [ 1486.482733] __kmalloc_track_caller+0x2d8/0x740 [ 1486.487403] ? kernfs_activate+0x192/0x1f0 [ 1486.491647] ? kstrdup_const+0x66/0x80 [ 1486.495646] kstrdup+0x3a/0x70 [ 1486.498930] kstrdup_const+0x66/0x80 [ 1486.502651] __kernfs_new_node+0xb0/0x690 [ 1486.506802] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1486.511566] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1486.517020] ? find_held_lock+0x35/0x130 [ 1486.521118] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1486.526572] ? kasan_check_write+0x14/0x20 [ 1486.530818] kernfs_new_node+0x99/0x130 [ 1486.534798] kernfs_create_link+0xdd/0x250 [ 1486.539055] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1486.544370] sysfs_create_link+0x65/0xc0 [ 1486.548447] device_add+0x78f/0x18a0 [ 1486.552168] ? get_device_parent.isra.0+0x570/0x570 [ 1486.557206] ? start_creating+0x163/0x1e0 [ 1486.561359] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1486.566906] hci_register_dev+0x2e8/0x860 [ 1486.571073] __vhci_create_device+0x2d0/0x5a0 [ 1486.575581] vhci_write+0x2d0/0x470 [ 1486.579217] __vfs_write+0x613/0x8e0 [ 1486.582936] ? kernel_read+0x120/0x120 [ 1486.586822] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1486.592383] ? rw_verify_area+0x118/0x360 [ 1486.596575] vfs_write+0x20c/0x580 [ 1486.600135] ksys_write+0xea/0x1f0 [ 1486.603680] ? __ia32_sys_read+0xb0/0xb0 [ 1486.607757] ? do_syscall_64+0x26/0x610 [ 1486.611739] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1486.617112] ? do_syscall_64+0x26/0x610 [ 1486.621104] __x64_sys_write+0x73/0xb0 [ 1486.625018] do_syscall_64+0x103/0x610 [ 1486.628926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1486.634124] RIP: 0033:0x457f29 [ 1486.637316] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1486.656217] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1486.663941] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1486.671210] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1486.678497] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1486.685763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1486.693029] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:33:22 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsilus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1487.042781] Bluetooth: Can't register HCI device 14:33:22 executing program 3 (fault-call:3 fault-nth:27): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) [ 1487.276256] FAULT_INJECTION: forcing a failure. [ 1487.276256] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.298338] CPU: 0 PID: 18579 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1487.305286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.315095] Call Trace: [ 1487.317698] dump_stack+0x172/0x1f0 [ 1487.321345] should_fail.cold+0xa/0x15 [ 1487.325252] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1487.330375] ? ___might_sleep+0x163/0x280 [ 1487.334552] __should_failslab+0x121/0x190 [ 1487.338798] should_failslab+0x9/0x14 [ 1487.342614] kmem_cache_alloc+0x2b2/0x6f0 [ 1487.346773] ? memcpy+0x46/0x50 [ 1487.350080] ? kstrdup+0x5a/0x70 [ 1487.353462] __kernfs_new_node+0xef/0x690 [ 1487.357625] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1487.362397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1487.367942] ? irq_work_claim+0x98/0xc0 [ 1487.371926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1487.377475] ? irq_work_queue+0x36/0x1d0 [ 1487.381547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1487.387118] ? wake_up_klogd+0x99/0xd0 [ 1487.391022] kernfs_new_node+0x99/0x130 [ 1487.395010] kernfs_create_dir_ns+0x52/0x160 [ 1487.399436] sysfs_create_dir_ns+0x131/0x2a0 [ 1487.403854] ? sysfs_create_mount_point+0xa0/0xa0 [ 1487.408718] ? class_dir_child_ns_type+0xd/0x60 [ 1487.413404] kobject_add_internal.cold+0xe5/0x5d4 [ 1487.418513] kobject_add+0x150/0x1c0 [ 1487.422238] ? kset_create_and_add+0x1a0/0x1a0 [ 1487.426837] ? mutex_unlock+0xd/0x10 [ 1487.430568] device_add+0x3d5/0x18a0 [ 1487.434291] ? device_initialize+0x440/0x440 [ 1487.438724] ? get_device_parent.isra.0+0x570/0x570 [ 1487.443758] ? start_creating+0x163/0x1e0 [ 1487.447915] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1487.453467] hci_register_dev+0x2e8/0x860 [ 1487.457633] __vhci_create_device+0x2d0/0x5a0 [ 1487.462142] vhci_write+0x2d0/0x470 [ 1487.465782] __vfs_write+0x613/0x8e0 [ 1487.469510] ? kernel_read+0x120/0x120 [ 1487.473411] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1487.478974] ? rw_verify_area+0x118/0x360 [ 1487.483139] vfs_write+0x20c/0x580 [ 1487.486692] ksys_write+0xea/0x1f0 [ 1487.490243] ? __ia32_sys_read+0xb0/0xb0 [ 1487.494317] ? do_syscall_64+0x26/0x610 [ 1487.498301] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1487.503671] ? do_syscall_64+0x26/0x610 [ 1487.507663] __x64_sys_write+0x73/0xb0 [ 1487.511563] do_syscall_64+0x103/0x610 [ 1487.515464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1487.520659] RIP: 0033:0x457f29 [ 1487.523861] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1487.542764] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1487.550482] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1487.557753] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1487.565029] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1487.572304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1487.579577] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1487.654762] kobject_add_internal failed for hci1 (error: -12 parent: bluetooth) [ 1487.676282] Bluetooth: Can't register HCI device 14:33:25 executing program 4: syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x1000000000000009, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000440)="54a76db7cdd27a6559573bfe199e00d65c71a09d50ffbaec0389ddab7aaea85581e0a660a6bc71b81a21246d39c91b28fa2dad1f234dcf951734f1ad092939ca4a083237d290fee48c710268ad752183af7fdad7df248f535091ef5d748a2c8babd0fdc76328cc7b368de2bb0bdbf395c1284e827cb72372380eff9926a40957379e69061f2eb839f3fc83cf6c27899373eea5de84d4c1ae54d5847c693896cb9454847af666788f73b5cb9b932c8da3c35d7f8fba27e18510740643f85e004b3cb3df64afcbf694377e57542d79da2249895898af7a7d61e5291dbf85a528754ac47e3f7132ff6d0d89f9efd27e0c82d585c1ca9cc60929cb1c39d907d321aa7fde2e75c413ae88eebf602c6bf13c71654995d5fb3aa8489112093e6ea734d8f0d3bc219ab7f8fd9b8ab2e754c279f010de6fb7930cb44c8829eef90057b1bb9d61edf026c229ca307b78fcd3d4f94b495dae857944b5679a7454748e11efea8304ede4ffe67e408ea77417258a3f37fbe106648b4fef656b0d4c968cf2328e18a9ae4a7709dcbf5116f5353a8391d33ea95744487906253f2b0feda913e4c02f397ccc4f68ead65ae3de9af0cef66b429ded1ee5685cf5bd6720d1059d342260c18aae10df73d3cf6f3cbdfe3adaef67b5b0c669510f5bf1978bc01f3c93a36a0253c2eb7d2b3a2a7160490594c8dfbea4d9bb2497c3f577dca56c668c964dc88a980ecb74f85e1f5475a92ad303241a750051111a7732961ebf1aa6471c9fbedb38577f9acfd9a2932056c7291a4623b9e0d38a55683ca151f8f4f6401af438a4d84a8f5a0bfad8c0b146e6fa65fcabed8315bdec7998173224222c28ba4ef3b6157c57f4a90ebfd6736d138ee74b5c24a23de3bad281ca6b53efc6cee0c017a242ac20fc070a868f7b8560a81a2cbcc5c9d198479ef3f442c3fe5e734ddcdb71e12ad5465d93974294bd63ca9694400a115bf1debc3a68494052251d59a23b3f645047b2e49282a0232badf833f54bae4306653451ace2ce0862620892118dd0bbcff5228a03577466f7e7a9d0079110e0d797ac2b7f0faeeec9819b605c33431fd0229c2637aa42773998f33059ab47195236acf909d225976d082a1e3fd7fadaaf1d08afaeb1ed73ed94806965281674e7d1fcfcb502bf53a5fbef9e650aa1f852068ac276c59b41ca7203c2f079fa6f74119883d6161299b81a07a5e5dad96347286b756857775e8f13699a1f97888c10b6ff3d3b20c914e1154866d81f19453cf5dcb86e0c7d53a8b140bff09f8759d6b9d549903475887cdd1163b78eaab6f093c211cf6f6d3f97d257bf96398af65b6e8aaef808ebb623ce52b419992eee11426f1f4ae1dc6065dd6454558442a4ef9f36174fa0ce36af1ddf874b9ff9f9bb1042f4a3c2d70343e6f3dbd0bbe4150349fc48ca2f67620f0bcc6aff400edd2f4081838562ed48de987806a2fa216105387e91e49fcb147dd6cc16901b35f62a32a980c9780ee395a8e21985f588c044002d63a0453cae922a2723d4677bd95f65fc3627266209583ac4ce5d09e45d1ce9c97f3a536a07a75708518b7a11083ae909f6a32a8bbcc48c1e2cc05bdb2b7562a09e0b86179104d72f0859fbd0df0bab86d9dfcf4020db0b2f8f8a91ffecd0925e185ac004714ae8cc34f89577d1e830c4cf2250e5bc6e77430e0fa511bf74dd0c5a2901938f6cbf8da6b34d4f064d5018986ece7b59cab1b69e103d3b6cd2cb15f1eab635cb2734be246cf7c6eec5eca7419ede1b549658380b441169cb9202ae36e8e686d562b734d0b7429c0eea4aa78fdf0cc324c5daa161aa09526ace0efcbbebcea3406dfcf21b42e25e71a8b71c101484c2f7c1760ac2623f5f3c5c5e835662988171459e3af4a656b158b5668b31ba15ac34963cfa2eb5e44853700c907b46d5142c8bf49b2002a029b47fb90f012a7dcba3a09a8762fcd394643fe7e312c8c9c1f9c4eeaa5e04ba358a497e114e4ff9f90425844195316f6fb8b108a83bdc9f22e61ccba9949a2c8a52f25a54d4ddf501cfe44dabbcadf205ece381b49ae535ea9ed7761c28e9e90959e7e05275b1a05f23a3d55aac3d3bd95fbd4d8d54b837e35d6e13188ebd2a837861ae8383fd680add7d67f3aec4f3519da79a36387514679731a8bcef99eec8595f54147da555251da8ba76ca094239f87d74f9a097cbc3e7f3188fbbfad8f863ac3d2e479dc82f091dd251489f84874e11dfcf6bb0e3bb7215a1fe55615c391a4c9e522719399cc45739790baf8b6cb5a2b1ae56602177bc3f62a6f96fc3c17893f28f16de331ef3c404fa3e1a23012eedfe4af3a1f591487a6cb1187e31c9bf96e967ac8bd7ac57a2a70830538d7a798b76e1b1948ca78c2e4da815fcad48ce1ead3ecf623fa97b21e099079e7e89a63bbcda8f2747fca826ec9e3637bffa40d6ec7757c571f1ae2af5a3dc83c4157fbb877e5efbc93263fad3deb3a80e1be40b43276d23f857bf689da2a320bd16530abfc6dd4401d954c5499beb443bc53acd6b6958885bd1d50e74b6cb95abae3c366baf3e7e38e592dd3560291758498748960d676f13248e98aab6a0f93644ca2ec12f19fed393563ddcf7bd3f66724c3ab8206e4acc3852cb4dad4267ca27cc1dfad43b0d9f0efe7c8b09304e4c99570049418e6224463d96e1c45003c12d908790ae7be581738cf0b71f3d217995aae6090f5f7864ed53bf842e1358dd6d251d1a3fca440d48f1f5dc9baf8705e530df16a89cc741c03dc8297b5dfa4400b9dbae2985a5776b3470bc019ca7c73309604bbe040cf2eb9c43ae4f9a09cb243927b9ff4021876ab69cd554a797b84f5efdccd6ce57f5cd58e83b680f2317c7ccecb37f030d46df748a12323ccfaa0f09ae5f93a3d245d1bea2700649de4927a8bb81064f8d72faa84c2b9da0b59f04961c89e160dede5c896738e29e65f1b806d5d5eac59f537192a1b13874ca7daea579b2452c8208b011be318abbb191031ae771f19683b16469fa873d47302f2486203278799133bcb7b8f2561373874416ccf9ead95a260b3a55269dbf29fb24dacdb5d84b43148a915e41ffbfc1a8c7a689b575c04333d602f4bdda906f91f8b9c370415803e1d1a02b6fe84a3af3ba87e28e6d08be3ffd00a06f23eb21bcbc94ac6bc507b8c46b30386afb1cc0a9f62107ab3e5ffa9e3b6609f5c7ceccd28abb228f668b18cddf0c5da506a8351131dad5de7e6b5aff81fca5915164bd6ce6e5792b83e242b6c200542419d1bb58514bc688eebbebcfeef8ab40a73d09d989fd9533d9ccc17f20259ef0082065ca1ebf1e9ae7dc291141565c46eb8aad80d5c44afc430dbef712da3043545931e1d1b8653f8f892e5b5c765a591dcff677cbd18651c979f1548773deb153d2f2de6b5bf2cf70f7b276c59aed181c6e6cbc0f8cacd96159ed7eb4a4e40bc696f56dc6539cfdcfd61ed76bc86d55fe3f2534f5025fa924bf8c7b86a24fa1ff415b965d16b498ac4ff712df4d2c34a03696d44bbad1241cd02d047c94e264c026ac4f4c43245ae6aa892c515be858a81c955553dc2a160ab7c3e7f1faea38091fac39f7a8d56259ab9860bfd5e9f8548dad1a4211f17d7a45ac1b3d4a2521ee4ba9bd26c194a3b02859aeeb32bc55c1c198ee62b196848dfbaed76c32a7fadbb0082d13b0b79574fa532b35bdfaf3989fd9b4291b8bf4693fd2f7692a92c4560fa2744cc278ca0050549d6b9dec637f230341ea7f18f9e362cfff1afee761a3fb181e2087528ca157ecebfdd39f7b520972f67488e4d3304fd50fff2dd2cfb6825f24c2e462979f00ac5e1156561d7f9014a3133f05e22951decfe829f9f810b0d0294fdd73513fa770f1e5802a8de930717f1d7e482d113d82b4c99740834713bedaeb17b4bbfd76f6383ed2ba7f23e922d02a19f9fda62abe14beaf9ce7176ac55dfcdc929fd64eeb9aeae5b7c5c878b0a4f3bb1917bb5c8c6a01ea44d2428f8168a1249f5e863884aa1bddba480c10076652d22c59aa69edc5df249db871816a8f0f695cd5e38899e93d75276ec9a88293e836401d208cc832389263019bcdb10b8efefa0a60c33e54f40fbbe429137b885ac6eefbac4206169ebfc206343b7c558db10806b4cf32bef8c53f8e9eadd4a21bb5ba2c5862d60d119cc3a89cb7d390b69223ccb05a6017665c73be5a630235e90de0a5a45df7bf384299ab76b171e55c797f956b58ad3b45438317c707279cfad52e3dca31fcf764c4327d60db0fdcdb0f4eb824c4b4484eb7b05df2b4cfcd6697f01515eaf5abdd23dd81161957e824c617c9d3c50129dd2c059b263d9ebb605c85b65f63c9713c3a87b706240f0ebaa753c567b26f6bb82e1fe509d963cc237348bc2eb33d013ffd427a6fb96053aa772c130334953e20c77c45d406d7bd6b3a80678ca66f8ae428ad308d75e17a3bbe9899c9b9ed8807228ab88f48e7f31c807c754f0dde7c9e1a31aa2fd2d0a24aee699f2406f1f2495b1483c7cd2ade072335960163a69ef09fbf1b3ea7dae753d34b2f26ac8e0bcb0c8f5c48756bfcab42878c0b8252ca41f820c9cdfcd84ff861d7e0f6f9fb635c25a519cf7af35c65747262f83b58c73a2da42612e02547244d61d094b71df9cb04408486d2d28465bfe37f07fad3b476218667df51d892b1c92f8f16c149070133405d112abd6b2829a8401ab294e953d624164bf766ee98d4adc55ecf55aff266c770e777a42c8d03d46503ea673903f8b267f8c7b34fe3d72e463325ec7cd3fa7d6664928a8a6da474d23ec24854eebdae94af9964d499fdda57b578405a709ced76a93e1ad43654d653f65523ef724cf4cd4711b08918bcde03add4b8fa5959633eba373923747747140811cbd016e6138505325c3a4864f9181e9a4de314180d89c3c13ac31d93f06cbbefdec79d2e0d2b29f980f9fba64ce7504ad646dafddd49dd49853216e65d8323fd0f9a221e2cda544bd0810d6d7b27312af9508c7abb43d3e68241fddf79ba326ac42e968facdc3b5a628917898b93da67113910e9dfe1cbe186c29f926ed3ed0e8182499bdfb60f831019e4a7be1499c8edda2cd6eeec1e729461c3c71178f65ac6ba7325e4274cf7547f3cdcbbf929b732b6f0b355a41bc8951ae7d4ed433128d0ca9fb17b937fbb7bae50846d47973fec2680f359d5d14e54c4311fb439bb7fe97c94f753f49bb94dd47c89193d0665c1db1d9231fda6abddd4fc60790db7ebd5f7f79cd3d2f71b8be39aa08b4b489e50ec98922be78cdcefc774c9cb85bf8e25310cc1499bfea53c7682b52cb925a877e6e928e69c7310ed9d79781b9cf52fc675610ba70c1caeebd0217f86818a14ef59f537a2f4a77e2ad7a442047c8ad8c9eaf04c95faeaaeced514480ea066c0768f3a26ebf452a7570ecb9e1597152c32533231b3acdea3317f23767365cde971dda7efb4ae3103df758e560ab74ff18f2807d1fd00cd43bab8ae2597a62f135492beb4a96af91f7bba3f1f5bc3f3fd6ca8d7771b35f5f45a47e3166403057a30d2fedf0e8dbe3c26a3d7f8c588fa2c293ffda50aa4cd383ced99dfe41208102edce35b683b6c3fe6dbd750ee1d276e9fc4d4d0fa2ac55afac1ab2ba7ac32a367a8f27502376481a5f9880e73c90d91f33eaa4726db81f0b188c54f2081fe00e895cdf938f3da187972ca5809230f4997ea33def52eae249a0559587bc970ad2920cec44a624455d1604769948e9356e5053f08bda72603b8723b9d5b2217d7bcdd03fdd559bc2572", 0x1000, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r1, 0x38, 0x2, r2) 14:33:25 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsllus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:25 executing program 2: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)=0x8000020) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/ipc\x00\x90\x92\xb3\xe6L\xc9l`w_G-\x18p\xffMG\x1c~\xefC\xb9\xf6Vr\x11x\x1d\x1dh\xe1[\xfa\xb4Y\\\xe0\xd3\xb0\xbd[W\x06#\x836\xd9\r>R\x1c\xca!MR\xbf\x93\xcc,P\x90\xdf\x8d^\xd4\xecW\xab\xdc!\x029\x82\xc1\xba5o\xa0{r\xb5v\xea\xd8\x05\xb0IC\xa3\xfa\xf8\x87\x1d\x06\x1d\xd9\x9aR\xe3\x036\xa3\n\xcb\xec\xa7; \xa1\xe1w\x0f~\xebw\xb3\x1a\xf2\x00\xf2\x97\xb2l?\x10M\xfc\xa7\xd3\xa5#-=\xf5\xf8\x10\x1f\xb2\xfe\x80\xb5s\x05gI\x9a\x1do\x15\x1f\xd8\x93Wb\xe48M\xd9') 14:33:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x86010000, [{0xc0010015}]}) 14:33:25 executing program 3 (fault-call:3 fault-nth:28): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:25 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1489.663377] FAULT_INJECTION: forcing a failure. [ 1489.663377] name failslab, interval 1, probability 0, space 0, times 0 [ 1489.707038] CPU: 0 PID: 18590 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1489.714034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1489.723391] Call Trace: [ 1489.725995] dump_stack+0x172/0x1f0 [ 1489.729646] should_fail.cold+0xa/0x15 [ 1489.733563] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1489.738682] ? ___might_sleep+0x163/0x280 [ 1489.742857] __should_failslab+0x121/0x190 [ 1489.747118] should_failslab+0x9/0x14 [ 1489.750930] kmem_cache_alloc+0x2b2/0x6f0 [ 1489.755107] ? memcpy+0x46/0x50 [ 1489.758399] ? kstrdup+0x5a/0x70 [ 1489.761796] __kernfs_new_node+0xef/0x690 [ 1489.765956] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1489.770733] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1489.776198] ? find_held_lock+0x35/0x130 [ 1489.780272] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1489.785735] ? kasan_check_write+0x14/0x20 [ 1489.789981] kernfs_new_node+0x99/0x130 [ 1489.793973] kernfs_create_link+0xdd/0x250 [ 1489.798227] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1489.803520] sysfs_create_link+0x65/0xc0 [ 1489.807595] device_add+0x78f/0x18a0 [ 1489.811328] ? get_device_parent.isra.0+0x570/0x570 [ 1489.816361] ? start_creating+0x163/0x1e0 [ 1489.820557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1489.826132] hci_register_dev+0x2e8/0x860 [ 1489.830322] __vhci_create_device+0x2d0/0x5a0 [ 1489.834832] vhci_write+0x2d0/0x470 [ 1489.838488] __vfs_write+0x613/0x8e0 [ 1489.842229] ? kernel_read+0x120/0x120 [ 1489.846121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1489.851703] ? rw_verify_area+0x118/0x360 [ 1489.855876] vfs_write+0x20c/0x580 [ 1489.859443] ksys_write+0xea/0x1f0 [ 1489.863006] ? __ia32_sys_read+0xb0/0xb0 [ 1489.867100] ? do_syscall_64+0x26/0x610 [ 1489.871115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1489.876493] ? do_syscall_64+0x26/0x610 [ 1489.880480] __x64_sys_write+0x73/0xb0 [ 1489.884393] do_syscall_64+0x103/0x610 [ 1489.888314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1489.893514] RIP: 0033:0x457f29 [ 1489.896720] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1489.915626] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1489.923347] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1489.923359] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1489.937907] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1489.945177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1489.952449] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:33:25 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1489.989277] Bluetooth: Can't register HCI device 14:33:25 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsolus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x87010000, [{0xc0010015}]}) 14:33:25 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000100)={0x277, 0x7, 0x4, 0x6}, 0x6) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x75, 0xff, 0x1, 0x40}]}, 0x10) r2 = fcntl$getown(r1, 0x9) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000280)) recvmmsg(r0, &(0x7f0000003000)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdbc}}], 0x3a0, 0x0, 0x0) 14:33:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x87050000, [{0xc0010015}]}) 14:33:25 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsslus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:25 executing program 3 (fault-call:3 fault-nth:29): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:25 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\x02\x00\x00\x00\xf2f\xe3\xf6\xbd\xb1`s,\x8bf\xcb\x99\x18\xa6\xc1\x05Z\xb1.\xb8j6\xe9;\x1c\x1aU\xcaBS\xeca\x03\xd8<\xac\xa9e$') read$FUSE(r0, 0x0, 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 14:33:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8b000000, [{0xc0010015}]}) [ 1490.516366] FAULT_INJECTION: forcing a failure. [ 1490.516366] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.553430] CPU: 1 PID: 18633 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1490.560386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.569754] Call Trace: [ 1490.572370] dump_stack+0x172/0x1f0 [ 1490.576028] should_fail.cold+0xa/0x15 [ 1490.579954] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1490.585103] ? ___might_sleep+0x163/0x280 [ 1490.589298] __should_failslab+0x121/0x190 [ 1490.593565] should_failslab+0x9/0x14 [ 1490.597403] kmem_cache_alloc+0x2b2/0x6f0 [ 1490.601601] __kernfs_new_node+0xef/0x690 [ 1490.605789] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1490.610565] ? kernfs_activate+0x192/0x1f0 [ 1490.614907] ? lock_downgrade+0x880/0x880 [ 1490.619106] ? mutex_trylock+0x1e0/0x1e0 [ 1490.623193] ? lock_downgrade+0x880/0x880 [ 1490.627362] kernfs_new_node+0x99/0x130 [ 1490.631381] kernfs_create_dir_ns+0x52/0x160 [ 1490.635810] internal_create_group+0x7f8/0xc40 [ 1490.640427] ? remove_files.isra.0+0x190/0x190 [ 1490.645031] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1490.650600] ? kernfs_put+0x3e3/0x600 [ 1490.654448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1490.660009] ? kernfs_create_link+0x1d2/0x250 [ 1490.664619] sysfs_create_group+0x20/0x30 [ 1490.669237] dpm_sysfs_add+0x8b/0x270 [ 1490.673082] device_add+0xa20/0x18a0 [ 1490.676853] ? get_device_parent.isra.0+0x570/0x570 [ 1490.681914] ? start_creating+0x163/0x1e0 [ 1490.686102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1490.691663] hci_register_dev+0x2e8/0x860 [ 1490.695837] __vhci_create_device+0x2d0/0x5a0 [ 1490.700351] vhci_write+0x2d0/0x470 [ 1490.704014] __vfs_write+0x613/0x8e0 [ 1490.707753] ? kernel_read+0x120/0x120 [ 1490.711658] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1490.717233] ? rw_verify_area+0x118/0x360 [ 1490.721405] vfs_write+0x20c/0x580 [ 1490.725015] ksys_write+0xea/0x1f0 [ 1490.728602] ? __ia32_sys_read+0xb0/0xb0 [ 1490.732683] ? do_syscall_64+0x26/0x610 [ 1490.736697] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1490.742089] ? do_syscall_64+0x26/0x610 [ 1490.746111] __x64_sys_write+0x73/0xb0 [ 1490.750030] do_syscall_64+0x103/0x610 [ 1490.753960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1490.759177] RIP: 0033:0x457f29 [ 1490.762383] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1490.781312] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1490.789039] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1490.796330] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1490.803610] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1490.810898] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1490.818179] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:33:26 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsulus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x900d0000, [{0xc0010015}]}) [ 1490.940772] Bluetooth: Can't register HCI device 14:33:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:29 executing program 3 (fault-call:3 fault-nth:30): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYRES64, @ANYRES32=r0, @ANYRESDEC=r1, @ANYRES16=r0], 0x3e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x91040000, [{0xc0010015}]}) 14:33:29 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsxlus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1493.951814] FAULT_INJECTION: forcing a failure. [ 1493.951814] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.984536] CPU: 1 PID: 18658 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1493.991541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.000909] Call Trace: [ 1494.000936] dump_stack+0x172/0x1f0 [ 1494.000963] should_fail.cold+0xa/0x15 [ 1494.000986] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1494.001011] ? ___might_sleep+0x163/0x280 [ 1494.020370] __should_failslab+0x121/0x190 [ 1494.024619] should_failslab+0x9/0x14 [ 1494.028463] kmem_cache_alloc+0x2b2/0x6f0 [ 1494.032644] __kernfs_new_node+0xef/0x690 [ 1494.036802] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1494.041619] ? kernfs_activate+0x192/0x1f0 [ 1494.045874] ? lock_downgrade+0x880/0x880 [ 1494.050039] ? mutex_trylock+0x1e0/0x1e0 [ 1494.054110] ? lock_downgrade+0x880/0x880 [ 1494.058272] kernfs_new_node+0x99/0x130 [ 1494.062295] kernfs_create_dir_ns+0x52/0x160 [ 1494.066723] internal_create_group+0x7f8/0xc40 [ 1494.071331] ? remove_files.isra.0+0x190/0x190 [ 1494.075922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1494.081467] ? kernfs_put+0x3e3/0x600 [ 1494.085292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1494.090841] ? kernfs_create_link+0x1d2/0x250 [ 1494.095352] sysfs_create_group+0x20/0x30 [ 1494.099512] dpm_sysfs_add+0x8b/0x270 [ 1494.103327] device_add+0xa20/0x18a0 [ 1494.107053] ? get_device_parent.isra.0+0x570/0x570 [ 1494.112081] ? start_creating+0x163/0x1e0 [ 1494.116245] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1494.121821] hci_register_dev+0x2e8/0x860 [ 1494.125985] __vhci_create_device+0x2d0/0x5a0 [ 1494.130496] vhci_write+0x2d0/0x470 [ 1494.134142] __vfs_write+0x613/0x8e0 [ 1494.137877] ? kernel_read+0x120/0x120 [ 1494.141771] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1494.147344] ? rw_verify_area+0x118/0x360 [ 1494.151508] vfs_write+0x20c/0x580 [ 1494.155062] ksys_write+0xea/0x1f0 [ 1494.158622] ? __ia32_sys_read+0xb0/0xb0 [ 1494.162692] ? do_syscall_64+0x26/0x610 [ 1494.166679] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.172052] ? do_syscall_64+0x26/0x610 [ 1494.176046] __x64_sys_write+0x73/0xb0 [ 1494.179950] do_syscall_64+0x103/0x610 [ 1494.183860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.189055] RIP: 0033:0x457f29 [ 1494.192260] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.211172] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1494.218889] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1494.226160] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1494.233446] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1494.240730] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1494.248017] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1494.330650] Bluetooth: Can't register HCI device 14:33:29 executing program 3 (fault-call:3 fault-nth:31): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:29 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp\nus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1494.579835] FAULT_INJECTION: forcing a failure. [ 1494.579835] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.613342] CPU: 0 PID: 18690 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1494.620301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.629650] Call Trace: [ 1494.632251] dump_stack+0x172/0x1f0 [ 1494.635899] should_fail.cold+0xa/0x15 [ 1494.639802] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1494.644917] ? ___might_sleep+0x163/0x280 [ 1494.649100] __should_failslab+0x121/0x190 [ 1494.653359] should_failslab+0x9/0x14 [ 1494.657164] kmem_cache_alloc+0x2b2/0x6f0 [ 1494.661344] __kernfs_new_node+0xef/0x690 [ 1494.665529] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1494.670311] ? lock_downgrade+0x880/0x880 [ 1494.674467] ? mutex_trylock+0x1e0/0x1e0 [ 1494.678540] kernfs_new_node+0x99/0x130 [ 1494.682526] __kernfs_create_file+0x51/0x340 [ 1494.686989] sysfs_add_file_mode_ns+0x222/0x560 [ 1494.691678] sysfs_merge_group+0x1a0/0x340 [ 1494.695924] ? sysfs_mount+0x1e0/0x1e0 [ 1494.699819] ? kernfs_put+0x3e3/0x600 [ 1494.703640] dpm_sysfs_add+0x21d/0x270 [ 1494.707537] device_add+0xa20/0x18a0 [ 1494.711270] ? get_device_parent.isra.0+0x570/0x570 [ 1494.716294] ? start_creating+0x163/0x1e0 [ 1494.720454] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1494.726001] hci_register_dev+0x2e8/0x860 [ 1494.730173] __vhci_create_device+0x2d0/0x5a0 [ 1494.734677] vhci_write+0x2d0/0x470 [ 1494.738315] __vfs_write+0x613/0x8e0 [ 1494.742035] ? kernel_read+0x120/0x120 [ 1494.745930] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1494.751493] ? rw_verify_area+0x118/0x360 [ 1494.755689] vfs_write+0x20c/0x580 [ 1494.759240] ksys_write+0xea/0x1f0 [ 1494.762793] ? __ia32_sys_read+0xb0/0xb0 [ 1494.766899] ? do_syscall_64+0x26/0x610 [ 1494.770877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.776257] ? do_syscall_64+0x26/0x610 [ 1494.780245] __x64_sys_write+0x73/0xb0 [ 1494.784140] do_syscall_64+0x103/0x610 [ 1494.788041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.793249] RIP: 0033:0x457f29 [ 1494.796447] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.815376] RSP: 002b:00007fab7f235c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1494.823095] RAX: ffffffffffffffda RBX: 00007fab7f235c90 RCX: 0000000000457f29 14:33:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x9e000000, [{0xc0010015}]}) 14:33:30 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp#us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1494.830368] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000003 [ 1494.837640] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1494.844912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2366d4 [ 1494.852185] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000004 14:33:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x9f000040, [{0xc0010015}]}) 14:33:30 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp%us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xa0010000, [{0xc0010015}]}) [ 1495.342284] Bluetooth: Can't register HCI device 14:33:33 executing program 3 (fault-call:3 fault-nth:32): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:33 executing program 2 (fault-call:1 fault-nth:0): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:33 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp*us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xa00d0000, [{0xc0010015}]}) 14:33:33 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2010000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001500)='/dev/dsp\x00', 0x103201, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f0000000440)={0x78, 0x0, 0x7, {0x800, 0xf5, 0x0, {0x2, 0x8, 0x100000000, 0x759471d1, 0x80, 0x7, 0x1, 0x101, 0x5, 0x80000000, 0x0, r2, r3, 0x70000, 0x1}}}, 0x78) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_PPC_GET_SMMU_INFO(r4, 0x8250aea6, &(0x7f0000000200)=""/120) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) ioctl$EVIOCGEFFECTS(r5, 0x80044584, &(0x7f00000004c0)=""/4096) 14:33:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1497.882134] FAULT_INJECTION: forcing a failure. [ 1497.882134] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.917563] CPU: 0 PID: 18718 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1497.924536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.933895] Call Trace: [ 1497.936498] dump_stack+0x172/0x1f0 [ 1497.940148] should_fail.cold+0xa/0x15 [ 1497.940173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1497.940202] ? ___might_sleep+0x163/0x280 [ 1497.940224] __should_failslab+0x121/0x190 [ 1497.940244] should_failslab+0x9/0x14 [ 1497.940262] kmem_cache_alloc+0x2b2/0x6f0 [ 1497.940280] ? lock_downgrade+0x880/0x880 [ 1497.948626] FAULT_INJECTION: forcing a failure. [ 1497.948626] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.949281] __kernfs_new_node+0xef/0x690 [ 1497.949301] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1497.949319] ? wait_for_completion+0x440/0x440 [ 1497.980978] ? mutex_unlock+0xd/0x10 [ 1497.981002] ? kernfs_activate+0x192/0x1f0 [ 1497.981023] kernfs_new_node+0x99/0x130 [ 1497.981043] __kernfs_create_file+0x51/0x340 [ 1497.981086] sysfs_add_file_mode_ns+0x222/0x560 [ 1498.006547] sysfs_merge_group+0x1a0/0x340 [ 1498.006564] ? sysfs_mount+0x1e0/0x1e0 [ 1498.006576] ? kernfs_put+0x3e3/0x600 [ 1498.006613] dpm_sysfs_add+0x21d/0x270 [ 1498.015687] device_add+0xa20/0x18a0 [ 1498.015715] ? get_device_parent.isra.0+0x570/0x570 [ 1498.031573] ? start_creating+0x163/0x1e0 [ 1498.044468] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.050018] hci_register_dev+0x2e8/0x860 [ 1498.054187] __vhci_create_device+0x2d0/0x5a0 [ 1498.058691] vhci_write+0x2d0/0x470 [ 1498.062336] __vfs_write+0x613/0x8e0 [ 1498.066081] ? kernel_read+0x120/0x120 [ 1498.069974] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1498.075539] ? rw_verify_area+0x118/0x360 [ 1498.079709] vfs_write+0x20c/0x580 [ 1498.079731] ksys_write+0xea/0x1f0 [ 1498.079748] ? __ia32_sys_read+0xb0/0xb0 [ 1498.086834] ? do_syscall_64+0x26/0x610 [ 1498.094856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.100243] ? do_syscall_64+0x26/0x610 [ 1498.104254] __x64_sys_write+0x73/0xb0 [ 1498.108182] do_syscall_64+0x103/0x610 [ 1498.112111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.117303] RIP: 0033:0x457f29 [ 1498.120501] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.139405] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1498.147114] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1498.154393] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1498.161664] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1498.169024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1498.176295] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1498.198391] CPU: 1 PID: 18733 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1498.205344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.205350] Call Trace: [ 1498.205383] dump_stack+0x172/0x1f0 [ 1498.205406] should_fail.cold+0xa/0x15 [ 1498.205425] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1498.205447] ? ___might_sleep+0x163/0x280 [ 1498.205493] __should_failslab+0x121/0x190 [ 1498.217469] should_failslab+0x9/0x14 [ 1498.217487] __kmalloc+0x2dc/0x740 [ 1498.217507] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1498.217523] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.217539] ? strnlen_user+0x1f0/0x280 [ 1498.217555] ? __x64_sys_memfd_create+0x13c/0x470 [ 1498.217572] __x64_sys_memfd_create+0x13c/0x470 [ 1498.225079] ? memfd_fcntl+0x1550/0x1550 [ 1498.225098] ? do_syscall_64+0x26/0x610 [ 1498.225127] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1498.225145] ? trace_hardirqs_on+0x67/0x230 [ 1498.225164] do_syscall_64+0x103/0x610 [ 1498.225187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.225201] RIP: 0033:0x457f29 [ 1498.234463] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.234472] RSP: 002b:00007f15a1cd7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1498.234488] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1498.234497] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1498.234507] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00000000fbad8001 14:33:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:33 executing program 2 (fault-call:1 fault-nth:1): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1498.234516] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15a1cd86d4 [ 1498.234526] R13: 00000000004c67fe R14: 00000000004dbda8 R15: 0000000000000003 14:33:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xb0000040, [{0xc0010015}]}) [ 1498.418336] Bluetooth: Can't register HCI device 14:33:33 executing program 3 (fault-call:3 fault-nth:33): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:33 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp+us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1498.512053] FAULT_INJECTION: forcing a failure. [ 1498.512053] name failslab, interval 1, probability 0, space 0, times 0 [ 1498.549505] FAULT_INJECTION: forcing a failure. [ 1498.549505] name failslab, interval 1, probability 0, space 0, times 0 [ 1498.558509] CPU: 0 PID: 18745 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1498.567725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.577081] Call Trace: [ 1498.579675] dump_stack+0x172/0x1f0 [ 1498.583309] should_fail.cold+0xa/0x15 [ 1498.587203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1498.592314] ? ___might_sleep+0x163/0x280 [ 1498.596476] __should_failslab+0x121/0x190 [ 1498.600724] ? shmem_destroy_callback+0xc0/0xc0 [ 1498.605395] should_failslab+0x9/0x14 [ 1498.609198] kmem_cache_alloc+0x2b2/0x6f0 [ 1498.613354] ? __alloc_fd+0x430/0x530 [ 1498.617161] ? shmem_destroy_callback+0xc0/0xc0 [ 1498.621829] shmem_alloc_inode+0x1c/0x50 [ 1498.625917] alloc_inode+0x66/0x190 [ 1498.629545] new_inode_pseudo+0x19/0xf0 [ 1498.633517] new_inode+0x1f/0x40 [ 1498.636883] shmem_get_inode+0x84/0x780 [ 1498.640881] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1498.645729] shmem_file_setup+0x66/0x90 [ 1498.649707] __x64_sys_memfd_create+0x2a2/0x470 [ 1498.654379] ? memfd_fcntl+0x1550/0x1550 [ 1498.658443] ? do_syscall_64+0x26/0x610 [ 1498.662420] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1498.667003] ? trace_hardirqs_on+0x67/0x230 [ 1498.671415] do_syscall_64+0x103/0x610 [ 1498.675310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.680497] RIP: 0033:0x457f29 [ 1498.683688] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.702584] RSP: 002b:00007f15a1cd7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1498.710292] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1498.717558] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1498.724830] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00000000fbad8001 [ 1498.732115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15a1cd86d4 [ 1498.739411] R13: 00000000004c67fe R14: 00000000004dbda8 R15: 0000000000000004 [ 1498.791574] CPU: 1 PID: 18749 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1498.798549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.798556] Call Trace: [ 1498.798592] dump_stack+0x172/0x1f0 [ 1498.798620] should_fail.cold+0xa/0x15 [ 1498.818091] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1498.818115] ? ___might_sleep+0x163/0x280 [ 1498.818137] __should_failslab+0x121/0x190 [ 1498.818157] should_failslab+0x9/0x14 [ 1498.835444] kmem_cache_alloc+0x2b2/0x6f0 [ 1498.839624] ? lock_downgrade+0x880/0x880 [ 1498.843823] __kernfs_new_node+0xef/0x690 [ 1498.848002] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1498.852784] ? wait_for_completion+0x440/0x440 [ 1498.857391] ? mutex_unlock+0xd/0x10 [ 1498.861127] ? kernfs_activate+0x192/0x1f0 [ 1498.865386] kernfs_new_node+0x99/0x130 [ 1498.869388] __kernfs_create_file+0x51/0x340 [ 1498.873830] sysfs_add_file_mode_ns+0x222/0x560 [ 1498.878526] sysfs_merge_group+0x1a0/0x340 [ 1498.882836] ? sysfs_mount+0x1e0/0x1e0 [ 1498.886742] ? kernfs_put+0x3e3/0x600 [ 1498.890587] dpm_sysfs_add+0x21d/0x270 [ 1498.894501] device_add+0xa20/0x18a0 [ 1498.898239] ? get_device_parent.isra.0+0x570/0x570 [ 1498.903287] ? start_creating+0x163/0x1e0 [ 1498.907458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.913059] hci_register_dev+0x2e8/0x860 [ 1498.917258] __vhci_create_device+0x2d0/0x5a0 [ 1498.921795] vhci_write+0x2d0/0x470 [ 1498.925450] __vfs_write+0x613/0x8e0 [ 1498.929197] ? kernel_read+0x120/0x120 [ 1498.933113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1498.938699] ? rw_verify_area+0x118/0x360 [ 1498.942882] vfs_write+0x20c/0x580 [ 1498.946483] ksys_write+0xea/0x1f0 [ 1498.950044] ? __ia32_sys_read+0xb0/0xb0 [ 1498.954174] ? do_syscall_64+0x26/0x610 [ 1498.958169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.963550] ? do_syscall_64+0x26/0x610 [ 1498.967561] __x64_sys_write+0x73/0xb0 [ 1498.971478] do_syscall_64+0x103/0x610 [ 1498.975394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.980602] RIP: 0033:0x457f29 [ 1498.983825] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1499.002750] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1499.010475] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1499.017756] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1499.025036] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1499.032330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 14:33:34 executing program 2 (fault-call:1 fault-nth:2): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xb7000040, [{0xc0010015}]}) [ 1499.039617] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1499.080165] Bluetooth: Can't register HCI device [ 1499.198704] FAULT_INJECTION: forcing a failure. [ 1499.198704] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.235101] CPU: 0 PID: 18764 Comm: syz-executor.2 Not tainted 5.0.0+ #10 14:33:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000000, [{0xc0010015}]}) [ 1499.242061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.251425] Call Trace: [ 1499.254045] dump_stack+0x172/0x1f0 [ 1499.257707] should_fail.cold+0xa/0x15 [ 1499.261648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1499.266767] ? ___might_sleep+0x163/0x280 [ 1499.270946] __should_failslab+0x121/0x190 [ 1499.275200] should_failslab+0x9/0x14 [ 1499.279014] kmem_cache_alloc+0x2b2/0x6f0 [ 1499.283173] ? map_id_range_down+0x1ee/0x370 [ 1499.287590] ? __put_user_ns+0x70/0x70 [ 1499.291509] ? shmem_alloc_inode+0x1c/0x50 [ 1499.295788] selinux_inode_alloc_security+0xb6/0x2a0 [ 1499.300933] security_inode_alloc+0x90/0xe0 [ 1499.305262] inode_init_always+0x56e/0xb50 [ 1499.309506] alloc_inode+0x83/0x190 [ 1499.313620] new_inode_pseudo+0x19/0xf0 [ 1499.317612] new_inode+0x1f/0x40 [ 1499.320999] shmem_get_inode+0x84/0x780 [ 1499.324986] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1499.329839] shmem_file_setup+0x66/0x90 [ 1499.333825] __x64_sys_memfd_create+0x2a2/0x470 [ 1499.338504] ? memfd_fcntl+0x1550/0x1550 [ 1499.342580] ? do_syscall_64+0x26/0x610 [ 1499.346565] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1499.351166] ? trace_hardirqs_on+0x67/0x230 [ 1499.355499] do_syscall_64+0x103/0x610 [ 1499.359400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.364588] RIP: 0033:0x457f29 [ 1499.367787] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1499.386798] RSP: 002b:00007f15a1cd7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1499.394523] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1499.401796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1499.409086] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00000000fbad8001 [ 1499.416360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15a1cd86d4 [ 1499.423834] R13: 00000000004c67fe R14: 00000000004dbda8 R15: 0000000000000003 14:33:34 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp-us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000080, [{0xc0010015}]}) 14:33:37 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xff, 0x1) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x2, 0x4) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:37 executing program 3 (fault-call:3 fault-nth:34): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:37 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp.us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000081, [{0xc0010015}]}) 14:33:37 executing program 2 (fault-call:1 fault-nth:3): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1501.963520] FAULT_INJECTION: forcing a failure. [ 1501.963520] name failslab, interval 1, probability 0, space 0, times 0 [ 1502.048496] CPU: 0 PID: 18780 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1502.055495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.055503] Call Trace: [ 1502.055529] dump_stack+0x172/0x1f0 [ 1502.055554] should_fail.cold+0xa/0x15 [ 1502.075009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1502.080150] ? ___might_sleep+0x163/0x280 [ 1502.084307] __should_failslab+0x121/0x190 [ 1502.088554] should_failslab+0x9/0x14 [ 1502.092380] kmem_cache_alloc+0x2b2/0x6f0 [ 1502.096558] ? lock_downgrade+0x880/0x880 [ 1502.100716] __kernfs_new_node+0xef/0x690 [ 1502.104867] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1502.109624] ? wait_for_completion+0x440/0x440 [ 1502.114214] ? mutex_unlock+0xd/0x10 [ 1502.117926] ? kernfs_activate+0x192/0x1f0 [ 1502.122177] kernfs_new_node+0x99/0x130 [ 1502.126157] __kernfs_create_file+0x51/0x340 [ 1502.130572] sysfs_add_file_mode_ns+0x222/0x560 [ 1502.135252] sysfs_merge_group+0x1a0/0x340 [ 1502.139492] ? sysfs_mount+0x1e0/0x1e0 [ 1502.143382] ? kernfs_put+0x3e3/0x600 [ 1502.147196] dpm_sysfs_add+0x21d/0x270 [ 1502.151104] device_add+0xa20/0x18a0 [ 1502.154826] ? get_device_parent.isra.0+0x570/0x570 [ 1502.159850] ? start_creating+0x163/0x1e0 [ 1502.164005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1502.169550] hci_register_dev+0x2e8/0x860 [ 1502.173711] __vhci_create_device+0x2d0/0x5a0 [ 1502.178219] vhci_write+0x2d0/0x470 [ 1502.181859] __vfs_write+0x613/0x8e0 [ 1502.185577] ? kernel_read+0x120/0x120 [ 1502.189472] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1502.195029] ? rw_verify_area+0x118/0x360 [ 1502.199186] vfs_write+0x20c/0x580 [ 1502.202754] ksys_write+0xea/0x1f0 [ 1502.206309] ? __ia32_sys_read+0xb0/0xb0 [ 1502.210377] ? do_syscall_64+0x26/0x610 [ 1502.214441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.219811] ? do_syscall_64+0x26/0x610 [ 1502.223796] __x64_sys_write+0x73/0xb0 [ 1502.227704] do_syscall_64+0x103/0x610 [ 1502.231594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.236782] RIP: 0033:0x457f29 [ 1502.239977] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1502.258879] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1502.266602] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1502.273869] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1502.281163] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1502.288433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 14:33:37 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = request_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)=')\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)="437e50363239b4193ca8ea3066c44ec18d8d91ec2ec360d8f65d5a139202c547ea01bd7d2894f885768ea2f6d44da4c20d7f98d61cee9796bfd9fcc322c9c27a749cc26e2021edc5be46723a359e917c5c88211b98d3d7c2d74073ec786b664eabb8cd2309f15f4f32d292eabfe1c97346992428bec92f99635b61ed10427c605b7a96db905675818846ee75409714c68a099edfd088382f3f917a25f3a18e9eb46e598d129c41c461214db52e701f8cb8bf44b4d66aa87929d75a9b6090625a6be31994bd166178332b85c9a5dc26edde922fa792fdb2d13be5d2aef189b0700516627b31ab83f3e691f7d87c40", 0xee, r1) write$evdev(0xffffffffffffffff, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900000200000000000000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r0) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1502.295718] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1502.311376] FAULT_INJECTION: forcing a failure. [ 1502.311376] name failslab, interval 1, probability 0, space 0, times 0 [ 1502.360456] CPU: 1 PID: 18794 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1502.367442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.376808] Call Trace: [ 1502.379441] dump_stack+0x172/0x1f0 [ 1502.383116] should_fail.cold+0xa/0x15 [ 1502.387038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1502.392178] ? ___might_sleep+0x163/0x280 [ 1502.396362] __should_failslab+0x121/0x190 [ 1502.400637] should_failslab+0x9/0x14 [ 1502.404459] kmem_cache_alloc+0x2b2/0x6f0 [ 1502.404477] ? current_time+0x6b/0x140 [ 1502.404495] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1502.404515] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1502.404537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1502.412593] ? timespec64_trunc+0xf0/0x180 [ 1502.432052] __d_alloc+0x2e/0x8c0 [ 1502.435529] d_alloc_pseudo+0x1e/0x30 [ 1502.439346] alloc_file_pseudo+0xe2/0x280 [ 1502.443515] ? alloc_file+0x4d0/0x4d0 [ 1502.447331] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1502.452893] __shmem_file_setup.part.0+0x108/0x2b0 [ 1502.457849] shmem_file_setup+0x66/0x90 [ 1502.461870] __x64_sys_memfd_create+0x2a2/0x470 [ 1502.466550] ? memfd_fcntl+0x1550/0x1550 [ 1502.470633] ? do_syscall_64+0x26/0x610 [ 1502.474623] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1502.479221] ? trace_hardirqs_on+0x67/0x230 [ 1502.483589] do_syscall_64+0x103/0x610 [ 1502.487490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.492686] RIP: 0033:0x457f29 14:33:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000082, [{0xc0010015}]}) [ 1502.495884] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1502.514813] RSP: 002b:00007f15a1cf8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1502.522547] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1502.529842] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1502.537140] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1502.544414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15a1cf96d4 [ 1502.551685] R13: 00000000004c67fe R14: 00000000004dbda8 R15: 0000000000000003 14:33:38 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp/us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:38 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1502.690607] Bluetooth: Can't register HCI device 14:33:38 executing program 3 (fault-call:3 fault-nth:35): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:38 executing program 2 (fault-call:1 fault-nth:4): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:38 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:38 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp0us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1503.020696] FAULT_INJECTION: forcing a failure. [ 1503.020696] name failslab, interval 1, probability 0, space 0, times 0 [ 1503.069129] CPU: 0 PID: 18835 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1503.076096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.085455] Call Trace: [ 1503.088056] dump_stack+0x172/0x1f0 [ 1503.091717] should_fail.cold+0xa/0x15 [ 1503.095624] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1503.100755] ? ___might_sleep+0x163/0x280 [ 1503.104944] __should_failslab+0x121/0x190 [ 1503.109193] should_failslab+0x9/0x14 [ 1503.113002] kmem_cache_alloc+0x2b2/0x6f0 [ 1503.117165] ? lock_downgrade+0x880/0x880 [ 1503.121328] __kernfs_new_node+0xef/0x690 [ 1503.125487] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1503.130252] ? wait_for_completion+0x440/0x440 [ 1503.134854] ? mutex_unlock+0xd/0x10 [ 1503.138572] ? kernfs_activate+0x192/0x1f0 [ 1503.142819] kernfs_new_node+0x99/0x130 [ 1503.146805] __kernfs_create_file+0x51/0x340 [ 1503.151228] sysfs_add_file_mode_ns+0x222/0x560 [ 1503.155916] sysfs_merge_group+0x1a0/0x340 [ 1503.160168] ? sysfs_mount+0x1e0/0x1e0 [ 1503.164072] ? kernfs_put+0x3e3/0x600 [ 1503.167908] dpm_sysfs_add+0x21d/0x270 [ 1503.171808] device_add+0xa20/0x18a0 [ 1503.175538] ? get_device_parent.isra.0+0x570/0x570 [ 1503.180569] ? start_creating+0x163/0x1e0 [ 1503.184733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1503.190282] hci_register_dev+0x2e8/0x860 [ 1503.194460] __vhci_create_device+0x2d0/0x5a0 [ 1503.198971] vhci_write+0x2d0/0x470 [ 1503.202611] __vfs_write+0x613/0x8e0 [ 1503.206337] ? kernel_read+0x120/0x120 [ 1503.210260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1503.216002] ? rw_verify_area+0x118/0x360 [ 1503.220162] vfs_write+0x20c/0x580 [ 1503.223713] ksys_write+0xea/0x1f0 [ 1503.227267] ? __ia32_sys_read+0xb0/0xb0 [ 1503.231343] ? do_syscall_64+0x26/0x610 [ 1503.235330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.240346] FAULT_INJECTION: forcing a failure. [ 1503.240346] name failslab, interval 1, probability 0, space 0, times 0 [ 1503.240709] ? do_syscall_64+0x26/0x610 [ 1503.240736] __x64_sys_write+0x73/0xb0 [ 1503.259773] do_syscall_64+0x103/0x610 [ 1503.263677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.268868] RIP: 0033:0x457f29 [ 1503.272089] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1503.291013] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1503.298721] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1503.305989] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1503.313699] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1503.320968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1503.328238] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1503.336013] CPU: 0 PID: 18843 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1503.342994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.352347] Call Trace: [ 1503.354956] dump_stack+0x172/0x1f0 [ 1503.358599] should_fail.cold+0xa/0x15 [ 1503.362503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1503.367624] ? ___might_sleep+0x163/0x280 [ 1503.371786] __should_failslab+0x121/0x190 [ 1503.376047] should_failslab+0x9/0x14 [ 1503.379878] kmem_cache_alloc+0x2b2/0x6f0 [ 1503.384045] __alloc_file+0x27/0x300 [ 1503.387826] alloc_empty_file+0x72/0x170 [ 1503.391899] alloc_file+0x5e/0x4d0 [ 1503.395455] alloc_file_pseudo+0x189/0x280 [ 1503.399729] ? alloc_file+0x4d0/0x4d0 [ 1503.403552] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1503.409133] __shmem_file_setup.part.0+0x108/0x2b0 [ 1503.414112] shmem_file_setup+0x66/0x90 [ 1503.418320] __x64_sys_memfd_create+0x2a2/0x470 [ 1503.423009] ? memfd_fcntl+0x1550/0x1550 [ 1503.427081] ? do_syscall_64+0x26/0x610 [ 1503.431065] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1503.435683] ? trace_hardirqs_on+0x67/0x230 [ 1503.440022] do_syscall_64+0x103/0x610 [ 1503.443916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.449106] RIP: 0033:0x457f29 [ 1503.452303] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1503.471201] RSP: 002b:00007f15a1cd7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1503.478919] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1503.486207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1503.493471] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00000000fbad8001 [ 1503.500737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15a1cd86d4 [ 1503.508000] R13: 00000000004c67fe R14: 00000000004dbda8 R15: 0000000000000003 [ 1503.539330] Bluetooth: Can't register HCI device 14:33:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:41 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x28222e0d0635c53b, &(0x7f00000000c0)=0x1, 0x4) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:41 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspLus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:41 executing program 2 (fault-call:1 fault-nth:5): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:41 executing program 3 (fault-call:3 fault-nth:36): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000083, [{0xc0010015}]}) [ 1506.082177] FAULT_INJECTION: forcing a failure. [ 1506.082177] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.111071] CPU: 0 PID: 18851 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1506.118026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.127379] Call Trace: [ 1506.129973] dump_stack+0x172/0x1f0 [ 1506.133624] should_fail.cold+0xa/0x15 [ 1506.137518] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1506.142630] ? ___might_sleep+0x163/0x280 [ 1506.146783] __should_failslab+0x121/0x190 [ 1506.151022] should_failslab+0x9/0x14 [ 1506.154829] kmem_cache_alloc+0x2b2/0x6f0 [ 1506.158982] ? lock_downgrade+0x880/0x880 [ 1506.163135] __kernfs_new_node+0xef/0x690 [ 1506.167300] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1506.172071] ? wait_for_completion+0x440/0x440 [ 1506.176670] ? mutex_unlock+0xd/0x10 [ 1506.180381] ? kernfs_activate+0x192/0x1f0 [ 1506.184619] kernfs_new_node+0x99/0x130 [ 1506.188607] __kernfs_create_file+0x51/0x340 [ 1506.193018] sysfs_add_file_mode_ns+0x222/0x560 [ 1506.197699] sysfs_merge_group+0x1a0/0x340 [ 1506.201937] ? sysfs_mount+0x1e0/0x1e0 [ 1506.205821] ? kernfs_put+0x3e3/0x600 [ 1506.209633] dpm_sysfs_add+0x21d/0x270 [ 1506.213524] device_add+0xa20/0x18a0 [ 1506.217249] ? get_device_parent.isra.0+0x570/0x570 [ 1506.222270] ? start_creating+0x163/0x1e0 [ 1506.226425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1506.231969] hci_register_dev+0x2e8/0x860 [ 1506.236124] __vhci_create_device+0x2d0/0x5a0 [ 1506.240621] vhci_write+0x2d0/0x470 [ 1506.244252] __vfs_write+0x613/0x8e0 [ 1506.247991] ? kernel_read+0x120/0x120 [ 1506.251877] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.257430] ? rw_verify_area+0x118/0x360 [ 1506.261582] vfs_write+0x20c/0x580 [ 1506.265148] ksys_write+0xea/0x1f0 [ 1506.268696] ? __ia32_sys_read+0xb0/0xb0 [ 1506.272761] ? do_syscall_64+0x26/0x610 [ 1506.276737] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.282110] ? do_syscall_64+0x26/0x610 [ 1506.286095] __x64_sys_write+0x73/0xb0 [ 1506.289990] do_syscall_64+0x103/0x610 [ 1506.293888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.299090] RIP: 0033:0x457f29 [ 1506.302283] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.321180] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1506.328889] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1506.336154] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1506.343421] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1506.350696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1506.357985] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1506.370579] FAULT_INJECTION: forcing a failure. [ 1506.370579] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.442195] CPU: 0 PID: 18863 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1506.449156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.449166] Call Trace: [ 1506.461146] dump_stack+0x172/0x1f0 [ 1506.464792] should_fail.cold+0xa/0x15 [ 1506.468738] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1506.473854] ? ___might_sleep+0x163/0x280 [ 1506.473876] __should_failslab+0x121/0x190 [ 1506.473897] should_failslab+0x9/0x14 [ 1506.473914] kmem_cache_alloc+0x2b2/0x6f0 [ 1506.473933] ? __alloc_file+0x27/0x300 [ 1506.494106] ? rcu_read_lock_sched_held+0x110/0x130 [ 1506.494126] selinux_file_alloc_security+0xb4/0x190 [ 1506.494146] security_file_alloc+0x69/0xb0 [ 1506.494164] __alloc_file+0xac/0x300 [ 1506.494181] alloc_empty_file+0x72/0x170 [ 1506.504203] alloc_file+0x5e/0x4d0 [ 1506.516197] alloc_file_pseudo+0x189/0x280 [ 1506.516217] ? alloc_file+0x4d0/0x4d0 [ 1506.516236] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1506.516263] __shmem_file_setup.part.0+0x108/0x2b0 [ 1506.533342] shmem_file_setup+0x66/0x90 [ 1506.533361] __x64_sys_memfd_create+0x2a2/0x470 [ 1506.533377] ? memfd_fcntl+0x1550/0x1550 [ 1506.533395] ? do_syscall_64+0x26/0x610 [ 1506.533412] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1506.533455] ? trace_hardirqs_on+0x67/0x230 [ 1506.533491] do_syscall_64+0x103/0x610 [ 1506.533513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.551098] RIP: 0033:0x457f29 [ 1506.551115] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.551124] RSP: 002b:00007f15a1cd7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1506.551139] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457f29 [ 1506.551149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bcf27 [ 1506.551158] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00000000fbad8001 [ 1506.551168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15a1cd86d4 [ 1506.551176] R13: 00000000004c67fe R14: 00000000004dbda8 R15: 0000000000000004 [ 1506.588448] Bluetooth: Can't register HCI device 14:33:42 executing program 3 (fault-call:3 fault-nth:37): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspuus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000084, [{0xc0010015}]}) 14:33:42 executing program 2 (fault-call:1 fault-nth:6): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1506.871107] FAULT_INJECTION: forcing a failure. [ 1506.871107] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.922978] CPU: 1 PID: 18879 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1506.929932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.929952] Call Trace: [ 1506.929976] dump_stack+0x172/0x1f0 [ 1506.930001] should_fail.cold+0xa/0x15 [ 1506.930026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1506.930051] ? ___might_sleep+0x163/0x280 [ 1506.958791] __should_failslab+0x121/0x190 [ 1506.963040] should_failslab+0x9/0x14 [ 1506.966863] __kmalloc+0x2dc/0x740 [ 1506.970417] ? kobject_uevent_env+0x2fb/0x1030 [ 1506.975007] ? rcu_read_lock_sched_held+0x110/0x130 [ 1506.980047] ? kobject_get_path+0xc4/0x1b0 [ 1506.984320] kobject_get_path+0xc4/0x1b0 [ 1506.988397] kobject_uevent_env+0x31f/0x1030 [ 1506.992824] kobject_uevent+0x20/0x26 [ 1506.996634] device_add+0xb28/0x18a0 [ 1507.000366] ? get_device_parent.isra.0+0x570/0x570 [ 1507.005393] ? start_creating+0x163/0x1e0 [ 1507.009553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1507.015112] hci_register_dev+0x2e8/0x860 [ 1507.019291] __vhci_create_device+0x2d0/0x5a0 [ 1507.023807] vhci_write+0x2d0/0x470 [ 1507.027449] __vfs_write+0x613/0x8e0 [ 1507.031176] ? kernel_read+0x120/0x120 [ 1507.035076] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1507.040674] ? rw_verify_area+0x118/0x360 [ 1507.044833] vfs_write+0x20c/0x580 [ 1507.048392] ksys_write+0xea/0x1f0 [ 1507.051942] ? __ia32_sys_read+0xb0/0xb0 [ 1507.056021] ? do_syscall_64+0x26/0x610 [ 1507.060011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.065386] ? do_syscall_64+0x26/0x610 [ 1507.069380] __x64_sys_write+0x73/0xb0 [ 1507.073278] do_syscall_64+0x103/0x610 [ 1507.077181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.082378] RIP: 0033:0x457f29 [ 1507.085586] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1507.104508] RSP: 002b:00007fab7f235c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1507.112234] RAX: ffffffffffffffda RBX: 00007fab7f235c90 RCX: 0000000000457f29 [ 1507.119510] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000003 [ 1507.126782] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1507.134057] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2366d4 [ 1507.141342] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000004 [ 1507.215231] FAULT_INJECTION: forcing a failure. [ 1507.215231] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.236998] CPU: 1 PID: 18884 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1507.243947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.243955] Call Trace: [ 1507.243980] dump_stack+0x172/0x1f0 [ 1507.244006] should_fail.cold+0xa/0x15 [ 1507.264013] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1507.269169] ? ___might_sleep+0x163/0x280 [ 1507.269190] __should_failslab+0x121/0x190 [ 1507.269212] should_failslab+0x9/0x14 [ 1507.269229] kmem_cache_alloc+0x2b2/0x6f0 [ 1507.269247] ? notify_change+0x6d5/0xfb0 [ 1507.281429] ? do_sys_ftruncate+0x41e/0x550 [ 1507.281450] getname_flags+0xd6/0x5b0 [ 1507.281467] getname+0x1a/0x20 [ 1507.289679] do_sys_open+0x2c9/0x5d0 [ 1507.304706] ? filp_open+0x80/0x80 [ 1507.308271] ? trace_hardirqs_on_thunk+0x1a/0x1c 14:33:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl\ns\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1507.313243] ? do_syscall_64+0x26/0x610 [ 1507.317239] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.322623] ? do_syscall_64+0x26/0x610 [ 1507.322644] __x64_sys_open+0x7e/0xc0 [ 1507.322662] do_syscall_64+0x103/0x610 [ 1507.330472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.330486] RIP: 0033:0x412011 [ 1507.330501] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1507.330513] RSP: 002b:00007f15a1cf8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1507.361712] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1507.361721] RDX: 00007f15a1cf8afa RSI: 0000000000000002 RDI: 00007f15a1cf8af0 [ 1507.361730] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1507.361738] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1507.361746] R13: 0000000000000000 R14: 00000000004dbda8 R15: 0000000000000003 14:33:42 executing program 2 (fault-call:1 fault-nth:7): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1507.574983] FAULT_INJECTION: forcing a failure. [ 1507.574983] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.596473] CPU: 0 PID: 18895 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1507.603424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.612780] Call Trace: [ 1507.615384] dump_stack+0x172/0x1f0 [ 1507.619028] should_fail.cold+0xa/0x15 [ 1507.622931] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1507.628057] ? ___might_sleep+0x163/0x280 [ 1507.632232] __should_failslab+0x121/0x190 [ 1507.636494] should_failslab+0x9/0x14 [ 1507.640305] kmem_cache_alloc+0x2b2/0x6f0 [ 1507.644466] ? __save_stack_trace+0x8a/0xf0 [ 1507.648818] __alloc_file+0x27/0x300 [ 1507.652540] alloc_empty_file+0x72/0x170 [ 1507.656631] path_openat+0xef/0x46e0 [ 1507.660379] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1507.665516] ? kasan_slab_alloc+0xf/0x20 [ 1507.669603] ? kmem_cache_alloc+0x11a/0x6f0 [ 1507.673953] ? getname_flags+0xd6/0x5b0 [ 1507.677942] ? getname+0x1a/0x20 [ 1507.681312] ? do_sys_open+0x2c9/0x5d0 [ 1507.685204] ? __x64_sys_open+0x7e/0xc0 [ 1507.689186] ? do_syscall_64+0x103/0x610 [ 1507.693254] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.698643] ? __lock_acquire+0x548/0x3fb0 [ 1507.702885] ? __lock_acquire+0x548/0x3fb0 [ 1507.707133] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1507.711816] ? bd_link_disk_holder+0x270/0x760 [ 1507.716422] ? __alloc_fd+0x430/0x530 [ 1507.720235] do_filp_open+0x1a1/0x280 [ 1507.724061] ? may_open_dev+0x100/0x100 [ 1507.728092] ? lock_downgrade+0x880/0x880 [ 1507.732260] ? kasan_check_read+0x11/0x20 [ 1507.736417] ? do_raw_spin_unlock+0x57/0x270 [ 1507.740838] ? _raw_spin_unlock+0x2d/0x50 [ 1507.744996] ? __alloc_fd+0x430/0x530 [ 1507.748818] do_sys_open+0x3fe/0x5d0 [ 1507.752541] ? filp_open+0x80/0x80 [ 1507.756098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.760866] ? do_syscall_64+0x26/0x610 [ 1507.764847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.770224] ? do_syscall_64+0x26/0x610 [ 1507.774230] __x64_sys_open+0x7e/0xc0 [ 1507.778038] do_syscall_64+0x103/0x610 [ 1507.781940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.787136] RIP: 0033:0x412011 [ 1507.790362] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1507.809271] RSP: 002b:00007f15a1cd7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1507.816982] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1507.824258] RDX: 00007f15a1cd7afa RSI: 0000000000000002 RDI: 00007f15a1cd7af0 [ 1507.831540] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1507.838810] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1507.846082] R13: 0000000000000000 R14: 00000000004dbda8 R15: 0000000000000004 14:33:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:45 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl#s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000100, [{0xc0010015}]}) 14:33:45 executing program 2 (fault-call:1 fault-nth:8): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:45 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000ff01000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1510.479166] FAULT_INJECTION: forcing a failure. [ 1510.479166] name failslab, interval 1, probability 0, space 0, times 0 [ 1510.525386] CPU: 1 PID: 18912 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1510.532363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.541734] Call Trace: [ 1510.544358] dump_stack+0x172/0x1f0 [ 1510.548007] should_fail.cold+0xa/0x15 [ 1510.551927] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1510.557041] ? ___might_sleep+0x163/0x280 [ 1510.561229] __should_failslab+0x121/0x190 [ 1510.565484] should_failslab+0x9/0x14 [ 1510.569298] kmem_cache_alloc+0x2b2/0x6f0 [ 1510.573457] ? __save_stack_trace+0x8a/0xf0 [ 1510.577799] __alloc_file+0x27/0x300 [ 1510.581531] alloc_empty_file+0x72/0x170 [ 1510.585606] path_openat+0xef/0x46e0 [ 1510.589332] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1510.594448] ? kasan_slab_alloc+0xf/0x20 [ 1510.598515] ? kmem_cache_alloc+0x11a/0x6f0 [ 1510.602846] ? getname_flags+0xd6/0x5b0 [ 1510.606824] ? getname+0x1a/0x20 [ 1510.610197] ? do_sys_open+0x2c9/0x5d0 [ 1510.614097] ? __x64_sys_open+0x7e/0xc0 [ 1510.618089] ? do_syscall_64+0x103/0x610 [ 1510.622165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.627584] ? __lock_acquire+0x548/0x3fb0 [ 1510.631852] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1510.636536] ? __alloc_fd+0x430/0x530 [ 1510.640376] do_filp_open+0x1a1/0x280 [ 1510.644187] ? may_open_dev+0x100/0x100 [ 1510.648182] ? lock_downgrade+0x880/0x880 [ 1510.652362] ? kasan_check_read+0x11/0x20 [ 1510.656524] ? do_raw_spin_unlock+0x57/0x270 [ 1510.660944] ? _raw_spin_unlock+0x2d/0x50 [ 1510.665103] ? __alloc_fd+0x430/0x530 [ 1510.668931] do_sys_open+0x3fe/0x5d0 [ 1510.672657] ? filp_open+0x80/0x80 [ 1510.676209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1510.680980] ? do_syscall_64+0x26/0x610 [ 1510.684962] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.690335] ? do_syscall_64+0x26/0x610 [ 1510.694327] __x64_sys_open+0x7e/0xc0 [ 1510.698136] do_syscall_64+0x103/0x610 [ 1510.702040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.707241] RIP: 0033:0x412011 14:33:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000101, [{0xc0010015}]}) [ 1510.710449] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1510.729359] RSP: 002b:00007f15a1cd7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1510.737078] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1510.744370] RDX: 00007f15a1cd7afa RSI: 0000000000000002 RDI: 00007f15a1cd7af0 [ 1510.751653] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1510.758937] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1510.766244] R13: 0000000000000000 R14: 00000000004dbda8 R15: 0000000000000004 14:33:53 executing program 3 (fault-call:3 fault-nth:38): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:33:53 executing program 2 (fault-call:1 fault-nth:9): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000102, [{0xc0010015}]}) 14:33:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x5c, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x1, @empty, 0x7}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e23, @empty}]}, &(0x7f00000000c0)=0x10) setitimer(0x1, &(0x7f0000000280)={{0x77359400}, {0x0, 0x2710}}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000140)={r3, 0xd8}, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000200000, 0x0, 0x2, 0x2}}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:53 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl%s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1518.088333] FAULT_INJECTION: forcing a failure. [ 1518.088333] name failslab, interval 1, probability 0, space 0, times 0 [ 1518.113143] FAULT_INJECTION: forcing a failure. [ 1518.113143] name failslab, interval 1, probability 0, space 0, times 0 [ 1518.120147] CPU: 1 PID: 18935 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1518.131275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.131282] Call Trace: [ 1518.131307] dump_stack+0x172/0x1f0 [ 1518.131330] should_fail.cold+0xa/0x15 [ 1518.131349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1518.131374] ? ___might_sleep+0x163/0x280 [ 1518.160106] __should_failslab+0x121/0x190 [ 1518.164358] should_failslab+0x9/0x14 [ 1518.168210] kmem_cache_alloc+0x2b2/0x6f0 [ 1518.172395] ? __alloc_file+0x27/0x300 [ 1518.176295] ? rcu_read_lock_sched_held+0x110/0x130 [ 1518.181325] selinux_file_alloc_security+0xb4/0x190 [ 1518.186353] security_file_alloc+0x69/0xb0 [ 1518.190608] __alloc_file+0xac/0x300 [ 1518.194333] alloc_empty_file+0x72/0x170 [ 1518.198409] path_openat+0xef/0x46e0 [ 1518.202130] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1518.207238] ? kasan_slab_alloc+0xf/0x20 [ 1518.211324] ? kmem_cache_alloc+0x11a/0x6f0 [ 1518.215652] ? getname_flags+0xd6/0x5b0 [ 1518.219652] ? getname+0x1a/0x20 [ 1518.223029] ? do_sys_open+0x2c9/0x5d0 [ 1518.226934] ? __x64_sys_open+0x7e/0xc0 [ 1518.230923] ? do_syscall_64+0x103/0x610 [ 1518.234997] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.240391] ? __lock_acquire+0x548/0x3fb0 [ 1518.244636] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1518.249323] ? __alloc_fd+0x430/0x530 [ 1518.253133] do_filp_open+0x1a1/0x280 [ 1518.256945] ? may_open_dev+0x100/0x100 [ 1518.260930] ? lock_downgrade+0x880/0x880 [ 1518.265100] ? kasan_check_read+0x11/0x20 [ 1518.269265] ? do_raw_spin_unlock+0x57/0x270 [ 1518.273693] ? _raw_spin_unlock+0x2d/0x50 [ 1518.277851] ? __alloc_fd+0x430/0x530 [ 1518.281679] do_sys_open+0x3fe/0x5d0 [ 1518.285405] ? filp_open+0x80/0x80 [ 1518.288971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1518.293732] ? do_syscall_64+0x26/0x610 [ 1518.297722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.303109] ? do_syscall_64+0x26/0x610 [ 1518.307127] __x64_sys_open+0x7e/0xc0 [ 1518.310942] do_syscall_64+0x103/0x610 [ 1518.314847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.320044] RIP: 0033:0x412011 [ 1518.323285] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1518.342201] RSP: 002b:00007f15a1cd7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1518.349919] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412011 [ 1518.357196] RDX: 00007f15a1cd7afa RSI: 0000000000000002 RDI: 00007f15a1cd7af0 [ 1518.364480] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1518.371766] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1518.379106] R13: 0000000000000000 R14: 00000000004dbda8 R15: 0000000000000004 [ 1518.422859] CPU: 0 PID: 18937 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1518.429853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.439206] Call Trace: [ 1518.441833] dump_stack+0x172/0x1f0 [ 1518.445479] should_fail.cold+0xa/0x15 [ 1518.449381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1518.454504] ? ___might_sleep+0x163/0x280 [ 1518.458683] __should_failslab+0x121/0x190 [ 1518.462932] should_failslab+0x9/0x14 [ 1518.466744] __kmalloc+0x2dc/0x740 [ 1518.470289] ? kobject_uevent_env+0x2fb/0x1030 [ 1518.474882] ? rcu_read_lock_sched_held+0x110/0x130 [ 1518.479910] ? kobject_get_path+0xc4/0x1b0 [ 1518.484161] kobject_get_path+0xc4/0x1b0 [ 1518.488240] kobject_uevent_env+0x31f/0x1030 [ 1518.492669] kobject_uevent+0x20/0x26 [ 1518.496480] device_add+0xb28/0x18a0 [ 1518.500222] ? get_device_parent.isra.0+0x570/0x570 [ 1518.505267] ? start_creating+0x163/0x1e0 [ 1518.509424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1518.514978] hci_register_dev+0x2e8/0x860 [ 1518.519148] __vhci_create_device+0x2d0/0x5a0 [ 1518.523660] vhci_write+0x2d0/0x470 [ 1518.527305] __vfs_write+0x613/0x8e0 [ 1518.531031] ? kernel_read+0x120/0x120 [ 1518.534937] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1518.540527] ? rw_verify_area+0x118/0x360 [ 1518.544689] vfs_write+0x20c/0x580 [ 1518.548240] ksys_write+0xea/0x1f0 [ 1518.551791] ? __ia32_sys_read+0xb0/0xb0 [ 1518.555864] ? do_syscall_64+0x26/0x610 [ 1518.559934] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.565303] ? do_syscall_64+0x26/0x610 [ 1518.569292] __x64_sys_write+0x73/0xb0 [ 1518.573190] do_syscall_64+0x103/0x610 [ 1518.577109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.582306] RIP: 0033:0x457f29 [ 1518.585511] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.604430] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1518.612142] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1518.619436] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1518.626746] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1518.634016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1518.641318] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:33:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0000103, [{0xc0010015}]}) 14:33:54 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl*s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010000, [{0xc0010015}]}) 14:33:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000000000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:54 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl+s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000200)) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:33:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010003, [{0xc0010015}]}) 14:34:04 executing program 3 (fault-call:3 fault-nth:39): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:34:04 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000800000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:34:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010004, [{0xc0010015}]}) 14:34:04 executing program 2 (fault-call:1 fault-nth:10): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:04 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl-s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1529.000335] FAULT_INJECTION: forcing a failure. [ 1529.000335] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.014630] FAULT_INJECTION: forcing a failure. [ 1529.014630] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.053220] CPU: 0 PID: 18986 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1529.060200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.069555] Call Trace: [ 1529.072156] dump_stack+0x172/0x1f0 [ 1529.075802] should_fail.cold+0xa/0x15 [ 1529.079702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1529.084909] ? ___might_sleep+0x163/0x280 [ 1529.089070] __should_failslab+0x121/0x190 [ 1529.093333] should_failslab+0x9/0x14 [ 1529.097144] __kmalloc+0x2dc/0x740 [ 1529.100691] ? __free_object+0xe2/0x1f0 [ 1529.104703] ? inotify_handle_event+0x1ff/0x5c0 [ 1529.109383] inotify_handle_event+0x1ff/0x5c0 [ 1529.113920] fsnotify+0x782/0xbf0 [ 1529.117403] ? fsnotify_first_mark+0x210/0x210 [ 1529.122001] ? __might_sleep+0x95/0x190 [ 1529.125992] __fput+0x55a/0x8d0 [ 1529.129283] ____fput+0x16/0x20 [ 1529.132568] task_work_run+0x14a/0x1c0 [ 1529.136471] exit_to_usermode_loop+0x273/0x2c0 [ 1529.141087] do_syscall_64+0x52d/0x610 [ 1529.145001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.150193] RIP: 0033:0x411e31 [ 1529.153392] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 94 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1529.172312] RSP: 002b:00007f15a1cf8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1529.180034] RAX: 0000000000000000 RBX: 00007f15a1cf96d4 RCX: 0000000000411e31 [ 1529.187315] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1529.194586] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 1529.201862] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1529.209135] R13: 0000000000000000 R14: 00000000004dbda8 R15: 0000000000000003 [ 1529.216432] CPU: 1 PID: 18995 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1529.223387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.232752] Call Trace: [ 1529.235360] dump_stack+0x172/0x1f0 [ 1529.239015] should_fail.cold+0xa/0x15 [ 1529.242927] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1529.248050] ? ___might_sleep+0x163/0x280 [ 1529.252243] __should_failslab+0x121/0x190 [ 1529.256499] should_failslab+0x9/0x14 [ 1529.260322] kmem_cache_alloc_node_trace+0x270/0x720 [ 1529.265458] __kmalloc_node_track_caller+0x3d/0x70 [ 1529.270410] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1529.275195] __alloc_skb+0x10b/0x5e0 [ 1529.278926] ? skb_trim+0x190/0x190 [ 1529.282588] ? kasan_check_read+0x11/0x20 [ 1529.286770] alloc_uevent_skb+0x83/0x1e2 [ 1529.290859] kobject_uevent_env+0xa63/0x1030 [ 1529.295298] kobject_uevent+0x20/0x26 [ 1529.299205] device_add+0xb28/0x18a0 [ 1529.302946] ? get_device_parent.isra.0+0x570/0x570 [ 1529.307986] ? start_creating+0x163/0x1e0 [ 1529.312513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1529.318078] hci_register_dev+0x2e8/0x860 [ 1529.322252] __vhci_create_device+0x2d0/0x5a0 [ 1529.326766] vhci_write+0x2d0/0x470 [ 1529.330420] __vfs_write+0x613/0x8e0 [ 1529.334170] ? kernel_read+0x120/0x120 [ 1529.338083] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1529.343665] ? rw_verify_area+0x118/0x360 [ 1529.347834] vfs_write+0x20c/0x580 [ 1529.351401] ksys_write+0xea/0x1f0 [ 1529.354965] ? __ia32_sys_read+0xb0/0xb0 [ 1529.359048] ? do_syscall_64+0x26/0x610 [ 1529.363052] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.368437] ? do_syscall_64+0x26/0x610 [ 1529.372433] __x64_sys_write+0x73/0xb0 [ 1529.376347] do_syscall_64+0x103/0x610 [ 1529.380263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.385467] RIP: 0033:0x457f29 [ 1529.388687] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1529.407618] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1529.415344] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1529.423287] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1529.430582] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1529.437864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1529.445154] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:34:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010007, [{0xc0010015}]}) 14:34:05 executing program 2 (fault-call:1 fault-nth:11): syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:05 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl.s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:05 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010015, [{0xc0010015}]}) 14:34:05 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x02', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:15 executing program 3 (fault-call:3 fault-nth:40): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:34:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc001001b, [{0xc0010015}]}) 14:34:15 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl0s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:15 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = dup2(r0, r1) r3 = getgid() write$P9_RGETATTR(r2, &(0x7f0000000200)={0xffffff15, 0x19, 0x0, {0x0, {0x0, 0x4}, 0x10000000000000, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4}}, 0xa0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xd5, 0x200) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:34:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1539.916120] FAULT_INJECTION: forcing a failure. [ 1539.916120] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.951736] CPU: 0 PID: 19041 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1539.958684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1539.968038] Call Trace: [ 1539.968079] dump_stack+0x172/0x1f0 [ 1539.968106] should_fail.cold+0xa/0x15 [ 1539.978189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1539.983305] ? ___might_sleep+0x163/0x280 [ 1539.987468] __should_failslab+0x121/0x190 [ 1539.991714] should_failslab+0x9/0x14 [ 1539.995533] kmem_cache_alloc_node_trace+0x270/0x720 [ 1540.000657] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1540.005939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1540.011485] ? kobject_put+0x84/0xe0 [ 1540.015218] __kmalloc_node_track_caller+0x3d/0x70 [ 1540.020160] devm_kmalloc+0x92/0x1a0 [ 1540.023889] hci_leds_init+0x32/0x1c0 [ 1540.027881] hci_register_dev+0x30c/0x860 [ 1540.032047] __vhci_create_device+0x2d0/0x5a0 [ 1540.036571] vhci_write+0x2d0/0x470 [ 1540.040216] __vfs_write+0x613/0x8e0 [ 1540.043940] ? kernel_read+0x120/0x120 [ 1540.047840] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1540.053407] ? rw_verify_area+0x118/0x360 [ 1540.057576] vfs_write+0x20c/0x580 [ 1540.061132] ksys_write+0xea/0x1f0 [ 1540.064684] ? __ia32_sys_read+0xb0/0xb0 [ 1540.068755] ? do_syscall_64+0x26/0x610 [ 1540.072818] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1540.078188] ? do_syscall_64+0x26/0x610 [ 1540.082180] __x64_sys_write+0x73/0xb0 [ 1540.086092] do_syscall_64+0x103/0x610 [ 1540.089996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1540.095187] RIP: 0033:0x457f29 14:34:15 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplXs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc001001f, [{0xc0010015}]}) [ 1540.098398] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1540.117303] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1540.125013] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1540.132310] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1540.139582] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1540.146857] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1540.154149] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:34:15 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010020, [{0xc0010015}]}) 14:34:15 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x05', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:15 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplcs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:26 executing program 3 (fault-call:3 fault-nth:41): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010058, [{0xc0010015}]}) 14:34:26 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x06', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:26 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplds\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 14:34:26 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0xffffffff7fffffff, &(0x7f00000000c0)=0x2) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010117, [{0xc0010015}]}) [ 1550.796061] FAULT_INJECTION: forcing a failure. [ 1550.796061] name failslab, interval 1, probability 0, space 0, times 0 14:34:26 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\b', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1550.847412] CPU: 0 PID: 19093 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1550.854385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1550.863739] Call Trace: [ 1550.866345] dump_stack+0x172/0x1f0 [ 1550.869989] should_fail.cold+0xa/0x15 [ 1550.873895] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1550.879018] ? ___might_sleep+0x163/0x280 [ 1550.883176] __should_failslab+0x121/0x190 [ 1550.887424] should_failslab+0x9/0x14 [ 1550.891232] kmem_cache_alloc+0x2b2/0x6f0 [ 1550.895385] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1550.900493] ? lock_downgrade+0x880/0x880 [ 1550.904661] skb_clone+0x150/0x3b0 [ 1550.908217] netlink_broadcast_filtered+0x870/0xb20 [ 1550.913254] netlink_broadcast+0x3a/0x50 [ 1550.917331] kobject_uevent_env+0xa94/0x1030 [ 1550.921762] kobject_uevent+0x20/0x26 [ 1550.925574] device_add+0xb28/0x18a0 [ 1550.929307] ? get_device_parent.isra.0+0x570/0x570 [ 1550.934336] ? start_creating+0x163/0x1e0 [ 1550.938500] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1550.944050] hci_register_dev+0x2e8/0x860 [ 1550.948224] __vhci_create_device+0x2d0/0x5a0 [ 1550.952731] vhci_write+0x2d0/0x470 [ 1550.956375] __vfs_write+0x613/0x8e0 [ 1550.960114] ? kernel_read+0x120/0x120 [ 1550.964020] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1550.969589] ? rw_verify_area+0x118/0x360 [ 1550.973745] vfs_write+0x20c/0x580 [ 1550.977312] ksys_write+0xea/0x1f0 [ 1550.980867] ? __ia32_sys_read+0xb0/0xb0 [ 1550.984937] ? do_syscall_64+0x26/0x610 [ 1550.988921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1550.994284] ? do_syscall_64+0x26/0x610 [ 1550.998271] __x64_sys_write+0x73/0xb0 [ 1551.002189] do_syscall_64+0x103/0x610 [ 1551.006121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1551.011329] RIP: 0033:0x457f29 [ 1551.014523] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1551.033425] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1551.041142] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1551.048411] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1551.055679] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1551.062952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1551.070227] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:34:26 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplis\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010140, [{0xc0010015}]}) 14:34:26 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0010141, [{0xc0010015}]}) 14:34:36 executing program 3 (fault-call:3 fault-nth:42): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:34:36 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x80', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:36 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplls\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc0011022, [{0xc0010015}]}) 14:34:36 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xa0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x100, 0x23e}]}, 0xc, 0x2) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:34:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 14:34:37 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1561.634885] FAULT_INJECTION: forcing a failure. [ 1561.634885] name failslab, interval 1, probability 0, space 0, times 0 [ 1561.726842] CPU: 1 PID: 19139 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1561.733877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1561.743247] Call Trace: [ 1561.745866] dump_stack+0x172/0x1f0 [ 1561.749522] should_fail.cold+0xa/0x15 [ 1561.753440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1561.758593] ? ___might_sleep+0x163/0x280 [ 1561.762777] __should_failslab+0x121/0x190 [ 1561.767045] should_failslab+0x9/0x14 [ 1561.770885] kmem_cache_alloc_node_trace+0x270/0x720 14:34:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc001102a, [{0xc0010015}]}) [ 1561.776011] ? vsnprintf+0x32f/0x19b0 [ 1561.779838] __kmalloc_node_track_caller+0x3d/0x70 [ 1561.784794] devm_kmalloc+0x92/0x1a0 [ 1561.788540] devm_kvasprintf+0xcd/0x140 [ 1561.792544] ? devm_kmemdup+0x60/0x60 [ 1561.796366] ? devres_add+0x40/0x50 [ 1561.800014] ? mark_held_locks+0xa4/0xf0 [ 1561.804102] devm_kasprintf+0xbb/0xf0 [ 1561.807927] ? devm_kvasprintf+0x140/0x140 [ 1561.812192] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1561.817324] ? devres_add+0x40/0x50 [ 1561.820977] hci_leds_init+0xb3/0x1c0 [ 1561.824799] hci_register_dev+0x30c/0x860 [ 1561.828991] __vhci_create_device+0x2d0/0x5a0 [ 1561.833504] vhci_write+0x2d0/0x470 [ 1561.837162] __vfs_write+0x613/0x8e0 [ 1561.840924] ? kernel_read+0x120/0x120 [ 1561.844868] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1561.850442] ? rw_verify_area+0x118/0x360 [ 1561.854615] vfs_write+0x20c/0x580 [ 1561.858178] ksys_write+0xea/0x1f0 [ 1561.861736] ? __ia32_sys_read+0xb0/0xb0 [ 1561.865819] ? do_syscall_64+0x26/0x610 [ 1561.869813] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1561.875197] ? do_syscall_64+0x26/0x610 [ 1561.879199] __x64_sys_write+0x73/0xb0 [ 1561.883119] do_syscall_64+0x103/0x610 [ 1561.887035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1561.892247] RIP: 0033:0x457f29 [ 1561.895462] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1561.914379] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1561.922106] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1561.929395] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1561.936675] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1561.943962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1561.951242] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:34:37 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:37 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc001102c, [{0xc0010015}]}) 14:34:37 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:47 executing program 3 (fault-call:3 fault-nth:43): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:34:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplps\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc1000000, [{0xc0010015}]}) 14:34:47 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffffd, 0x0) write$evdev(r0, 0x0, 0xffffffffffffffb9) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000540)=""/243) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000300)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, 0x2, 0x4, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r3 = getuid() fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x800, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9c32}}], [{@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, ']\'-'}}]}}) write$FUSE_LSEEK(r2, &(0x7f00000002c0)={0x18, 0x0, 0x2, {0x8}}, 0x18) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:34:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) [ 1572.502941] QAT: Invalid ioctl [ 1572.528813] QAT: Invalid ioctl [ 1572.552545] FAULT_INJECTION: forcing a failure. [ 1572.552545] name failslab, interval 1, probability 0, space 0, times 0 [ 1572.554815] QAT: Invalid ioctl 14:34:48 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1572.607116] QAT: Invalid ioctl [ 1572.611337] CPU: 0 PID: 19197 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1572.618282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1572.627635] Call Trace: [ 1572.630244] dump_stack+0x172/0x1f0 [ 1572.633904] should_fail.cold+0xa/0x15 [ 1572.637830] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1572.642954] ? ___might_sleep+0x163/0x280 [ 1572.647139] __should_failslab+0x121/0x190 [ 1572.651386] should_failslab+0x9/0x14 [ 1572.655204] kmem_cache_alloc_node_trace+0x270/0x720 [ 1572.660319] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1572.665602] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1572.671150] ? kobject_put+0x84/0xe0 [ 1572.674880] __kmalloc_node_track_caller+0x3d/0x70 [ 1572.679819] devm_kmalloc+0x92/0x1a0 [ 1572.683569] hci_leds_init+0x32/0x1c0 [ 1572.687402] hci_register_dev+0x30c/0x860 [ 1572.691578] __vhci_create_device+0x2d0/0x5a0 [ 1572.696090] vhci_write+0x2d0/0x470 [ 1572.699738] __vfs_write+0x613/0x8e0 [ 1572.703467] ? kernel_read+0x120/0x120 [ 1572.707364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1572.712927] ? rw_verify_area+0x118/0x360 [ 1572.717090] vfs_write+0x20c/0x580 [ 1572.720662] ksys_write+0xea/0x1f0 [ 1572.724215] ? __ia32_sys_read+0xb0/0xb0 [ 1572.728287] ? do_syscall_64+0x26/0x610 [ 1572.732271] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1572.737738] ? do_syscall_64+0x26/0x610 [ 1572.741732] __x64_sys_write+0x73/0xb0 [ 1572.745635] do_syscall_64+0x103/0x610 [ 1572.749542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1572.754733] RIP: 0033:0x457f29 [ 1572.757927] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1572.776828] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1572.784565] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1572.791846] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1572.799291] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:34:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000200)=""/183) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x280000, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xffffff08, 0x19, 0xfffffffffffffffc, {0x0, {}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0x1ce) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:34:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xc2000000, [{0xc0010015}]}) [ 1572.806561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1572.813842] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:34:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplss\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:48 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2k', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xce000000, [{0xc0010015}]}) 14:34:58 executing program 3 (fault-call:3 fault-nth:44): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:34:58 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplxs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:58 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xd0040000, [{0xc0010015}]}) 14:34:58 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x400, 0xa, &(0x7f0000001880)=[{&(0x7f0000000200)="3140198c7975a06896f11ef8dd42dfc6cc266475ec9a00acc072e1fa097f696a75709d69f43cf965ce7072efe579bea83c9f2b150499d11f1740c0e41b14dccfcbfa800b39a951e5636160b118386098f8f1b7c2e23a4426bf0b3daaa1a2548cac2777310fd29189a4bc9504807a7937048a0c4746b14b5b2521e83bb3f2e53153e1e63db5e8de93f2ee4444cfb3cb86595b5bcf170e389b5a3833b5f75cc0e4de89f9736e36a7", 0xa7, 0x7fffffff}, {&(0x7f00000002c0)="7f81c38780f0fc01a9a927766f96a17327ce1a32098bf03fae0a3a09c838516f278492a5ec33844dc5de553e679238eb78870a1fa14caad7a8ff0836a8c8c655d8d9d893242fc56d917fc2c2ffeaccf8561336b718972050866835a10adb94786c4911e26e8347b2f8e9", 0x6a, 0x4}, {&(0x7f0000000440)="742dc73cd617c6750cf4728f573b861878e9beed17f95c91f417875f214f38891c85ce1da604c50647deb159e79220641f66fb949811a9012f39489e80c00aa478853a0f51737e167d81c4378485a5e012368e9940480ab63d7d54e70776b423a8bbdae82d78c6d1cdcbef84f51b759cd7a28732870b9e2d6d76e9d60abcc188b7a5681727e465e89daebfb11bf8305066e7f32c8193f1c5d9d7ad2d6589f676ec6219dd7ec39154eb854931adac6ce4daaeda39f9ba42b5086781eb21e18ba1ba8b6d822579ea003f04c44f3ce8282732eac2a6", 0xd4, 0x80000001}, {&(0x7f0000000540)="e721fd1a61ffea90191dd7aac3fadd4445b84a305213a39b9f96377af785faffd9585e4ef23fb79f6519acecf315d6baf6867ace6693e4c7daaa10ce36241fae0c3dd7d37cb38f6db90c58aa30f0ab3734d605891765be7b5d8a297da00344568fc3617eace0703501a79b1f27168b7d468d3108ee72d40ffd34f0f7788b43a0eefa167e7c2aca93a6177a282d63cea5afb2544ebebf74ba4c900792b1e60461c4e76f1ce2dc30836d6f008d1e8f2237a3b5b2407987a25b4ea4702648506206a7a457c897f7c5be0b38ad5bdd5728a69c8d818234a8cb28dae8", 0xda, 0x3ff}, {&(0x7f0000000640)="cb1864c3178dac30f94c3634b7a83be6fc89a37bbac0d42334f4fc201021c7b121a658f84ef6db0f4a38069e374567a3c0a1e2efe792c2c6ff2132907fb76d8665635b9e94db4ea07284bfbd4b", 0x4d, 0x4}, {&(0x7f00000006c0)="3bed2bf8012a5ba70ea56e0e84ee07e08f9e83a91805deece603e517af66a1e255db4a8b1b6d2fdb782f8be93c402ffddecbe4f35f1fabded9cefb0d72601b64b8e8f991119a3ea9729c1b015ecf2b48ebd57340e56a07e27e260773ff3c6a41c4ef380b91af8c851ede39cfd91ddb65797f", 0x72, 0xffffffff}, {&(0x7f0000000740)="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", 0x1000, 0xff}, {&(0x7f0000001740)="ba5aa000ead3277a00e5d0b87275c4deff275147606d0243e38d6cb9bc3befd673cd301835732cff2156d3bf361984020d542b3d9daf6641680e41fdcaa466381856817622b68e05c4ed281b477ad3a61dae81a9001c3c2b48d75127df964e53f586323e4cdf051ce14ddc96fde976b36085a91ffe0515f0bc8357e1340d716cf030e94275107ec10750853ab1", 0x8d, 0x4}, {&(0x7f0000001800)="ff35bab1637a0a1abb385b625e02cd5abfbbbb8615ddeed4f89f41fdd6b6402d632d65e374da4b9c5109dfbe1ac09256c6a47a1a2ce74a98b94baeb312b3067bc5f2d64be669bfc9aeb7ec05da6e33653ff305b1210a5684b8242fb618e33198d98963bcdf9ea8168b", 0x69, 0x5f2}, {&(0x7f00000000c0), 0x0, 0x98db}], 0x400, &(0x7f0000001980)={[{@nomblk_io_submit='nomblk_io_submit'}, {@debug='debug'}, {@dax='dax'}, {@delalloc='delalloc'}, {@bsddf='bsddf'}, {@orlov='orlov'}], [{@subj_type={'subj_type', 0x3d, '%'}}, {@dont_measure='dont_measure'}]}) write$evdev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d200000000000000000000000040002000000000deff0bffff1f000000090001000000380002000001f0ffffffffffff0000008504000000000000000000000000020000000000000000008004f800003b09000000000000000000000000000000"], 0x68) clone(0x51ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x4000) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) 14:34:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x0) [ 1583.365641] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 14:34:58 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:59 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu\n\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xd9010000, [{0xc0010015}]}) [ 1583.550517] FAULT_INJECTION: forcing a failure. [ 1583.550517] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.602284] CPU: 0 PID: 19262 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1583.609263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1583.618621] Call Trace: [ 1583.621228] dump_stack+0x172/0x1f0 [ 1583.624872] should_fail.cold+0xa/0x15 [ 1583.628776] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1583.633901] ? ___might_sleep+0x163/0x280 [ 1583.638065] __should_failslab+0x121/0x190 [ 1583.642322] should_failslab+0x9/0x14 [ 1583.646129] __kmalloc+0x2dc/0x740 [ 1583.649685] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1583.654795] ? devres_add+0x40/0x50 [ 1583.658425] ? rfkill_alloc+0xaa/0x2b0 [ 1583.662330] rfkill_alloc+0xaa/0x2b0 [ 1583.666050] ? hci_leds_init+0x104/0x1c0 [ 1583.670131] hci_register_dev+0x326/0x860 [ 1583.674298] __vhci_create_device+0x2d0/0x5a0 [ 1583.678821] vhci_write+0x2d0/0x470 [ 1583.682478] __vfs_write+0x613/0x8e0 [ 1583.686207] ? kernel_read+0x120/0x120 [ 1583.690111] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1583.695676] ? rw_verify_area+0x118/0x360 [ 1583.699836] vfs_write+0x20c/0x580 [ 1583.703393] ksys_write+0xea/0x1f0 [ 1583.706944] ? __ia32_sys_read+0xb0/0xb0 [ 1583.711021] ? do_syscall_64+0x26/0x610 [ 1583.715006] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1583.720462] ? do_syscall_64+0x26/0x610 [ 1583.724454] __x64_sys_write+0x73/0xb0 [ 1583.728350] do_syscall_64+0x103/0x610 [ 1583.732265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1583.737460] RIP: 0033:0x457f29 [ 1583.740657] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1583.759578] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1583.767294] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1583.774570] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1583.781842] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1583.789118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1583.796391] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:34:59 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:34:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xe0060000, [{0xc0010015}]}) 14:34:59 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu#\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:09 executing program 3 (fault-call:3 fault-nth:45): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:35:09 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xff020000, [{0xc0010015}]}) 14:35:09 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu%\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:09 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x0) 14:35:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, 0x0, 0xffffffffffffffc2) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$apparmor_current(r1, &(0x7f0000000040)=@hat={'changehat ', 0x4000000000000000}, 0x1d) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d20000000000000005000000d600001000000000000000000040000000000000000000000020fff8000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000a28d87a6d49d136ddf1c965b9ef50ea746ced3317464f35749dab45a3f0a43467f"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200, 0x0) accept$nfc_llcp(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x60) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1594.267070] FAULT_INJECTION: forcing a failure. [ 1594.267070] name failslab, interval 1, probability 0, space 0, times 0 [ 1594.292106] CPU: 1 PID: 19303 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1594.299118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.299126] Call Trace: [ 1594.299151] dump_stack+0x172/0x1f0 [ 1594.299176] should_fail.cold+0xa/0x15 [ 1594.299199] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1594.299222] ? ___might_sleep+0x163/0x280 [ 1594.299245] __should_failslab+0x121/0x190 [ 1594.299266] should_failslab+0x9/0x14 [ 1594.299282] __kmalloc+0x2dc/0x740 [ 1594.299300] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1594.299321] ? devres_add+0x40/0x50 [ 1594.328115] ? rfkill_alloc+0xaa/0x2b0 [ 1594.328136] rfkill_alloc+0xaa/0x2b0 [ 1594.328150] ? hci_leds_init+0x104/0x1c0 [ 1594.328168] hci_register_dev+0x326/0x860 [ 1594.344866] __vhci_create_device+0x2d0/0x5a0 [ 1594.344886] vhci_write+0x2d0/0x470 [ 1594.344911] __vfs_write+0x613/0x8e0 [ 1594.376181] ? kernel_read+0x120/0x120 [ 1594.380081] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1594.385646] ? rw_verify_area+0x118/0x360 [ 1594.389808] vfs_write+0x20c/0x580 [ 1594.393369] ksys_write+0xea/0x1f0 [ 1594.396924] ? __ia32_sys_read+0xb0/0xb0 [ 1594.400996] ? do_syscall_64+0x26/0x610 [ 1594.404986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1594.410354] ? do_syscall_64+0x26/0x610 [ 1594.414343] __x64_sys_write+0x73/0xb0 [ 1594.418247] do_syscall_64+0x103/0x610 [ 1594.422158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1594.427355] RIP: 0033:0x457f29 [ 1594.430560] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1594.449470] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1594.457275] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1594.464547] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1594.471832] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1594.479109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1594.486382] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:35:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xff0b0000, [{0xc0010015}]}) 14:35:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu*\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:10 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:10 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0xffff8000, [{0xc0010015}]}) 14:35:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu+\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:20 executing program 3 (fault-call:3 fault-nth:46): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:35:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4000000000, [{0xc0010015}]}) 14:35:20 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:20 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu-\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x0) 14:35:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xf0, 0x80081) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1605.170476] FAULT_INJECTION: forcing a failure. [ 1605.170476] name failslab, interval 1, probability 0, space 0, times 0 [ 1605.217875] CPU: 0 PID: 19354 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1605.224830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1605.234183] Call Trace: [ 1605.236785] dump_stack+0x172/0x1f0 [ 1605.240453] should_fail.cold+0xa/0x15 [ 1605.244372] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1605.249507] ? ___might_sleep+0x163/0x280 [ 1605.253668] __should_failslab+0x121/0x190 [ 1605.257922] should_failslab+0x9/0x14 [ 1605.261747] __kmalloc+0x2dc/0x740 [ 1605.265301] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1605.270417] ? devres_add+0x40/0x50 [ 1605.274094] ? rfkill_alloc+0xaa/0x2b0 [ 1605.277997] rfkill_alloc+0xaa/0x2b0 [ 1605.281722] ? hci_leds_init+0x104/0x1c0 [ 1605.285791] hci_register_dev+0x326/0x860 [ 1605.289956] __vhci_create_device+0x2d0/0x5a0 [ 1605.294485] vhci_write+0x2d0/0x470 [ 1605.298126] __vfs_write+0x613/0x8e0 [ 1605.301851] ? kernel_read+0x120/0x120 [ 1605.305749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1605.311810] ? rw_verify_area+0x118/0x360 14:35:20 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1605.315993] vfs_write+0x20c/0x580 [ 1605.319543] ksys_write+0xea/0x1f0 [ 1605.323103] ? __ia32_sys_read+0xb0/0xb0 [ 1605.327175] ? do_syscall_64+0x26/0x610 [ 1605.331162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.336533] ? do_syscall_64+0x26/0x610 [ 1605.340519] __x64_sys_write+0x73/0xb0 [ 1605.344414] do_syscall_64+0x103/0x610 [ 1605.348316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.353509] RIP: 0033:0x457f29 [ 1605.356719] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1605.375622] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1605.383337] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1605.390606] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1605.397879] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1605.405164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 14:35:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1c000000000, [{0xc0010015}]}) [ 1605.412437] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:35:20 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:20 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x1004000000000, [{0xc0010015}]}) 14:35:21 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:31 executing program 3 (fault-call:3 fault-nth:47): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:35:31 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x100c000000000, [{0xc0010015}]}) 14:35:31 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluX\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="008100002c4298db772ee3385804a083bc91f97d29f7470e"], &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x81, 0xa}, &(0x7f0000000240)=0x8) 14:35:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ppoll(&(0x7f00000001c0)=[{r0}, {r1, 0x1}, {r0}], 0x3, 0x0, 0x0, 0x0) [ 1616.047261] FAULT_INJECTION: forcing a failure. [ 1616.047261] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.078779] CPU: 0 PID: 19408 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1616.085747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1616.095105] Call Trace: [ 1616.097732] dump_stack+0x172/0x1f0 [ 1616.101382] should_fail.cold+0xa/0x15 [ 1616.105324] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1616.110450] ? ___might_sleep+0x163/0x280 [ 1616.114619] __should_failslab+0x121/0x190 [ 1616.118873] should_failslab+0x9/0x14 [ 1616.122700] kmem_cache_alloc_trace+0x2d1/0x760 [ 1616.127491] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1616.133085] ? refcount_inc_checked+0x2b/0x70 [ 1616.137595] device_add+0xfdc/0x18a0 [ 1616.141319] ? device_initialize+0x440/0x440 [ 1616.145733] ? lockdep_init_map+0x1be/0x6d0 [ 1616.150079] ? get_device_parent.isra.0+0x570/0x570 [ 1616.155126] rfkill_register+0x1bf/0xb50 [ 1616.159200] hci_register_dev+0x369/0x860 [ 1616.163363] __vhci_create_device+0x2d0/0x5a0 [ 1616.167866] vhci_write+0x2d0/0x470 [ 1616.171510] __vfs_write+0x613/0x8e0 [ 1616.175237] ? kernel_read+0x120/0x120 [ 1616.179145] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1616.184717] ? rw_verify_area+0x118/0x360 [ 1616.188880] vfs_write+0x20c/0x580 [ 1616.192433] ksys_write+0xea/0x1f0 [ 1616.195987] ? __ia32_sys_read+0xb0/0xb0 [ 1616.200102] ? do_syscall_64+0x26/0x610 [ 1616.204103] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1616.209472] ? do_syscall_64+0x26/0x610 [ 1616.213460] __x64_sys_write+0x73/0xb0 [ 1616.217358] do_syscall_64+0x103/0x610 [ 1616.221261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1616.226460] RIP: 0033:0x457f29 [ 1616.229656] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:35:31 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) gettid() openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) exit(0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000003c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) 14:35:31 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1616.248562] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1616.256277] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1616.263542] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1616.263552] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1616.263561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1616.263570] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:35:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000700000000000020000000090001000000380002000082f622cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fdinfo/3\x00') 14:35:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x2000000000000, [{0xc0010015}]}) 14:35:31 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) gettid() openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) exit(0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000003c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) 14:35:31 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluc\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:42 executing program 3 (fault-call:3 fault-nth:48): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:35:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1}}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x102) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000000c0)={0x4, 0x6, 0x2}) 14:35:42 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4000000000000, [{0xc0010015}]}) 14:35:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplud\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:42 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) gettid() openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) exit(0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000003c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) [ 1626.923169] FAULT_INJECTION: forcing a failure. [ 1626.923169] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.938402] CPU: 0 PID: 19461 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1626.945346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.954723] Call Trace: [ 1626.957315] dump_stack+0x172/0x1f0 [ 1626.960974] should_fail.cold+0xa/0x15 [ 1626.964862] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1626.969989] ? ___might_sleep+0x163/0x280 [ 1626.974143] __should_failslab+0x121/0x190 [ 1626.978388] should_failslab+0x9/0x14 [ 1626.982215] kmem_cache_alloc_trace+0x2d1/0x760 [ 1626.986888] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1626.992439] ? refcount_inc_checked+0x2b/0x70 [ 1626.996939] device_add+0xfdc/0x18a0 [ 1627.000662] ? device_initialize+0x440/0x440 [ 1627.005068] ? lockdep_init_map+0x1be/0x6d0 [ 1627.009409] ? get_device_parent.isra.0+0x570/0x570 [ 1627.014437] rfkill_register+0x1bf/0xb50 [ 1627.018506] hci_register_dev+0x369/0x860 [ 1627.022660] __vhci_create_device+0x2d0/0x5a0 [ 1627.027161] vhci_write+0x2d0/0x470 [ 1627.030797] __vfs_write+0x613/0x8e0 [ 1627.034514] ? kernel_read+0x120/0x120 [ 1627.038400] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1627.043958] ? rw_verify_area+0x118/0x360 [ 1627.048116] vfs_write+0x20c/0x580 [ 1627.051662] ksys_write+0xea/0x1f0 [ 1627.055217] ? __ia32_sys_read+0xb0/0xb0 [ 1627.059289] ? do_syscall_64+0x26/0x610 [ 1627.063264] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.068627] ? do_syscall_64+0x26/0x610 [ 1627.072628] __x64_sys_write+0x73/0xb0 [ 1627.076520] do_syscall_64+0x103/0x610 [ 1627.080412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.085596] RIP: 0033:0x457f29 [ 1627.088815] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.107710] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1627.115421] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1627.122685] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1627.129952] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1627.137232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1627.144498] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:35:42 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x68) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x2, 0x1) write$cgroup_int(r1, &(0x7f0000000180)=0x100000001, 0x12) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x109000, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000000c0)={'hsr0\x00', {0x2, 0x4e21, @remote}}) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:35:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplui\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000fb000000000000004000000000000000000000002000556effabd607474d3800020000821123cc000300000000008500000000000000000000000008000000000000000000008004f80000000000000059b4837c6401be67992a35ebb81ecae62862ab402330b31071b161545bebb4deefa314a94b9c6f0d6388992b7d2584120268398a8f797c76f3a26c2d2bc1a31934950a72ae3352f181738f426e6290732ddeda7c0d9ac004f8bc57a77dd748504703f154e8085cff8a20da2d2c0378142876927eb8cdbeeba440f0830cdcf7ad4279e1bc02ffd1c734a71003"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:35:42 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xfc', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x8000000000000, [{0xc0010015}]}) 14:35:53 executing program 3 (fault-call:3 fault-nth:49): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:35:53 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0xffc) 14:35:53 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xfd', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x4d564b00000000, [{0xc0010015}]}) 14:35:53 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplul\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:53 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) gettid() openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) exit(0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000003c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) 14:35:53 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x4000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1637.802018] FAULT_INJECTION: forcing a failure. [ 1637.802018] name failslab, interval 1, probability 0, space 0, times 0 [ 1637.838640] CPU: 0 PID: 19515 Comm: syz-executor.3 Not tainted 5.0.0+ #10 14:35:53 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xf6', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1637.845605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.854956] Call Trace: [ 1637.854983] dump_stack+0x172/0x1f0 [ 1637.855016] should_fail.cold+0xa/0x15 [ 1637.855037] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1637.861375] ? ___might_sleep+0x163/0x280 [ 1637.861397] __should_failslab+0x121/0x190 [ 1637.861419] should_failslab+0x9/0x14 [ 1637.861436] __kmalloc_track_caller+0x2d8/0x740 [ 1637.861453] ? find_held_lock+0x35/0x130 [ 1637.882582] ? console_unlock+0x714/0x10a0 [ 1637.882600] ? kstrdup_const+0x66/0x80 [ 1637.882620] kstrdup+0x3a/0x70 [ 1637.882638] kstrdup_const+0x66/0x80 [ 1637.882656] __kernfs_new_node+0xb0/0x690 [ 1637.891390] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1637.891413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1637.891429] ? irq_work_claim+0x98/0xc0 [ 1637.891445] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1637.891462] ? irq_work_queue+0x36/0x1d0 [ 1637.934452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1637.940005] ? wake_up_klogd+0x99/0xd0 [ 1637.943914] kernfs_new_node+0x99/0x130 [ 1637.947912] kernfs_create_dir_ns+0x52/0x160 [ 1637.952340] sysfs_create_dir_ns+0x131/0x2a0 [ 1637.956776] ? sysfs_create_mount_point+0xa0/0xa0 [ 1637.961650] kobject_add_internal.cold+0xe5/0x5d4 [ 1637.966522] kobject_add+0x150/0x1c0 [ 1637.970259] ? kset_create_and_add+0x1a0/0x1a0 [ 1637.974854] ? lockdep_init_map+0x1be/0x6d0 [ 1637.979193] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1637.984750] device_add+0x3d5/0x18a0 [ 1637.988479] ? get_device_parent.isra.0+0x570/0x570 [ 1637.993518] rfkill_register+0x1bf/0xb50 [ 1637.997592] hci_register_dev+0x369/0x860 14:35:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x80ffff00000000, [{0xc0010015}]}) [ 1638.001754] __vhci_create_device+0x2d0/0x5a0 [ 1638.006259] vhci_write+0x2d0/0x470 [ 1638.009901] __vfs_write+0x613/0x8e0 [ 1638.009922] ? kernel_read+0x120/0x120 [ 1638.009938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1638.009972] ? rw_verify_area+0x118/0x360 [ 1638.009990] vfs_write+0x20c/0x580 [ 1638.017591] ksys_write+0xea/0x1f0 [ 1638.017611] ? __ia32_sys_read+0xb0/0xb0 [ 1638.017631] ? do_syscall_64+0x26/0x610 [ 1638.017650] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1638.017664] ? do_syscall_64+0x26/0x610 14:35:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x7, 0x1, 0x1, 0x6eab, 0x6, [{0x4, 0x6, 0x200, 0x0, 0x0, 0x180}, {0x80000001, 0x9, 0x0, 0x0, 0x0, 0x5}, {0x6, 0x0, 0x1}, {0x5, 0x8, 0x7, 0x0, 0x0, 0x1000}, {0x8, 0x80, 0x2, 0x0, 0x0, 0x2}, {0x7, 0x100000000, 0x8, 0x0, 0x0, 0x100}]}) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1638.017685] __x64_sys_write+0x73/0xb0 [ 1638.038463] do_syscall_64+0x103/0x610 [ 1638.038486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1638.038499] RIP: 0033:0x457f29 [ 1638.038515] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1638.038524] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1638.038540] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 14:35:53 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluo\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:35:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES64=r0], 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1638.038549] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1638.038558] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1638.038567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1638.038575] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1638.045267] kobject_add_internal failed for rfkill42 (error: -12 parent: hci1) 14:36:04 executing program 3 (fault-call:3 fault-nth:50): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:36:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x100000000000000, [{0xc0010015}]}) 14:36:04 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\xfe', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:04 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) sendto$netrom(r0, &(0x7f0000000200)="6d56685c8804145e8b02a3d06ce971ac6dd03f7a8182d78234efe84963abc9226213864f334d6ef6f7d4b050b16a65cf477800cddf3da9ac0974e5130388e7afa865288dfe1763fdf2dba8b083c7ef2f6bcec8b5453bb3dc8222401e528cbf2ad569fdc468c21d6a9a3b0d82645ec5f24cca6b16f8858f237fca7cbeb4dce810c855458342de496e3794daff651966f3a55f95e4ab2d757d8d470b9d08218f550f3d7decce5d29442d337e7046fd2f66a7019ea7f53b478fffeb65c1b8e0aeeb00c06d40c37e5b775b44754482f0d1cd3fb3ffdcb9595a0dc604aac5aaeda049ced728018139bad319", 0xe9, 0x8000, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:36:04 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplup\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="1691414f7efc1134bb42a860ad36910e4c648a7f68929567b35b1f67b5c7e52ca4976fff3a65e11276a6b88d0d57b35377525fe9be82b372d5d702894c10fc20c788f5af0ab191744fc585beeae50705b20cbc984149dc642dd85c8e0b0416d08d45c35ffa80d3952fcacc2e92372050b87f5cc150e6b1b57c5fb31fc7cb48356996d1ea5fb438ae362fc42013"], 0x8d) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000140)) 14:36:04 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1648.691834] FAULT_INJECTION: forcing a failure. [ 1648.691834] name failslab, interval 1, probability 0, space 0, times 0 [ 1648.725601] CPU: 1 PID: 19579 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1648.732559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:36:04 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 14:36:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x10100c000000000, [{0xc0010015}]}) [ 1648.732566] Call Trace: [ 1648.732601] dump_stack+0x172/0x1f0 [ 1648.732627] should_fail.cold+0xa/0x15 [ 1648.752108] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1648.757236] ? ___might_sleep+0x163/0x280 [ 1648.761408] __should_failslab+0x121/0x190 [ 1648.765664] should_failslab+0x9/0x14 [ 1648.769493] kmem_cache_alloc+0x2b2/0x6f0 [ 1648.773663] __kernfs_new_node+0xef/0x690 [ 1648.777831] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1648.777854] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1648.777873] ? find_held_lock+0x35/0x130 [ 1648.792161] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1648.797648] ? kasan_check_write+0x14/0x20 [ 1648.801900] kernfs_new_node+0x99/0x130 [ 1648.801921] kernfs_create_link+0xdd/0x250 [ 1648.801940] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1648.810173] sysfs_create_link+0x65/0xc0 [ 1648.810194] device_add+0x663/0x18a0 [ 1648.810217] ? get_device_parent.isra.0+0x570/0x570 [ 1648.810244] rfkill_register+0x1bf/0xb50 [ 1648.832372] hci_register_dev+0x369/0x860 [ 1648.836550] __vhci_create_device+0x2d0/0x5a0 [ 1648.841086] vhci_write+0x2d0/0x470 [ 1648.844776] __vfs_write+0x613/0x8e0 [ 1648.848513] ? kernel_read+0x120/0x120 [ 1648.852433] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1648.858013] ? rw_verify_area+0x118/0x360 [ 1648.862183] vfs_write+0x20c/0x580 [ 1648.865745] ksys_write+0xea/0x1f0 [ 1648.869311] ? __ia32_sys_read+0xb0/0xb0 [ 1648.873405] ? do_syscall_64+0x26/0x610 [ 1648.877402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1648.882796] ? do_syscall_64+0x26/0x610 [ 1648.886793] __x64_sys_write+0x73/0xb0 [ 1648.890702] do_syscall_64+0x103/0x610 [ 1648.894648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1648.899852] RIP: 0033:0x457f29 [ 1648.903058] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1648.921986] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1648.929706] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1648.936987] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1648.944293] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1648.951581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1648.958897] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:36:04 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1649.047901] audit: type=1400 audit(1551969364.459:105): avc: denied { block_suspend } for pid=19588 comm="syz-executor.1" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 14:36:04 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluu\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:04 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000b01d6f5aa5411082c39cf963b9123957e8710f0c988c2dd073bf"], 0x68) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xc02, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x7f) r3 = fcntl$dupfd(r1, 0x406, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000040)={0x9, 0x45, 0x1, 0x400}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:36:14 executing program 3 (fault-call:3 fault-nth:51): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:36:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x14d564b00000000, [{0xc0010015}]}) 14:36:14 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x2000) openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000200)={0x0, {{0x2, 0x4e21, @multicast1}}}, 0x88) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d200000000cf15bde0160000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f80000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:36:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f000059dffc), &(0x7f0000d8cffc)=0xfffffffffffffcb2) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:14 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplux\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:14 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f000059dffc), &(0x7f0000d8cffc)=0xfffffffffffffcb2) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:14 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x1000) 14:36:15 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f000059dffc), &(0x7f0000d8cffc)=0xfffffffffffffcb2) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) [ 1659.580676] FAULT_INJECTION: forcing a failure. [ 1659.580676] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.644632] CPU: 0 PID: 19633 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1659.651606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1659.660963] Call Trace: [ 1659.663576] dump_stack+0x172/0x1f0 [ 1659.667235] should_fail.cold+0xa/0x15 [ 1659.671151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1659.676271] ? ___might_sleep+0x163/0x280 [ 1659.680433] __should_failslab+0x121/0x190 [ 1659.684691] should_failslab+0x9/0x14 [ 1659.688536] kmem_cache_alloc+0x2b2/0x6f0 [ 1659.692688] ? memcpy+0x46/0x50 [ 1659.696003] ? kstrdup+0x5a/0x70 [ 1659.699379] __kernfs_new_node+0xef/0x690 [ 1659.703543] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1659.708313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1659.713856] ? irq_work_claim+0x98/0xc0 [ 1659.717838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1659.723382] ? irq_work_queue+0x36/0x1d0 [ 1659.727453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1659.733001] ? wake_up_klogd+0x99/0xd0 [ 1659.736908] kernfs_new_node+0x99/0x130 [ 1659.740909] kernfs_create_dir_ns+0x52/0x160 [ 1659.745337] sysfs_create_dir_ns+0x131/0x2a0 [ 1659.749772] ? sysfs_create_mount_point+0xa0/0xa0 [ 1659.754644] kobject_add_internal.cold+0xe5/0x5d4 [ 1659.759501] kobject_add+0x150/0x1c0 [ 1659.763226] ? kset_create_and_add+0x1a0/0x1a0 [ 1659.767826] ? lockdep_init_map+0x1be/0x6d0 [ 1659.772163] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1659.777719] device_add+0x3d5/0x18a0 [ 1659.781452] ? get_device_parent.isra.0+0x570/0x570 [ 1659.786488] rfkill_register+0x1bf/0xb50 [ 1659.790562] hci_register_dev+0x369/0x860 [ 1659.794725] __vhci_create_device+0x2d0/0x5a0 [ 1659.799242] vhci_write+0x2d0/0x470 [ 1659.802882] __vfs_write+0x613/0x8e0 [ 1659.806606] ? kernel_read+0x120/0x120 [ 1659.810503] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1659.816070] ? rw_verify_area+0x118/0x360 [ 1659.820241] vfs_write+0x20c/0x580 [ 1659.823798] ksys_write+0xea/0x1f0 [ 1659.827351] ? __ia32_sys_read+0xb0/0xb0 [ 1659.831424] ? do_syscall_64+0x26/0x610 [ 1659.835414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.840785] ? do_syscall_64+0x26/0x610 [ 1659.844774] __x64_sys_write+0x73/0xb0 [ 1659.848673] do_syscall_64+0x103/0x610 [ 1659.852575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.857773] RIP: 0033:0x457f29 [ 1659.860976] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1659.879884] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1659.887601] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 14:36:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x200000000000000, [{0xc0010015}]}) [ 1659.894871] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1659.902157] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1659.909431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1659.916716] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:36:15 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x02', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1660.025307] kobject_add_internal failed for rfkill44 (error: -12 parent: hci1) 14:36:25 executing program 3 (fault-call:3 fault-nth:52): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:36:25 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x88000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000340)=""/62) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x23000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, '/dev/input/event#\x00'}}, {@version_9p2000='version=9p2000'}, {@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/input/event#\x00'}}, {@uid_lt={'uid<', r4}}]}}) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:36:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f000059dffc), &(0x7f0000d8cffc)=0xfffffffffffffcb2) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:25 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x20100c000000000, [{0xc0010015}]}) 14:36:25 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f000059dffc), &(0x7f0000d8cffc)=0xfffffffffffffcb2) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:25 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) fcntl$setpipe(r0, 0x407, 0x1d2) [ 1670.427851] FAULT_INJECTION: forcing a failure. [ 1670.427851] name failslab, interval 1, probability 0, space 0, times 0 [ 1670.497871] CPU: 0 PID: 19678 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1670.504831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1670.514180] Call Trace: [ 1670.516772] dump_stack+0x172/0x1f0 [ 1670.520410] should_fail.cold+0xa/0x15 [ 1670.524305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1670.529417] ? ___might_sleep+0x163/0x280 [ 1670.533570] __should_failslab+0x121/0x190 [ 1670.537807] should_failslab+0x9/0x14 [ 1670.541609] kmem_cache_alloc+0x2b2/0x6f0 [ 1670.545767] __kernfs_new_node+0xef/0x690 [ 1670.549918] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1670.554711] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1670.560164] ? find_held_lock+0x35/0x130 [ 1670.564230] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1670.569686] ? kasan_check_write+0x14/0x20 [ 1670.573925] kernfs_new_node+0x99/0x130 [ 1670.577903] kernfs_create_link+0xdd/0x250 [ 1670.582141] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1670.587422] sysfs_create_link+0x65/0xc0 [ 1670.591501] device_add+0x663/0x18a0 [ 1670.595225] ? get_device_parent.isra.0+0x570/0x570 [ 1670.600258] rfkill_register+0x1bf/0xb50 [ 1670.604331] hci_register_dev+0x369/0x860 [ 1670.608494] __vhci_create_device+0x2d0/0x5a0 [ 1670.612990] vhci_write+0x2d0/0x470 [ 1670.616623] __vfs_write+0x613/0x8e0 [ 1670.620341] ? kernel_read+0x120/0x120 [ 1670.624228] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1670.629781] ? rw_verify_area+0x118/0x360 [ 1670.633937] vfs_write+0x20c/0x580 [ 1670.637481] ksys_write+0xea/0x1f0 [ 1670.641026] ? __ia32_sys_read+0xb0/0xb0 [ 1670.645104] ? do_syscall_64+0x26/0x610 [ 1670.649094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.654459] ? do_syscall_64+0x26/0x610 [ 1670.658439] __x64_sys_write+0x73/0xb0 [ 1670.662333] do_syscall_64+0x103/0x610 [ 1670.666228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.671419] RIP: 0033:0x457f29 [ 1670.674611] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:36:26 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1670.693515] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1670.701233] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1670.708501] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1670.715768] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1670.723036] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1670.730313] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:36:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f000059dffc), &(0x7f0000d8cffc)=0xfffffffffffffcb2) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:26 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x800, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000200)={0x1, "0d023334a5c06119dbe96318b31173b739b81adf536f3e3a4999420b857c5b7f", 0x0, 0x401, 0x1, 0xffffff, 0x0, 0x8}) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000d200000000000010000000000004000000400000000000009800000000200000000900010000003800020000820123cc000300000000008500000000000700000000000000000000000000000000008004f800000000000000db7a224d426cfe878952bd16b218de11644d4adf487783e6947e284beefec65dae4fc4d771f0ec5fc8ac13ccaf271e4a72729d66256fdff73b679bf543c839ec39d06a3532"], 0x68) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f00000000c0)={0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}]}) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 14:36:26 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x04', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:36 executing program 3 (fault-call:3 fault-nth:53): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:36:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f000059dffc), &(0x7f0000d8cffc)=0xfffffffffffffcb2) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:36 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:36 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="e9927125f13e201df92c1ce61462241a7a35d5542916c0a7e5ff9099e6197b99c8e6b2716ad0e2f74dfa9646992a585fed2ae325fe17a0614b37b924949605b88edf3d4ee65d7ba077a479931026192c055c32d2bc", @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES16=r1, @ANYRESDEC=r1, @ANYBLOB="934e2840ed116ba4bd0b26fa7a022841746170069ce800d749e2ad29036b53abf40f8ea230a9af4c6fca45ef6cc7508e5041caf92afca2bad26fab1dd96f113cb35b615b948c5c848370414dcf0990be391216f086c41afe70e352e9186ca25f7b2284b5996a577b8fe53f9305e67f47266f4f85ada3162023233e7f5ad66be0ae2d1aa2bda06c338ca511626a96", @ANYRES32=r1, @ANYRES32=r1, @ANYRESHEX=r1, @ANYBLOB="505d41bc3cc3e1cf1afce60eac93906e083b08285b449ae8fc004976ad6f09a09ca323d15069902a51644946b3267eccfc8c73d283accc5b65aea7ba5064107acc7e5264396039a356bc368014c6692b220269ca52393762b777cb356804559fa0720f3b7b40d1b1c86c9be70ff16b3eb0468ffec5dd274a00d9b11063f398dec769b0dabfb5f5994943fc28c3", @ANYRESHEX=r1, @ANYRES64=r1, @ANYPTR64], @ANYPTR, @ANYRES32, @ANYRES32=r0, @ANYRESDEC=r1, @ANYRESOCT, @ANYRESOCT=r1, @ANYPTR]], 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0xa, &(0x7f00000019c0)=[{&(0x7f0000000140)="b3d3db359a858adbf20c9c60c5928e0f74ec4f98da41981e0f19607e81cde52822936ed60fff612dd23c0250e4a8214a", 0x30, 0x5}, {&(0x7f0000000500)="75db04de6f11b95b2ffed65b360d5543685eb0656a28ffeec3662b1cbb1c37b6f12ad7e57fc93e73713b2348ec94330fc64608047542c4ec36dfd77a05421681d4f44373f134e2e5adda55c99103c7d5dfa7310c5d2f3393ef9768dc57b1dde02b024469b0fb9c48f3a8eb6f33637e9d8b2e5a837e8a75f59b25fc2225d0416252b462a9ba51f121b05fe0bc2a21e04673dc69c3e0c3c1ec68c77a20012c53", 0x9f, 0x5}, {&(0x7f00000005c0)="d7eb933e8c771ec01159ed4c052519fa4be604f2cbd3d13fed9ba7b078a4a913b9d698877978d9a202fff04eea5f71055ec18d9223da781d9b5cd3be9f36a0cc183d831f028e8041898d08e95409cd45d15b366aed8c98d3b2", 0x59, 0x3e4}, {&(0x7f0000000640)="8b8145a2193623e61d52ad78a178944114c6e2fb2853b34cb19a7ed7cb5e69e6eae1b52574b345d7696aea6549859ae08ba9f590aa5333ea85885e4caea59b64f97938a5af4a0e7a06a6dd888d6fcb1cb19a72c19f765e26c7e799ae8c744f2c5a4aab72adc4eed795d4d8b936a4704eec86583064c814399d63241a2e98c6ec8f8c4d77358ba806dbe076b6dd64f4340cad1790cf8800c4417a3dad411450a128b3c458e989", 0xa6, 0x7fff}, {&(0x7f0000000700)="e677c3d9d638dd8f56505ac4b96d5a2180329c859aab8883b6a2e3e35a5948d45d65a0c3d97cb4105341823e386f0f9c4d471973c161988497b119d03d79f94e5ac61f26471faf7a01fdf222e08ef844dc7419caf7917963df38065624c42e360d921b18a1d55bfa88dd20882d92d22b681d4a6167860345c0e9115f1065dbd3553682bbf6be92c25e38e7ebb84b72a72d4e62b8f5f1d7256fedd56c076ef8cec2150f36ea452525135875b797e3bc6ea177e8a8c704", 0xb6}, {&(0x7f00000007c0)="9c50da7b481566e3289feec5bc149e162ca7e09497d91a8b3f2a0e1d3d13a6e80764789e6794cf63f90980ec79cc15589c8a3e4afe9db0df65af2f31d09fa9714031abb97d8065a238148b33560a9243eb4fe8a155ab275874c40bead9cfe539af097f1ea3586dc7fcfe3de6605c34d47c09a8b51a90c2a320ef91791621450025d7d6176e4845c62f3a2bb2123273a7290d37dad1e5e037a0", 0x99, 0x10000}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000001880)="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", 0xfc, 0x7}, {&(0x7f00000001c0)="9ccf4fbbce9d124a7ad90ffc279fb8b8f0e3e83a217d966766d8199e2c206208783bab51c1428034b3198522a7d43c10567fe3665e73dc3431ff12", 0x3b, 0x3}, {&(0x7f0000001980)="498ebf9ba7c73fd89d6b8fddbf0a1fec0e55a938f6b350d542d9e9a66b7c4b98e1afd0bc6ce9ecf96d20b6bf91c2788a0bee9c95134c16a2c1d5fd0f1ffd7e", 0x3f, 0x9}], 0x30000, &(0x7f0000001ac0)={[{@i_version='i_version'}, {@nodiscard='nodiscard'}, {@test_dummy_encryption='test_dummy_encryption'}, {@usrjquota='usrjquota='}], [{@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise='appraise'}, {@context={'context', 0x3d, 'system_u'}}, {@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '^(vboxnet0'}}, {@smackfsdef={'smackfsdef', 0x3d, 'selfem0^vboxnet0ppp0'}}, {@fsuuid={'fsuuid', 0x3d, {[0x75, 0x39, 0x33, 0x31, 0x75, 0x0, 0x63, 0x37], 0x2d, [0x0, 0x37, 0x0, 0x77], 0x2d, [0x7f, 0x32, 0x73, 0x77], 0x2d, [0x37, 0x7a, 0x62, 0x62], 0x2d, [0x64, 0x62, 0x73, 0x39, 0x30, 0x73, 0x7f, 0x30]}}}]}) 14:36:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x24d564b00000000, [{0xc0010015}]}) 14:36:36 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x05', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:36 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000001c00400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f8000000f1ff0000"], 0x68) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x101, 0x101000) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 1681.319361] FAULT_INJECTION: forcing a failure. [ 1681.319361] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.346308] CPU: 1 PID: 19725 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1681.353287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1681.353294] Call Trace: [ 1681.353319] dump_stack+0x172/0x1f0 [ 1681.353345] should_fail.cold+0xa/0x15 [ 1681.353365] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1681.372829] ? ___might_sleep+0x163/0x280 [ 1681.382083] __should_failslab+0x121/0x190 [ 1681.382105] should_failslab+0x9/0x14 [ 1681.382124] kmem_cache_alloc+0x2b2/0x6f0 [ 1681.382165] __kernfs_new_node+0xef/0x690 [ 1681.382183] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1681.403281] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1681.408748] ? find_held_lock+0x35/0x130 [ 1681.412825] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1681.418648] ? kasan_check_write+0x14/0x20 [ 1681.422896] kernfs_new_node+0x99/0x130 [ 1681.426895] kernfs_create_link+0xdd/0x250 [ 1681.431145] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1681.436439] sysfs_create_link+0x65/0xc0 [ 1681.440516] device_add+0x663/0x18a0 [ 1681.444256] ? get_device_parent.isra.0+0x570/0x570 [ 1681.449323] rfkill_register+0x1bf/0xb50 [ 1681.453397] hci_register_dev+0x369/0x860 [ 1681.457560] __vhci_create_device+0x2d0/0x5a0 [ 1681.462085] vhci_write+0x2d0/0x470 [ 1681.465734] __vfs_write+0x613/0x8e0 [ 1681.469465] ? kernel_read+0x120/0x120 [ 1681.473361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1681.478939] ? rw_verify_area+0x118/0x360 [ 1681.483138] vfs_write+0x20c/0x580 [ 1681.486695] ksys_write+0xea/0x1f0 [ 1681.490256] ? __ia32_sys_read+0xb0/0xb0 [ 1681.494328] ? do_syscall_64+0x26/0x610 [ 1681.498322] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1681.503692] ? do_syscall_64+0x26/0x610 [ 1681.507681] __x64_sys_write+0x73/0xb0 [ 1681.511588] do_syscall_64+0x103/0x610 [ 1681.515493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1681.520692] RIP: 0033:0x457f29 [ 1681.523893] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1681.542991] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1681.550712] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1681.557989] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1681.565262] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1681.572540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1681.579820] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:36:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:37 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:37 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000000000900010000003800020000821123cc00030000000000850000000000000000000000000000008004f8000000000000000000000000000000000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:36:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:37 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x06', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:47 executing program 3 (fault-call:3 fault-nth:54): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:36:47 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x30001c000000000, [{0xc0010015}]}) 14:36:47 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x20080, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r1, r2, 0x6, 0x3}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5473, &(0x7f0000000200)) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:36:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\a', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:47 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) [ 1692.228172] FAULT_INJECTION: forcing a failure. [ 1692.228172] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.275515] CPU: 0 PID: 19784 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1692.282506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.282514] Call Trace: [ 1692.282539] dump_stack+0x172/0x1f0 [ 1692.282581] should_fail.cold+0xa/0x15 [ 1692.282604] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1692.282628] ? ___might_sleep+0x163/0x280 [ 1692.282649] __should_failslab+0x121/0x190 [ 1692.282669] should_failslab+0x9/0x14 [ 1692.282684] kmem_cache_alloc+0x2b2/0x6f0 [ 1692.282697] ? memcpy+0x46/0x50 [ 1692.282715] ? kstrdup+0x5a/0x70 [ 1692.330228] __kernfs_new_node+0xef/0x690 [ 1692.334391] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1692.339161] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1692.339179] ? find_held_lock+0x35/0x130 [ 1692.339197] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1692.339217] ? kasan_check_write+0x14/0x20 [ 1692.339235] kernfs_new_node+0x99/0x130 [ 1692.358417] kernfs_create_link+0xdd/0x250 [ 1692.358439] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1692.358457] sysfs_create_link+0x65/0xc0 [ 1692.358477] device_add+0x78f/0x18a0 [ 1692.376024] ? get_device_parent.isra.0+0x570/0x570 [ 1692.376053] rfkill_register+0x1bf/0xb50 [ 1692.376090] hci_register_dev+0x369/0x860 [ 1692.376113] __vhci_create_device+0x2d0/0x5a0 [ 1692.397512] vhci_write+0x2d0/0x470 [ 1692.397535] __vfs_write+0x613/0x8e0 [ 1692.397555] ? kernel_read+0x120/0x120 [ 1692.408785] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1692.414341] ? rw_verify_area+0x118/0x360 [ 1692.414362] vfs_write+0x20c/0x580 [ 1692.414386] ksys_write+0xea/0x1f0 [ 1692.425617] ? __ia32_sys_read+0xb0/0xb0 [ 1692.429697] ? do_syscall_64+0x26/0x610 [ 1692.433684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.439055] ? do_syscall_64+0x26/0x610 [ 1692.439084] __x64_sys_write+0x73/0xb0 [ 1692.439104] do_syscall_64+0x103/0x610 [ 1692.439125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.439137] RIP: 0033:0x457f29 14:36:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1ff, 0x9, 0x8, 0x1, 0x7f}) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x4) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010009f010000000000004028a9863a00000000000000200000000900010000003800020000821123cc00030000001c19410b3f6e8a7d0000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:36:47 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:47 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) [ 1692.439154] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1692.447006] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1692.478190] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1692.478200] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1692.478209] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1692.478219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1692.478228] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:36:58 executing program 3 (fault-call:3 fault-nth:55): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:36:58 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f00000000c0)={0x1000000000000000, 0xd002, 0x24, 0x7, 0xf}) umount2(&(0x7f0000000140)='./file1\x00', 0x7) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={r2, 0xce, "097a618e4a6e8308da13a8d06e3877cb170dc3f9354745533512cc23c518ce2a3e54e55a9f1ae5bac78b01498a357ee05216935055690fa458ece20c4dc061fe0d829c26f0104d19a161ce402c99e94fb17c6d03023d2eca2ff210eacac19b84349ac1067dd202ff6d1e9decf33bc508a0ba6050c42598db3154d799ae185463b9685c54c5a95a0ce176a558f6b33d9a6008b5c8e6f3b214701591af0f976b91ea2a7a34fa0f885b6bb873fa8ab69d17b2bfec10d9835887429d0ddc9325b545ea45beae7bd450255753e30c88ba"}, &(0x7f0000000440)=0xd6) 14:36:58 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:58 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\b', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x30100c000000000, [{0xc0010015}]}) 14:36:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:36:58 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1703.121537] FAULT_INJECTION: forcing a failure. [ 1703.121537] name failslab, interval 1, probability 0, space 0, times 0 14:36:58 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, 0x0, 0xffffffffffffff96) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfffffffffffffe7e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x0, {0x0, {0x0, 0x0, 0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, 0xa0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x0) 14:36:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) [ 1703.206351] CPU: 1 PID: 19841 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1703.213332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.222690] Call Trace: [ 1703.222717] dump_stack+0x172/0x1f0 [ 1703.222743] should_fail.cold+0xa/0x15 [ 1703.222765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1703.237987] ? ___might_sleep+0x163/0x280 [ 1703.242174] __should_failslab+0x121/0x190 [ 1703.246436] should_failslab+0x9/0x14 [ 1703.250267] kmem_cache_alloc+0x2b2/0x6f0 [ 1703.254424] ? memcpy+0x46/0x50 [ 1703.254445] ? kstrdup+0x5a/0x70 [ 1703.254465] __kernfs_new_node+0xef/0x690 [ 1703.265252] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1703.270031] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1703.275506] ? find_held_lock+0x35/0x130 [ 1703.275526] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1703.275545] ? kasan_check_write+0x14/0x20 [ 1703.275562] kernfs_new_node+0x99/0x130 [ 1703.285090] kernfs_create_link+0xdd/0x250 [ 1703.285111] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1703.285129] sysfs_create_link+0x65/0xc0 [ 1703.285149] device_add+0x78f/0x18a0 [ 1703.310893] ? get_device_parent.isra.0+0x570/0x570 [ 1703.315955] rfkill_register+0x1bf/0xb50 [ 1703.320064] hci_register_dev+0x369/0x860 [ 1703.324245] __vhci_create_device+0x2d0/0x5a0 [ 1703.324265] vhci_write+0x2d0/0x470 [ 1703.324287] __vfs_write+0x613/0x8e0 [ 1703.324306] ? kernel_read+0x120/0x120 [ 1703.332459] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1703.332496] ? rw_verify_area+0x118/0x360 [ 1703.332515] vfs_write+0x20c/0x580 [ 1703.353351] ksys_write+0xea/0x1f0 [ 1703.356919] ? __ia32_sys_read+0xb0/0xb0 [ 1703.361008] ? do_syscall_64+0x26/0x610 [ 1703.365005] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.370385] ? do_syscall_64+0x26/0x610 [ 1703.374383] __x64_sys_write+0x73/0xb0 [ 1703.378296] do_syscall_64+0x103/0x610 [ 1703.382206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.387415] RIP: 0033:0x457f29 14:36:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x34d564b00000000, [{0xc0010015}]}) 14:36:58 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\t', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1703.390626] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1703.409712] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1703.409728] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1703.409737] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1703.409747] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1703.409756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1703.409765] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 14:37:09 executing program 3 (fault-call:3 fault-nth:56): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff41"], 0x2) 14:37:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:37:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000d2000000bfc14f370003003e000000100000000000000000004083410000000000000000002000000009000100000037e3020000821123cc0003000000000000018000000000000000000000000000000000008004f800000000800000e2ae42613f902f8b09c6b1b67a7d8266b46eadb4557774261dfc07852db0065ff7"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 14:37:09 executing program 2: syz_genetlink_get_family_id$team(0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x100000000000008b, 0x40001c000000000, [{0xc0010015}]}) 14:37:09 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\n', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x4000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, &(0x7f0000000080), 0x0, 0x0) 14:37:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000300)='$em0\x00', 0x2) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000200000000900010000003800020000821123cc000300000000008500000000000000000000000000000000000000000000008004f800000000000000"], 0x68) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'security.', 'nodev)\x00'}, &(0x7f0000000200)=""/138, 0x8a) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xffffffffffffff01, 0x40000) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f00000002c0)={r0, 0x0, 0xfffffffffffff000}) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) dup(r0) syz_init_net_socket$bt_l2cap(0x1f, 0x49b01880bb95c325, 0x0) [ 1713.985359] WARNING: CPU: 1 PID: 19897 at kernel/locking/lockdep.c:1024 lockdep_register_key+0x10d/0x490 [ 1713.995011] Kernel panic - not syncing: panic_on_warn set ... [ 1714.000917] CPU: 1 PID: 19897 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1714.007843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1714.017193] Call Trace: [ 1714.019796] dump_stack+0x172/0x1f0 [ 1714.023436] ? lockdep_register_key+0x40/0x490 [ 1714.028044] panic+0x2cb/0x65c [ 1714.031259] ? __warn_printk+0xf3/0xf3 [ 1714.035153] ? lockdep_register_key+0x10d/0x490 [ 1714.039825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1714.045365] ? __warn.cold+0x5/0x45 [ 1714.048994] ? lockdep_register_key+0x10d/0x490 [ 1714.053664] __warn.cold+0x20/0x45 [ 1714.057206] ? find_held_lock+0x35/0x130 [ 1714.061271] ? lockdep_register_key+0x10d/0x490 [ 1714.065946] report_bug+0x263/0x2b0 [ 1714.069590] do_error_trap+0x11b/0x200 [ 1714.073486] do_invalid_op+0x37/0x50 [ 1714.077211] ? lockdep_register_key+0x10d/0x490 [ 1714.081901] invalid_op+0x14/0x20 [ 1714.085374] RIP: 0010:lockdep_register_key+0x10d/0x490 [ 1714.090667] Code: 75 23 e9 e5 01 00 00 48 89 da 48 c1 ea 03 42 80 3c 3a 00 0f 85 b1 02 00 00 48 8b 1b 48 85 db 0f 84 c7 01 00 00 4c 39 e3 75 dd <0f> 0b 48 c7 c0 18 fb 5c 89 48 ba 00 00 00 00 00 fc ff df 48 89 c1 [ 1714.109612] RSP: 0018:ffff88806dd27a50 EFLAGS: 00010046 [ 1714.114987] RAX: dffffc0000000000 RBX: ffff8880a01313d8 RCX: 1ffffffff12b9f63 [ 1714.122261] RDX: 1ffffffff14649c8 RSI: 0000000000000000 RDI: ffff88809f7f0b3c [ 1714.129535] RBP: ffff88806dd27a80 R08: ffffffff8a324e40 R09: ffffed100dba4f3f [ 1714.136808] R10: ffffed100dba4f3e R11: 0000000000000003 R12: ffff8880a01313d8 [ 1714.144087] R13: 0000000000000afc R14: 0000000000000286 R15: dffffc0000000000 [ 1714.151387] alloc_workqueue+0x427/0xe70 [ 1714.155465] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1714.160492] hci_register_dev+0x209/0x860 [ 1714.164650] ? __vhci_create_device+0x112/0x5a0 [ 1714.169327] __vhci_create_device+0x2d0/0x5a0 [ 1714.173824] vhci_write+0x2d0/0x470 [ 1714.177458] __vfs_write+0x613/0x8e0 [ 1714.181197] ? kernel_read+0x120/0x120 [ 1714.185119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1714.190667] ? rw_verify_area+0x118/0x360 [ 1714.194816] vfs_write+0x20c/0x580 [ 1714.198368] ksys_write+0xea/0x1f0 [ 1714.201915] ? __ia32_sys_read+0xb0/0xb0 [ 1714.206001] ? do_syscall_64+0x26/0x610 [ 1714.209985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1714.215351] ? do_syscall_64+0x26/0x610 [ 1714.219329] __x64_sys_write+0x73/0xb0 [ 1714.223218] do_syscall_64+0x103/0x610 [ 1714.227108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1714.232302] RIP: 0033:0x457f29 [ 1714.235503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1714.254405] RSP: 002b:00007fab7f256c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1714.262150] RAX: ffffffffffffffda RBX: 00007fab7f256c90 RCX: 0000000000457f29 [ 1714.269423] RDX: 0000000000000002 RSI: 0000000020000140 RDI: 0000000000000005 [ 1714.276697] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1714.283968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab7f2576d4 [ 1714.291239] R13: 00000000004c6ff5 R14: 00000000004dc918 R15: 0000000000000006 [ 1714.299332] Kernel Offset: disabled [ 1714.302963] Rebooting in 86400 seconds..